Home | Amazing | Today | Tags | Publishers | Years | Search 
Pervasive Computing and Networking
Pervasive Computing and Networking

This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks

With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future,...

Handbook of Graph Theory (Discrete Mathematics and Its Applications)
Handbook of Graph Theory (Discrete Mathematics and Its Applications)

The Handbook of Graph Theory is the most comprehensive single-source guide to graph theory ever published. Best-selling authors Jonathan Gross and Jay Yellen assembled an outstanding team of experts to contribute overviews of more than 50 of the most significant topics in graph theory-including those related to algorithmic and optimization...

Obstructive Sleep Apnea : Obstructive Sleep Apnea: Diagnosis and Treatment (Sleep Disorders)
Obstructive Sleep Apnea : Obstructive Sleep Apnea: Diagnosis and Treatment (Sleep Disorders)
I often thought of this mantra during my on-call nights when, as a Stanford sleep medicine fellow, I was awakened from sleep by a technologist informing me that one of the clinic patients had repetitive obstructive apneas with significant oxygen desaturations. The technologist would typically ask, “can I start the patient on...
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
How do you use Windows PowerShell to navigate the filesystem, manage files and folders, or retrieve a web page? This introduction to the PowerShell language and scripting environment provides more than 400 task-oriented recipes to help you solve all kinds of problems. Intermediate to advanced system administrators will find more than 100...
Professional iOS Network Programming: Connecting the Enterprise to the iPhone and iPad
Professional iOS Network Programming: Connecting the Enterprise to the iPhone and iPad
AS IPHONES AND IPADS BECOME A UBIQUITOUS part of your personal and professional life, you become more and more dependent on their capability to seamlessly and fl awlessly interact with hosts across the Internet or with other phones across the room. This book provides a compilation of methods to accomplish this level of connectivity...
Patterns for Time-Triggered Embedded Systems: Building Reliable Applications with the 8051 Family of Microcontrollers (with CD-ROM)
Patterns for Time-Triggered Embedded Systems: Building Reliable Applications with the 8051 Family of Microcontrollers (with CD-ROM)
Embedded software is ubiquitous. It forms a core component of an enormous range of systems, from aircraft, passenger cars and medical equipment, to children’s toys, video recorders and microwave ovens. This book provides a complete and coherent set of software patterns to support the development of this type of application. ...
Models and Analysis for Distributed Systems (ISTE)
Models and Analysis for Distributed Systems (ISTE)
Verification and hence modeling are a mandatory but intricate problem for engineers developing embedded distributed real-time systems that are entrusted with critical safety applications like medical care, transportation, energy production, industrial processes, military operations. Therefore, while emerging 40 years ago, first for...
Pen-and-Paper User Interfaces: Integrating Printed and Digital Documents (Human-Computer Interaction Series)
Pen-and-Paper User Interfaces: Integrating Printed and Digital Documents (Human-Computer Interaction Series)

Even at the beginning of the 21st century, we are far from becoming paperless. Pen and paper is still the only truly ubiquitous information processing technology. Pen-and-paper user interfaces bridge the gap between paper and the digital world. Rather than replacing paper with electronic media, they seamlessly integrate both worlds in a...

Moving To The Cloud: Developing Apps in the New World of Cloud Computing
Moving To The Cloud: Developing Apps in the New World of Cloud Computing
Information is the most valuable resource in the 21st century. Whether for a consumer looking for a restaurant in San Francisco, a small business woman checking textile prices in Bangalore, or a financial services executive in London studying stock market trends, information at the moment of decision is key in providing the...
Pinning Control of Complex Networked Systems: Synchronization, Consensus and Flocking of Networked Systems via Pinning
Pinning Control of Complex Networked Systems: Synchronization, Consensus and Flocking of Networked Systems via Pinning

Synchronization, consensus and flocking are ubiquitous requirements in networked systems. Pinning Control of Complex Networked Systems investigates these requirements by using the pinning control strategy, which aims to control the whole dynamical network with huge numbers of nodes by imposing controllers for only a fraction of...

A Manager's Guide to IT Law
A Manager's Guide to IT Law
Since the 1940s, when the computer first made its appearance, there has been a tremendous change in both the power and the extent of IT technology. It has evolved from mainframes through personal computers with packaged applications and client–server architectures, to the explosion of networking in the 1990s which led to...
Handbook of Research on Information Security and Assurance
Handbook of Research on Information Security and Assurance

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy