Electronic Books

Total Books: 61 - 80 /175
Expert Network Time Protocol

Have you ever tried to figure out why your computer clock is off, or why your emails somehow have the wrong timestamp? Most ...

Lee mas
Field-Based Coordination for Pervasive Multiagent Systems

Software systems involve autonomous and distributed software components that have to execute and interact in open and dynamic ...

Lee mas
Fine- and Coarse-Grain Reconfigurable Computing

The FPGA technology is defined, which includes architecture, logic block structure, interconnect, and configuration methods ...

Lee mas
Free Surface Flows under Compensated Gravity Conditions

Considers the behavior of fluids in a low-gravity environment with special emphasis on application in PMD (propellant management ...

Lee mas
From Model-Driven Design to Resource Management for Distributed Embedded Systems

From Model-Driven Design to Resource Management for Distributed Embedded Systems contains 16 original contributions as well ...

Lee mas
Fundamental Approaches to Software Engineering

This book contains the proceedings of FASE 2018, the 21th International Conference on Fundamental Approaches to Software ...

Lee mas
Geometric and Topological Methods for Quantum Field Theory

This volume offers an introduction, in the form of four extensive lectures, to some recent developments in several active ...

Lee mas
Global Computing

This book constitutes the thoroughly refereed post-proceedings of the IST/FET International Workshop on Global Computing, ...

Lee mas
Global Production : A Handbook for Strategy and Implementation

What is the best configuration for a global production network? What are the different dynamics in low-cost vs. high-cost ...

Lee mas
Growing Modular

The Time for Mass Customization Has Arrived Opportunity is missed by most people because it is dressed in overalls and looks ...

Lee mas
Handbook of Contact Mechanics : Exact Solutions of Axisymmetric Contact Problems

This book contains a structured collection of complete solutions of all significant axially symmetric contact problems. It ...

Lee mas
Hardening Linux

“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...

Lee mas
Hardening Windows

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which ...

Lee mas
High Confidence Software Reuse in Large Systems : 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedings

This book constitutes the refereed proceedings of the 10th International Conference on Software Reuse, ICSR 2008, held in ...

Lee mas
High Performance Computing - HiPC 2004

Keynote Addresses.- Rethinking Computer Architecture Research.- Event Servers for Crisis Management.- DIET: Building Problem ...

Lee mas
High Performance SQL Server " Consistent Response for Mission-Critical Applications / Benjamin Nevarez

An excellent complement to query performance tuning books and provides the other half of what you need to know by focusing ...

Lee mas
How Apollo Flew to the Moon

Out of the technological battlefield of World War II came a team of gifted German engineers and designers who developed the ...

Lee mas
Image and Video Retrieval (vol. # 4071)

This volume contains the proceeding of the 5th International Conference on - age and Video Retrieval (CIVR), July 13–15, ...

Lee mas
Immunogenetics of Autoimmune Disease

Utoimmunity is the downstream outcome of a rather extensive and coordinated series of events that include loss of self-tolerance, ...

Lee mas
Information Technology for Balanced Manufacturing Systems

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Lee mas
Total Books: 61 - 80 /175