Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Stochastic Modeling and Analysis of Telecoms Networks
Stochastic Modeling and Analysis of Telecoms Networks

This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
The authors propose a
...

Relational and Algebraic Methods in Computer Science: 13th International Conference, RAMiCS 2012, Cambridge, United Kingdom, September 17-21, 2012, Proceedings (Lecture Notes in Computer Science)
Relational and Algebraic Methods in Computer Science: 13th International Conference, RAMiCS 2012, Cambridge, United Kingdom, September 17-21, 2012, Proceedings (Lecture Notes in Computer Science)

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Relational and Algebraic Methods in Computer Science, RAMiCS 13, held in Cambridge, UK, in September 2012. The 23 revised full papers presented were carefully selected from 39 submissions in the general area of relational and...

Encyclopedia of Electronic Components Volume 1: Resistors, Capacitors, Inductors, Switches, Encoders, Relays, Transistors
Encyclopedia of Electronic Components Volume 1: Resistors, Capacitors, Inductors, Switches, Encoders, Relays, Transistors

Want to know how to use an electronic component? This first book of a three-volume set includes key information on electronics parts for your projects—complete with photographs, schematics, and diagrams. You’ll learn what each one does, how it works, why it’s useful, and what variants exist. No matter how much you...

The Packaging Designer's Book of Patterns
The Packaging Designer's Book of Patterns

For more than two decades, The Packaging Designer's Book of Patterns has served as an indispensable source of ideas and practical solutions for a wide range of packaging design challenges.

This Fourth Edition offers more than 600 patterns and structural designs—more than any other book—all drawn to...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The Emotion Thesaurus: A Writer's Guide To Character Expression
The Emotion Thesaurus: A Writer's Guide To Character Expression
One of the biggest problem areas for writers is conveying a character's emotions to the reader in a unique, compelling way. This book comes to the rescue by highlighting 75 emotions and listing the possible body language cues, thoughts, and visceral responses for each. Using its easy-to-navigate list format, readers can draw inspiration from...
Drupal 7 Multilingual Sites
Drupal 7 Multilingual Sites
Recent estimates show at least 1.5 million websites run on Drupal, which calculates to roughly two percent of all sites. Drupal is used to create personal, business, government, and educational websites including high-profile ones such as whitehouse.gov, duke.edu, and economist.com. Drupal adoption is following a very positive...
Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis

As a programmer working for Logica UK in London in the mid-1980’s, I became a passionate advocate of formal methods. Extrapolating from small successes with VDM and JSP, I was sure that widespread use of formal methods would bring an end to the software crisis.

One approach especially intrigued me. John Guttag and Jim
...

Email Security with Cisco IronPort (Networking Technology: Security)
Email Security with Cisco IronPort (Networking Technology: Security)

The Cisco IronPort Email Security Appliances (ESA) have been deployed in thousands of networks to accept, filter, and deliver email messages. The ESA is easy to deploy and its security-filtering settings are effective right out of the box. However, many organizations are looking for more from their messaging environment...

Social Semantics: The Search for Meaning on the Web (Semantic Web and Beyond)
Social Semantics: The Search for Meaning on the Web (Semantic Web and Beyond)

Social Semantics: The Search for Meaning on the Web provides a unique introduction to identity and reference theories of the World Wide Web, through the academic lens of philosophy of language and data-driven statistical models. The Semantic Web is a natural evolution of the Web, and this book covers the URL-based Web architecture...

Multiple Sclerosis Rehabilitation: From Impairment to Participation (Rehabilitation Science in Practice Series)
Multiple Sclerosis Rehabilitation: From Impairment to Participation (Rehabilitation Science in Practice Series)

"MS is always in the back of your mind. If there is something you want to do, you always wonder if the MS will allow you do to it."
—Darlene, living with MS for 22 years

Living with multiple sclerosis (MS) is challenging and multidimensional. MS pervades all aspects of life: one’s body becomes...

Getting Started with Meteor.js JavaScript Framework
Getting Started with Meteor.js JavaScript Framework

Creating the most modern, dynamic, multi-user web applications quickly and easily is exactly what Meteor was designed for – and it’s all done in JavaScript. In this tutorial is everything you need to know to get started.

Overview

  • Create dynamic, multi-user web applications completely in...
unlimited object storage image
Result Page: Previous 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy