|
|
| | | | Combinatorial Image Analysis: 12th International Workshop, IWCIA 2008, Buffalo, NY, USA, April 7-9, 2008, ProceedingsThis volume constitutes the refereed proceedings of the 12th International Workshop on Combinatorial Image Analysis, IWCIA 2008, held in Buffalo, NY, USA, in April 2008.
The 28 revised full papers and 10 revised poster papers presented were carefully reviewed and selected from 117 initial submissions. The papers are organized in topical... |
|
Ajax in Oracle JDeveloperAsynchronous JavaScript and XML (Ajax) is a web technique used to transfer data between a browser and server asynchronously without posting the web page to the server.
"Asynchronously" implies that the processing of the web page continues while the Ajax request is sent to the server and a response is received from the server.... | | RFID in ManufacturingInformation systems for manufacturing often follow a three-layer architecture based on an enterprise resource planning (ERP) layer (for order planning), a manufacturing execution system (MES) layer (for factory control), and a shop floor layer (for machine control). Future requirements on flexibility and adaptability require a much closer... | | Google Maps Mashups with Google Mapplets (Firstpress)Have a Google Maps mashup that you’d like to expose to millions of users on maps.google.com? New to the mapping craze, but have an idea for a killer map–based application? Want to learn how to create GeoRSS and KML feeds with your geotagged content, exposing your customer to new ways of exploring and navigating your content?... |
|
| | Platform Interference in Wireless Systems: Models, Measurement, and MitigationIntra-system EMC problems are becoming increasingly common in mobile devices, ranging from notebook PCs to cell phones, with RF/wireless capbilities. These issues range from minor annoyances to serious glitches which impede the functioning of the device. This book gives a thourough review of electromagnetic theory (including Maxwell's equations),... | | |
|
Trust and Security in Collaborative Computing (Computer and Network Security)Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group... | | PC World, April 2008: 50 Best Software SecretsIncrease the muscularity of your PC's browser, productivity apps and multimedia programs with these 50 plus finds; The Best Bargain PCs: Bargain desktops and laptops put to the test; The Right Social Network for You: 17 social networks that promote friendships, career growth and shared interest; Reviews and Rankings: 50 and 52-Inch HDTVs : Tested... | | Nonlinear Optics, Third EditionNonlinear optics is the study of the interaction of intense laser light with matter. The third edition of this textbook has been rewritten to conform to the standard SI system of units and includes comprehensively updated material on the latest developments in the field.
The book presents an introduction to the entire field of optical... |
|
Result Page: Previous 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 Next |