Home | Amazing | Today | Tags | Publishers | Years | Search 
Networks for Grid Applications: Third International ICST Conference, GridNets 2009
Networks for Grid Applications: Third International ICST Conference, GridNets 2009

The GridNets conference is an annual international meeting that provides a focused and highly interactive forum where researchers and technologists have an opportunity to present and discuss leading research, developments, and future directions in grid networking. The goal of this event is to serve as both the premier conference...

Architecture-Based Design of Multi-Agent Systems
Architecture-Based Design of Multi-Agent Systems

One of the most important things an architect can do is reflection. That is, examine systems, organizations, people and ask “What alternatives were considered and why was that particular decision made?” Thinking about the response gives an architect insight into the motivations and decision processes that others have used...

Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

Digital Signal Processing with Field Programmable Gate Arrays (With CD-ROM)
Digital Signal Processing with Field Programmable Gate Arrays (With CD-ROM)

Field-Programmable Gate Arrays (FPGAs) are on the verge of revolutionizing digital signal processing. Novel FPGA families are replacing ASICs and PDSPs for front end digital signal processing algorithms more and more. The efficient implementation of these algorithms is the main goal of this book. It starts with an overview of today's FPGA...

Multiscale Modelling and Simulation (Lecture Notes in Computational Science and Engineering)
Multiscale Modelling and Simulation (Lecture Notes in Computational Science and Engineering)

These Lecture Series in Computational Science and Engineering include the proceedings of a Summer Program in Multi-Scale Modelling and Simulation held in Lugano, Switzerland, between August 4th and 30th, 2003. The workshop was organized by the ETHZ Computational Laboratory (CoLab) together with the Swiss Center for Scientific...

Big Java: Compatible with Java 5, 6 and 7
Big Java: Compatible with Java 5, 6 and 7

This book introduces programmers to objects at a gradual pace. The syntax boxes are revised to show typical code examples rather than abstract notation. This includes optional example modules using Alice and Greenfoot. The examples feature annotations with dos and don'ts along with cross references to more detailed explanations in the...

The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
Enterprise Information Systems: Concepts, Methodologies, Tools and Applications (3 Volumes)
Enterprise Information Systems: Concepts, Methodologies, Tools and Applications (3 Volumes)

The data collected by organizations is growing in volume and complexity. As such, businesses are abandoning traditional methods and relying more heavily on enterprise information systems to aid in the analysis and utilization of time-sensitive data and organizational knowledge. Enterprise information systems have gained in popularity...

Web-based Education: Concepts, Methodologies, Tools and Applications
Web-based Education: Concepts, Methodologies, Tools and Applications

In an age where online universities and distance learning courses exist side by side with traditional classroom learning, the development, design, use and challenges of creating web-based learning systems that promote learning in students, whether over a distance or within a university proper, is increasingly complex and often...

Digital Piracy (Cybersafety)
Digital Piracy (Cybersafety)

The Internet has had and will continue to have a profound effect on society. It is hard to imagine life without such technologies as computers, cell phones, gaming devices, and so on. The Internet, World Wide Web, and their associated technologies have altered our social and personal experience of the world. In no other time in...

Enterprise Content Management - A Business and Technical Guide
Enterprise Content Management - A Business and Technical Guide

Information is the lifeblood of knowledge, the flotsam of events and perspectives created in every second of history. There is so much to capture and yet so little time and so few resources to make sense of it all. Just as we get tantalisingly close, the holy grail of true knowledge slips further over the horizon.

To capture...

Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

Result Page: 1960 1959 1958 1957 1956 1955 1954 1953 1952 1951 1950 1949 1948 1947 1946 1945 1944 1943 1942 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy