Home | Amazing | Today | Tags | Publishers | Years | Search 
Embedded Robotics: Mobile Robot Design and Applications with Embedded Systems
Embedded Robotics: Mobile Robot Design and Applications with Embedded Systems

This book presents a unique combination of mobile robots and embedded systems, from introductory to intermediate level. It is structured in three parts, dealing with embedded systems (hardware and software design, actuators, sensors, PID control, multitasking), mobile robot design (driving, balancing, walking, and flying robots), and mobile...

Model-Driven Design Using Business Patterns
Model-Driven Design Using Business Patterns

Business applications are designed using profound knowledge about the business domain, such as domain objects, fundamental domain-related principles, and domain patterns. Nonetheless, the pattern community's ideas for software engineering have not impacted at the application level, they are still mostly used for technical problems.

This...

Context-Aware Pervasive Systems: Architectures for a New Breed of Applications
Context-Aware Pervasive Systems: Architectures for a New Breed of Applications

The concept of aware systems is one of the most exciting trends in computing today, fueled by recent developments in pervasive computing. This book introduces a new breed of computer applications that are termed "context-aware pervasive systems" and provides architectural blueprints for building context-aware behavior into...

Web And Information Security
Web And Information Security
Recent developments in information systems technologies have resulted in computerizing many applications in various business areas. Data have become a critical resource in many organizations; therefore, efficient access to data, sharing data, extracting information from data, and making use of information has become an urgent need. As a result,...
Parallel Evolutionary Computations (Studies in Computational Intelligence)
Parallel Evolutionary Computations (Studies in Computational Intelligence)
"Parallel Evolutionary Computation" focuses on the aspects related to the parallelization of evolutionary computations, such as parallel genetic operators, parallel fitness evaluation, distributed genetic algorithms, and parallel hardware implementations, as well as on their impact on several applications.The book is divided into four...
From P2P to Web Services and Grids: Peers in a Client/Server World
From P2P to Web Services and Grids: Peers in a Client/Server World

"From P2P to Web Services and Grids" provides a comprehensive overview of emerging distributed-systems technologies. It covers peer-to-peer (P2P) systems, which have revolutionized the way we think about distributed computing and the internet, alternative solutions, most notably web services and Grid computing, but...

Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language...
The Complete FreeBSD, Fourth Edition
The Complete FreeBSD, Fourth Edition

FreeBSD is by far the most popular version of BSDВ®, the legendary operating system that has contributed a great deal to every version of UnixВ® in use today (including Mac OSВ® X). Originally a community effort by the University of California at Berkeley, FreeBSD was aimed at making Unix a little friendlier and easier to...

Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
Support Vector Machines for Pattern Classification (Advances in Pattern Recognition)
Support Vector Machines for Pattern Classification (Advances in Pattern Recognition)

Support vector machines (SVMs), were originally formulated for two-class classification problems, and have been accepted as a powerful tool for developing pattern classification and function approximations systems. This book provides a unique perspective of the state of the art in SVMs by taking the only approach that focuses on classification...

Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

First Course on Fuzzy Theory and Applications (Advances in Soft Computing)
First Course on Fuzzy Theory and Applications (Advances in Soft Computing)

This basic textbook gives an easily accessible introduction to fuzzy theory and its applications. It provides basic and concrete concepts of the field in a self-contained, condensed and understandable style. This First Course on Fuzzy Theory and Applications includes numerous examples, descriptive illustrations and figures of the basic concepts,...

Result Page: 613 612 611 610 609 608 607 606 605 604 603 602 601 600 599 598 597 596 595 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy