Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Signal Processing (4th Edition)
Digital Signal Processing (4th Edition)

A significant revision of a best-selling text for the introductory digital signal processing course. This book presents the fundamentals of discrete-time signals, systems, and modern digital processing and applications for students in electrical engineering, computer engineering, and computer science.The book is suitable...

Biophotonics: Optical Science and Engineering for the 21st Century
Biophotonics: Optical Science and Engineering for the 21st Century

It is now well established that all living systems emit a weak but permanent photon flux in the visible and ultraviolet range. This biophoton emission is correlated with many, if not all, biological and physiological functions. There are indications of a hitherto-overlooked information channel within the living system. Biophotons may trigger...

Demystifying Switched Capacitor Circuits (v. 1)
Demystifying Switched Capacitor Circuits (v. 1)

This book helps engineers to grasp fundamental theories and design principles by presenting physical and intuitive explanations of switched-capacitor circuits. Numerous circuit examples are discussed and the author emphasizes the most important and fundamental principles involved in implementing state-of-the-art switched-capacitor circuits...

Vascular Surgery: Cases, Questions and Commentaries
Vascular Surgery: Cases, Questions and Commentaries

Vascular Surgery: Cases, Questions and Commentaries second edition is a unique collection of real life case histories written by experts to highlight the diversity of problems encountered in vascular surgery.

Each case scenario is interspersed with questions that aim to engage the readers to the management of the patient...

Escape From Excel Hell: Fixing Problems in Excel 2003, 2002 and 2000 (Mr. Spreadsheet's Bookshelf)
Escape From Excel Hell: Fixing Problems in Excel 2003, 2002 and 2000 (Mr. Spreadsheet's Bookshelf)
When Excel talks back to you, here's what to do

You try to open a spreadsheet and Excel won't let you, because there's a macro involved. You cannot convince the software that the macro is safe. You hurl something across the room.

Grab this book instead! You'll find more than 200 fixes for things...

Essential Windows Workflow Foundation (Microsoft .NET Development Series)
Essential Windows Workflow Foundation (Microsoft .NET Development Series)

Windows Workflow Foundation (WF) is a groundbreaking approach to writing and executing programs. WF programs are assembled out of resumable program statements called activities, which provide encapsulation of both domainspecific logic and control flow patterns reflective of real-world...

Java(TM) EE 5 Tutorial, The (3rd Edition) (The Java Series)
Java(TM) EE 5 Tutorial, The (3rd Edition) (The Java Series)

The Java™ EE 5 Tutorial, Third Edition, is the definitive, task-oriented, example-driven guide to programming server-side applications with Sun Microsystems' new Java(TM) EE 5 platform. Written by members of Sun's Java EE 5 platform team, this book enables new and intermediate Java programmers to build...

Professional Web 2.0 Programming (Wrox Professional Guides)
Professional Web 2.0 Programming (Wrox Professional Guides)
Web 2.0 architecture opens up an incredible number of options for flexible web design, creative reuse, and easier updates. Along with covering the key languages and techniques of Web 2.0, this unique book introduces you to all of the technologies that make up Web 2.0 at a professional level. Throughout the chapters, you'll find code for several...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Robust Statistics: Theory and Methods (Probability and Statistics)
Robust Statistics: Theory and Methods (Probability and Statistics)
Classical statistical techniques fail to cope well with deviations from a standard distribution. Robust statistical methods take into account these deviations while estimating the parameters of parametric models, thus increasing the accuracy of the inference. Research into robust methods is flourishing, with new methods being developed and...
Professional Practice in Artificial Intelligence: IFIP 19th World Computer Congress, TC-12: Professional Practice Stream, August 21-24, 2006
Professional Practice in Artificial Intelligence: IFIP 19th World Computer Congress, TC-12: Professional Practice Stream, August 21-24, 2006
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
Voice Over IPv6: Architectures for Next Generation VoIP Networks
Voice Over IPv6: Architectures for Next Generation VoIP Networks
IPv6 (Internet Protocol version 6) is the future of Internet telephony. And this book is your guide to that future.

IPv6 is the replacement for the currently used IPv4 (Internet Protocol version 4). IPv6 will offer increased IP addresses (full 128-bit addresses, compared to the 32-bit addresses of IPv4), enhanced security, and greater
...
unlimited object storage image
Result Page: Previous 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy