Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless Networking Based Control
Wireless Networking Based Control

This book will have a broad appeal in the area of Wireless Networking-Based Control. Various engineering disciplines, control and communication science organizations will be interested in purchasing the book with a new, emerging, and important theme. Also, industry such as Honeywell and those (e.g. power industry, automotive industry,...

Supporting Real Time Decision-Making: The Role of Context in Decision Support on the Move
Supporting Real Time Decision-Making: The Role of Context in Decision Support on the Move

This volume of Annals of Information Systems will acknowledge the twentieth anniversary of the founding of the International Society for Decision Support Systems (ISDSS) by documenting some of the current best practices in teaching and research and envisioning the next twenty years in the decision support systems field. The volume is intended...

Practical Studies in E-Government: Best Practices from Around the World
Practical Studies in E-Government: Best Practices from Around the World

Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights...

Cloud Connectivity and Embedded Sensory Systems
Cloud Connectivity and Embedded Sensory Systems

Sensor networks are meant to create awareness in space and time. They may be measuring the presence of an object or a condition, characterizing an object stream or a situational pattern, or even detect abnormalities that are to occur. This book provides new theory on the design of wireless sensor networks, based on concepts developed for...

Reconfigurable Field Programmable Gate Arrays for Mission-Critical Applications
Reconfigurable Field Programmable Gate Arrays for Mission-Critical Applications

Embedded systems applications that are either mission or safety-critical usually entail low- to mid- production volumes, require the rapid development of specific tasks, which are typically computing intensive, and are cost bounded. The adoption of re-configurable FPGAs in such application domains is constrained to the availability of...

Tile-Based Geospatial Information Systems: Principles and Practices
Tile-Based Geospatial Information Systems: Principles and Practices

Tile-based online mapping systems have replaced traditional Web GIS systems, because of their improved speed and usability. The trend towards tile-base systems was started by Internet services companies, such as Google, Yahoo, and Microsoft. They have been followed by the traditional GIS community, government organizations and open source...

Linking Enterprise Data
Linking Enterprise Data

Enterprise data is growing at a much faster rate than traditional technologies allow. New enterprise architectures combining existing technologies are desperately needed. This book suggests a way forward by applying new techniques of the World Wide Web to enterprise information systems.

Linking Enterprise Data is an edited volume...

Handbook of Natural Language Processing and Machine Translation: DARPA Global Autonomous Language Exploitation
Handbook of Natural Language Processing and Machine Translation: DARPA Global Autonomous Language Exploitation

This comprehensive handbook, written by leading experts in the field, details the groundbreaking research conducted under the breakthrough GALE program--The Global Autonomous Language Exploitation within the Defense Advanced Research Projects Agency (DARPA), while placing it in the context of previous research in the fields of natural...

Handbook of Open Source Tools
Handbook of Open Source Tools

The constant and speedy progress made by humankind in the industrial revolution, and more recently in the information technology era can be directly attributed to sharing of knowledge between various disciplines, reuse of the knowledge as science and technology advanced, and inclusion of this knowledge in the curriculum. The phrases...

Quantum Attacks on Public-Key Cryptosystems
Quantum Attacks on Public-Key Cryptosystems

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no...

Web Mining and Social Networking: Techniques and Applications
Web Mining and Social Networking: Techniques and Applications

This book examines the techniques and applications involved in the Web Mining, Web Personalization and Recommendation and Web Community Analysis domains, including a detailed presentation of the principles, developed algorithms, and systems of the research in these areas. The applications of web mining, and the issue of how to incorporate web...

Inductive Databases and Constraint-Based Data Mining
Inductive Databases and Constraint-Based Data Mining

This book is about inductive databases and constraint-based data mining, emerging research topics lying at the intersection of data mining and database research. The aim of the book as to provide an overview of the state-of- the art in this novel and exciting research area. Of special interest are the recent methods for constraint-based...

Result Page: Previous 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy