Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pervasive Information Architecture: Designing Cross-Channel User Experiences
Pervasive Information Architecture: Designing Cross-Channel User Experiences

I knew the Internet before it got famous. There were places but no paths, no maps, no search engines. Entry required a key in the form of an IP address and an incantation in the language of UNIX. It was a small world that felt big because it was so easy to get lost in the shadowy realm of texts and data, completely devoid of color....

The Glorious Foods of Greece: Traditional Recipes from the Islands, Cities, and Villages
The Glorious Foods of Greece: Traditional Recipes from the Islands, Cities, and Villages

The Glorious Foods of Greece is the magnum opus of Greek cuisine, the first book that takes the reader on a long and fascinating journey beyond the familiar Greece of blue-and-white postcard images and ubiquitous grilled fish and moussaka into the country's many different regions, where local customs and foodways have remaained...

Human Centered Design: Second International Conference, HCD 2011, Held as Part of HCI International 2011
Human Centered Design: Second International Conference, HCD 2011, Held as Part of HCI International 2011

The 14th International Conference on Human–Computer Interaction, HCI International 2011, was held in Orlando, Florida, USA, July 9–14, 2011, jointly with the Symposium on Human Interface (Japan) 2011, the 9th International Conference on Engineering Psychology and Cognitive Ergonomics, the 6th International Conference on...

Ubiquitous Multimedia and Mobile Agents: Models and Implementations
Ubiquitous Multimedia and Mobile Agents: Models and Implementations

Ubiquitous multimedia systems, or mobile multimedia systems, offer the promise of pervasive delivery of multimedia content to mobile users and their handheld devices.

Ubiquitous Multimedia and Mobile Agents: Models and Implementations provides the hybridization of two paradigms, namely, ubiquitous/mobile multimedia and mobile...

IS Management Handbook, 8th Edition
IS Management Handbook, 8th Edition
The first few years of the new millennium have been a challenging time for the information technology (IT) manager. The initial economic euphoria that greeted the successful completion of Y2K projects worldwide was quickly followed by a dramatic shakedown within U.S.-based industries most closely related to the growth of the Internet. Today,...
Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools
Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools

Recently, the rapid and fundamental advances in computing technologies have been driving the role and scope of software systems to a new level. A number of new types of software systems are emerging, among which service based systems, cloud computing, pervasive computing, and Internet of Things are eminent examples. For these systems,...

Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
In todays society the issue of security, understood in the widest context, have become a crucial one. The people of the information age, having instant access to the sources of knowledge and information expect the technology to improve their safety in all respects. That, straightforwardly, leads to the demand for methods, technologies, frameworks...
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there...
Web Based Project Coaching: Requirements, Design, Implementation and Evaluation of Online Coaching Services (Informationsmanagement und Computer Aided Team)
Web Based Project Coaching: Requirements, Design, Implementation and Evaluation of Online Coaching Services (Informationsmanagement und Computer Aided Team)

The traditional project coaching takes place mostly in a number of face-to-face coaching sessions. However, under conditions of time pressure in IT projects, a physical presence of coaches could form a bottleneck. These facts led to the idea of using Internet technologies to support  the project coaching. The benefits of the web based...

Flash Remoting: The Definitive Guide
Flash Remoting: The Definitive Guide
Flash Remoting MX lets developers easily integrate rich Macromedia Flash content with applications that are built using ColdFusion, ASP.NET, Java, PHP, or SOAP-based web services. The result is complex client/server applications that more closely resemble desktop applications than traditional web pages. Build applications that connect to a...
Intelligent Sensor Design Using the Microchip dsPIC (Embedded Technology)
Intelligent Sensor Design Using the Microchip dsPIC (Embedded Technology)
In this book, readers will find:

In-depth design techniques, real-world examples, detailed figures and usable code

Application chapters thoroughly exploring temperature, pressure and load, and flow sensors

A FREE CD that provides a toolkit of software models in both C and assembly language

Intelligent
...
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy