Home | Amazing | Today | Tags | Publishers | Years | Search 
ALGORITHMS FOR LINEAR-QUADRATIC OPTIMIZATION
ALGORITHMS FOR LINEAR-QUADRATIC OPTIMIZATION

Linear-quadratic optimization is one of the most exciting topics in the con trol engineering literature of recent decades. The interest in linear optimal dynamical systems, and especially in those with quadratic cost functional, can be explained by both the richness of properties these systems possess, and the pragmatic value and physical...

HTML5 Geolocation
HTML5 Geolocation

This book explores the W3C Geolocation API, a specification that provides scripted access to geographical location information associated with a hosted device.* This API defines objects that can be used in JavaScript to ascertain the position of the device on which the code is executed.

Truly revolutionary: now...

Mathematical Structures for Computer Science: A Modern Treatment of Discrete Mathematics
Mathematical Structures for Computer Science: A Modern Treatment of Discrete Mathematics

The important role that discrete structures plays in computer science is gaining recognition. Computing Curricula 2001 (CC2001), the latest curriculum recommendation for computer- related education, was a joint undertaking of the Institute for Electrical and Electronic Engineers/Computer Society (IEEE/CS) and the Association for...

Microsoft SharePoint 2010 Administration: Real World Skills for MCITP Certification and Beyond (Exam 70-668)
Microsoft SharePoint 2010 Administration: Real World Skills for MCITP Certification and Beyond (Exam 70-668)

SharePoint 2010 is a complex product, and a diverse skill set is required to administer it. You have to be part database administrator (DBA), part web developer, part network administrator, and part server administrator to fully wrap your mind around this product. This book was written to help you do just that.

...
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Electric Power Transformer Engineering, Second Edition
Electric Power Transformer Engineering, Second Edition

It is appropriate that I first acknowledge my appreciation to Professor Leo Grigsby for inviting me to prepare the chapter on power transformers for the first edition (2001) of his now very popular Electric Power Engineering Handbook. From this evolved the recognition that two chapters from the 2001 Handbook, those for (1) substations...

Microsoft Project 2010 Inside Out
Microsoft Project 2010 Inside Out

Welcome to Microsoft Project 2010 Inside Out. This book is your comprehensive Project 2010 reference, in which you can learn not only the essentials, but also the intermediate topics and advanced techniques for using Project 2010 like a power user.

Conquer Microsoft Project 2010—from the inside out!

...

Air Pollution Science for the 21st Century, Volume 1 (Developments in Environmental Science)
Air Pollution Science for the 21st Century, Volume 1 (Developments in Environmental Science)

Acid rain, ozone photochemistry, long-range transport of pollutants, greenhouse gas emissions and aerosols dominated tropospheric air pollution research in the last 30 years of the 20^^ century. At the start of the 2V^ century, acid rain is subject to planned improvement in Europe and North America, but is a growing problem in Asia....

Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment
Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment

The Millennium Ecosystem Assessment (MA) was carried out between 2001 and 2005 to assess the consequences of ecosystem change for human well-being and to establish the basis for actions needed to enhance the conservation and sustainable use of ecosystems and their contributions to human well-being. The MA was originally conceived as a...

Current Practice in Environmental Reporting: The Chemicals Industry
Current Practice in Environmental Reporting: The Chemicals Industry

Environmental reporting is still in its infancy, having emerged only in the latter part of the 1980s. Companies are under increasing pressure to be transparent and accountable in the whole spectrum of their business. In recent years, a number of companies have seen the need to introduce environmental reporting, placing environmental...

Business Process Management Workshops: BPM 2010 International Workshops and Education Track
Business Process Management Workshops: BPM 2010 International Workshops and Education Track

Business process management (BPM) is an established research domain for computer science, information systems, and management scholars. The record number and wide scope of submissions to the eighth installation of the International Conference on Business Process Management was an indication of the vibrancy of the area and the varied...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Result Page: 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 793 792 791 790 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy