Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Driven e-Science: Use Cases and Successful Applications of Distributed Computing Infrastructures (ISGC 2010)
Data Driven e-Science: Use Cases and Successful Applications of Distributed Computing Infrastructures (ISGC 2010)

ISGC 2010, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan, March, 2010. The 2010 symposium brought together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and to discuss new topics in the field of Grid Computing.

Data Driven e-Science: Use...

Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)
Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)

With the fall of France in 1940, Germany suddenly had the opportunity to strike at poorly guarded Allied convoys. The Luftwaffe pressed into service the Fw-200 Condor, a plane that had originally been designed as a civilian airliner and the first plane to fly non-stop from Berlin to New York in 1938. After various modifications, the Fw-200...

Error Control Coding
Error Control Coding

A reorganized and comprehensive major revision of a classic book, this edition provides a bridge between introductory digital communications and more advanced treatment of information theory. Completely updated to cover the latest developments, it presents state-of-the-art error control techniques. Coverage of the fundamentals of coding and...

Numerical Solution of Partial Differential Equations on Parallel Computers
Numerical Solution of Partial Differential Equations on Parallel Computers

Since the dawn of computing, the quest for a better understanding of Nature has been a driving force for technological development. Groundbreaking achievements by great scientists have paved the way from the abacus to the supercomputing power of today. When trying to replicate Nature in the computer’s silicon test tube, there is need...

Writing Machines (Mediaworks Pamphlets)
Writing Machines (Mediaworks Pamphlets)

Tracing a journey from the 1950s through the 1990s, N. Katherine Hayles uses the autobiographical persona of Kaye to explore how literature has transformed itself from inscriptions rendered as the flat durable marks of print to the dynamic images of CRT screens, from verbal texts to the diverse sensory modalities of multimedia works, from...

C# Programming Language (Covering C# 4.0), The (4th Edition)
C# Programming Language (Covering C# 4.0), The (4th Edition)

The popular C# programming language combines the high productivity of rapid application development languages with the raw power of C and C++. Updated to cover the new features of C# 4.0, including dynamic binding, named and optional parameters, and covariant and contravariant generic types, this release takes the language...

Digital Forensics: Digital Evidence in Criminal Investigations
Digital Forensics: Digital Evidence in Criminal Investigations

The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements “traditional” scientific...

Parameterized and Exact Computation: 5th International Symposium
Parameterized and Exact Computation: 5th International Symposium

The International Symposium on Parameterized and Exact Computation (IPEC, formerly IWPEC) is an international symposium series that covers research in all aspects of parameterized and exact algorithms and complexity. Started in 2004 as a biennial workshop, it became an annual event from 2008.

The four previous meetings of the...

Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

A senior database manager at one of the world’s largest banks once told me that the best way to secure Oracle is to unplug it from the wall…and he is probably right. In fact, this holds true for nearly every networked application. Unfortunately, for many of us turning off the database is not an option; we must find another way to...

CCENT Certification All-In-One For Dummies
CCENT Certification All-In-One For Dummies

Get ready for Cisco's entry-level networking certification CCENT exam 640-822

If you're preparing for Cisco certification, your road starts with CCENT Exam 640-822 ICND1. This volume covers everything you need to know! You'll learn networking basics and how to work with Cisco devices, routers, switches, and more. With...

Virtual Team Success: A Practical Guide for Working and Leading from a Distance
Virtual Team Success: A Practical Guide for Working and Leading from a Distance

‘‘If there is an office in the future,’’ wrote Charles Handy in a 1995 Harvard Business Review article2 on virtual work, ‘‘it will be more like a clubhouse: a place for meeting, eating, and greeting, with rooms reserved for activities, not for particular people.’’ Admittedly, most organizations...

Fuzzy Control Systems Design and Analysis: A Linear Matrix Inequality Approach
Fuzzy Control Systems Design and Analysis: A Linear Matrix Inequality Approach

A comprehensive treatment of model-based fuzzy control systems

This volume offers full coverage of the systematic framework for the stability and design of nonlinear fuzzy control systems. Building on the Takagi-Sugeno fuzzy model, authors Tanaka and Wang address a number of important issues in fuzzy control systems, including...

Result Page: 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy