Home | Amazing | Today | Tags | Publishers | Years | Search 
Active and Programmable Networks for Adaptive Architectures and Services
Active and Programmable Networks for Adaptive Architectures and Services
New applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,...
Telecom Crash Course
Telecom Crash Course

"An outstanding book for the novice that should be on the desk of every industry professional as well. Written in a style that is never boring, it covers the vast technological landscape from standards and protocols to premise, access and transport technologies, managing to entertain every step of the way."
Kenneth R. Sato

...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Frontiers of High Performance Computing and Networking  ISPA 2006 Workshops: ISPA 2006 International Workshops FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP
Frontiers of High Performance Computing and Networking ISPA 2006 Workshops: ISPA 2006 International Workshops FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP
This book constitutes the refereed joint proceedings of ten international workshops held in conjunction with the 4th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2006, held in Sorrento, Italy in December 2006 (see LNCS 4330).

The 116 revised full papers presented were carefully reviewed and selected from...

Artificial Intelligence in Theory and Practice: IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile
Artificial Intelligence in Theory and Practice: IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
CCNP BCMSN Portable Command Guide (Self-Study Guide)
CCNP BCMSN Portable Command Guide (Self-Study Guide)
All the BCMSN 642-812 commands in one compact, portable resource

Preparing for the CCNP® certification? Working as a network professional? Here are all the CCNP-level commands for the BCMSN exam you need in one condensed, portable resource. The CCNP BCMSN Portable Command Guide is filled with valuable, easy-to-access...

i-mode Strategy
i-mode Strategy

i-mode and Java join forces to open the door to global commerce

Since its introduction in February 1999 i-mode has become the world's largest wireless Internet service with more than 35 million subscribers and revenues of over ¥700 billion. Along with sharp increases in the number of users and the volume of revenues, the last 2...

Implementing Service Quality in IP Networks
Implementing Service Quality in IP Networks

Why implement service quality? Is it possible to ensure reliable service quality in multi-service IP networks? Which technologies help in making end-to-end quality of service a realistic business proposition?

In Implementing Service Quality in IP Networks, Vilho Räisänen answers these questions and more. The author...

Understanding Broadband over Power Line
Understanding Broadband over Power Line
Understanding Broadband over Power Line explores all aspects of the emerging technology that enables electric utilities to provide support for high-speed data communications via their power infrastructure. This book examines the two methods used to connect consumers and businesses to the Internet through the utility infrastructure: the existing...
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
Continued advances in information technologies are enabling a growing number of physical devices to be imbued with computingand communications capabilities. Aircraft, cars, household appliances, cellular telephones, and health monitoring devices all contain microprocessors that are being linked with other information processing devices. Such...
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Professional Practice in Artificial Intelligence: IFIP 19th World Computer Congress, TC-12: Professional Practice Stream, August 21-24, 2006
Professional Practice in Artificial Intelligence: IFIP 19th World Computer Congress, TC-12: Professional Practice Stream, August 21-24, 2006
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy