|
|
Design Reliability: Fundamentals and ApplicationsAs engineering systems become more and more complex, industry has recognized the importance of system and product reliability and places ever increasing emphasis on it during the design phase. Despite its efforts, however, industry continues to lose billions of dollars each year because of unexpected system failures. Therefore, it becomes... | | Adversarial Reasoning: Computational Approaches to Reading the Opponent's MindThe rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning:... | | |
|
The Communications Handbook, Second Edition (Electrical Engineering Handbook)For more than six years, The Communications Handbook stood as the definitive, one-stop reference for the entire field. With new chapters and extensive revisions that reflect recent technological advances, the second edition is now poised to take its place on the desks of engineers, researchers, and students around the world. From fundamental... | | Automated Data Analysis Using ExcelBecause the analysis of copious amounts of data and the preparation of custom reports often take away time from true research, the automation of these processes is paramount to ensure productivity. Exploring the core areas of automation, report generation, data acquisition, and data analysis, Automated Data Analysis Using Excel illustrates how to... | | |
|
Disruptive Security Technologies with Mobile Code and Peer-to-Peer NetworksThe traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities... | | Computer Network Time Synchronization: The Network Time ProtocolThis book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling... | | Scalable and Secure Internet Services and ArchitectureScalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid... |
|
Multimedia Systems, Standards, and Networks"Describes ITU H H.323 and H.324, H.263, ITU-T video, and MPEG-4 standards, systems, and coding; IP and ATM networks; multimedia search and retrieval; image retrieval in digital laboratories; and the status and direction of MPEG-7."
We humans, being social creatures, have historically felt the need for increasingly sophisticated means... | | | | The MAPLE BookMaple is a very powerful computer algebra system used by students, educators, mathematicians, statisticians, scientists, and engineers for doing numerical and symbolic computations. Greatly expanded and updated from the author's MAPLE V Primer, The MAPLE Book offers extensive coverage of the latest version of this outstanding software package,... |
|
Result Page: 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 |