Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
EDGE for Mobile Internet
EDGE for Mobile Internet
This ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become...
Digital Image Processing (2nd Edition)
Digital Image Processing (2nd Edition)
Interest in digital image processing methods stems from two principal application
areas: improvement of pictorial information for human interpretation; and
processing of image data for storage, transmission, and representation for autonomous
machine perception.This chapter has several objectives: (1) to define
the scope of the
...
Ajax and REST Recipes: A Problem-Solution Approach
Ajax and REST Recipes: A Problem-Solution Approach

Ajax and REST Recipes: A Problem-Solution Approach will serve all of your Ajax needs, by providing adaptable solutions for common tasks you'll want to implement on web sites using the next generation of Ajax and REST techniques. As a JavaScript developer, your time is precious, so you'll want to solve problems that present themselves in...

Software Reflected: The Socially Responsible Programming of Our Computers
Software Reflected: The Socially Responsible Programming of Our Computers
In 2480 B.C. a development occurred which was to have a tremendous impact on Mocsian society. A small group of civil engineerine teachers at the most advanced institution worked out a new techniLlue for designing a building. Key elements of this technique were several new structural geometries and the application of a newly developed mathematical...
Data Mining Using SAS Enterprise Miner (Wiley Series in Computational Statistics)
Data Mining Using SAS Enterprise Miner (Wiley Series in Computational Statistics)
Data Mining Using SAS Enterprise Miner introduces the readers to data mining using SAS Enterprise Miner v4. This book will reveal the power and ease of use of the powerful new module in SAS that will introduce the readers to the various configuration settings and subsequent results that are generated from the various nodes in Enterprise Miner that...
Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Human Accomplishment: The Pursuit of Excellence in the Arts and Sciences, 800 B.C. to 1950
Human Accomplishment: The Pursuit of Excellence in the Arts and Sciences, 800 B.C. to 1950
A sweeping cultural survey reminiscent of Barzun's From Dawn to Decadence.

"At irregular times and in scattered settings, human beings have achieved great things. Human Accomplishment is about those great things, falling in the domains known as the arts and sciences, and the people who did them.'

So begins...

Remote Sensing: The Image Chain Approach
Remote Sensing: The Image Chain Approach
Remote Sensing deals with the fundamental ideas underlying the rapidly growing field of remote sensing. John Schott explores energy-matter interaction, radiation propagation, data dissemination, and described the tools and procedures required to extract information from remotely sensed data using the image chain approach. Organizations and...
Dreaming About the Divine (S U N Y Series in Dream Studies)
Dreaming About the Divine (S U N Y Series in Dream Studies)
Explores the role of dreams in spiritual work.

In Dreaming about the Divine, Bonnelle Lewis Strickling argues that people dream about the divine in forms that fit their current emotional and spiritual condition. Using Jungian psychology and the philosophy of Karl Jaspers, Strickling contends that dreams
...
Beginning C# 2008: From Novice to Professional, Second Edition
Beginning C# 2008: From Novice to Professional, Second Edition
This book is for anyone who wants to write good C# code—even if you have never programmed before. Writing good code can be a challenge—there are so many options, especially in a .NET language like C#. If you want to really get the best from a programming language, you need to know which features work best in which situations and...
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
No two data quality projects are the same. Some are large efforts focused entirely on improving some quality aspect of information. Others are subprojects within other efforts, such as a data migration. Still others are led by a few individuals trying to make a difference as they perform their everyday activities. What I like about McGilvray's Ten...
Decomposition Methodology For Knowledge Discovery And Data Mining: Theory And Applications
Decomposition Methodology For Knowledge Discovery And Data Mining: Theory And Applications
The book presents an interesting and pleasant introduction to the topic, which can guide the reader to the knowledge of the existing decomposition methods, and to the choice of those most promising for the problems he has to face. -- Zentralblatt MATH

Data Mining is the science and technology of exploring data in
...
unlimited object storage image
Result Page: 874 873 872 871 870 869 868 867 866 865 864 863 862 861 860 859 858 857 856 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy