Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Broadband Internet Deployment in Japan (Advanced Information Technology)
Broadband Internet Deployment in Japan (Advanced Information Technology)
Japan is well-known as the country where the penetration ratio of the intelligent cellular phone system is large. In 2007, it was reported that in the cellular phone system in Japan, the total volume of data traffic became larger than that of voice traffic. Now, the telecommunication infrastructure is going to be converged with broadcasting...
Multimedia Interaction and Intelligent User Interfaces: Principles, Methods and Applications
Multimedia Interaction and Intelligent User Interfaces: Principles, Methods and Applications

Consumer electronics (CE) devices, providing multimedia entertainment and enabling communication, have become ubiquitous in daily life. However, consumer interaction with such equipment currently requires the use of devices such as remote controls and keyboards, which are often inconvenient, ambiguous and non-interactive. An important...

Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
Inhabited Information Spaces: Living with your Data
Inhabited Information Spaces: Living with your Data
In this book you will find some examples of work in particular from the Inhabited Information Spaces Grouping. It is interesting to see how some of these ideas are still “futuristic” and others have started to become part of mainstream thinking and made their way into products.

Some people say that you can find
...
Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

Middleware for Network Eccentric and Mobile Applications
Middleware for Network Eccentric and Mobile Applications
Middleware is a critical foundation needed to leverage the development of a wide range of mobile and ubiquitous applications. Intrinsic challenges when building such middleware require the combination of expertise from areas like distributed systems, networking, software engineering, and application development.

This textbook provides a...

Ways of Thinking, Ways of Seeing: Mathematical and other Modelling in Engineering and Technology (Automation, Collaboration, & E-Services)
Ways of Thinking, Ways of Seeing: Mathematical and other Modelling in Engineering and Technology (Automation, Collaboration, & E-Services)

This fascinating book examines some of the characteristics of technological/engineering models that are likely to be unfamiliar to those who are interested primarily in the history and philosophy of science and mathematics, and which differentiate technological models from scientific and mathematical ones. Themes that are highlighted...

Media in the Ubiquitous Era: Ambient, Social and Gaming Media (Premier Reference Source)
Media in the Ubiquitous Era: Ambient, Social and Gaming Media (Premier Reference Source)

Media in the ubiquitous area is undergoing a tremendous change. Social media and Web 2.0 are applied in ever more diverse practices both in private and public communities and digital games and play are currently undergoing many transformations. Traditional communication and expression modalities are challenged and totally new practices are...

Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective
Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective

The ubiquitous nature of the Internet is dramatically revolutionizing the manner in which organizations and individuals share information. Developed out of necessity during the cold war, the Internet was created as a means to help governmental institutions and collegiate institutions send documents and research materials electronically...

Pen-and-Paper User Interfaces: Integrating Printed and Digital Documents (Human-Computer Interaction Series)
Pen-and-Paper User Interfaces: Integrating Printed and Digital Documents (Human-Computer Interaction Series)

Even at the beginning of the 21st century, we are far from becoming paperless. Pen and paper is still the only truly ubiquitous information processing technology. Pen-and-paper user interfaces bridge the gap between paper and the digital world. Rather than replacing paper with electronic media, they seamlessly integrate both worlds in a...

Designing the Internet of Things
Designing the Internet of Things

Take your idea from concept to production with this unique guide

Whether it's called physical computing, ubiquitous computing, or the Internet of Things, it's a hot topic in technology: how to channel your inner Steve Jobs and successfully combine hardware, embedded software, web services, electronics, and cool...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy