Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Seamless and Secure Communications over Heterogeneous Wireless Networks (SpringerBriefs in Computer Science)
Seamless and Secure Communications over Heterogeneous Wireless Networks (SpringerBriefs in Computer Science)

This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to...

Creating a Presentation in PowerPoint: Visual QuickProject Guide
Creating a Presentation in PowerPoint: Visual QuickProject Guide
PowerPoint is nearly ubiquitous in today's world--in business settings, of course, but in schools and universities, clubs and organizations--almost everywhere you turn. It's not a difficult tool to use, but the presentations people create in PowerPoint range widely in quality--dazzling or dull, enlivening or enervating. Now, to help users deliver...
Adobe Flex 4.5 Fundamentals: Training from the Source
Adobe Flex 4.5 Fundamentals: Training from the Source

Macromedia introduced Flex in 2004 so that developers could write web applications for the nearly ubiquitous Flash platform. These applications benefited from the improved design, usability, and portability that Flex made possible, dramatically changing the user experience. These features are a cornerstone of Web 2.0, a new generation...

Moodle for Mobile Learning
Moodle for Mobile Learning

Mobile devices have become ubiquitous, and both smartphones and tablets offer so many new possibilities for learning. Moodle is gradually becoming more mobile-friendly, with the inclusion of a mobile theme in Moodle 2, the availability of responsive third-party themes, and the launch of an official Moodle app. Moodle and mobile are coming...

A Theory of Distributed Objects
A Theory of Distributed Objects

Distributed and communicating objects are becoming ubiquitous. In global, Grid and Peer-to-Peer computing environments, extensive use is made of objects interacting through method calls. So far, no general formalism has been proposed for the foundation of such systems.

Caromel and Henrio are the first to define a calculus for distributed...

Java Closures and Lambda
Java Closures and Lambda
This book is the culmination of many brash years and hard lessons. The story starts all the way back when I migrated from C++ into perl. The perl programming language was amazingly powerful compared to the low-level manipulations and bookkeeping of C++. (The fact that it was “slow” never bothered me – I would rather write...
Advanced Wired and Wireless Networks (Multimedia Systems and Applications)
Advanced Wired and Wireless Networks (Multimedia Systems and Applications)
We live in the era of information revolution triggered by a widespread
availability of Internet and Internet based applications, further enhanced by
an introduction of wireless data networks and extension of cellular networks
beyond traditional mobile telephony through an addition of the mobile
Internet access. The Internet has
...
Computer Networking First-Step
Computer Networking First-Step

Your first step into the world of computer networking

  • No experience required

  • Includes clear and easily understood explanations

  • Makes learning easy

...
Intelligent Environments: Methods, Algorithms and Applications (Advanced Information and Knowledge Processing)
Intelligent Environments: Methods, Algorithms and Applications (Advanced Information and Knowledge Processing)
This innovative book discusses engineering solutions for the automatic understanding of a complex scene via multi-modal arrays of sensors. It focuses on research dealing with robotic platforms that augment an environment. In particular, it considers the study of information fusion methods, the study of algorithms for ontology learning from tabula...
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center

Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud...

OpenCL Programming Guide
OpenCL Programming Guide

Industry pundits love drama. New products don’t build on the status quo to make things better. They “revolutionize” or, better yet, define a “new paradigm.” And, of course, given the way technology evolves, the results rarely are as dramatic as the pundits make it seem.

Over the past decade,...

Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy