This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and sim
If you're looking for a fun, effective, low-impact workout that will build stamina, enhance flexibility, and improve your cardiovascular well-being, look no more. This gentle and effective dance is no
In this book, internationally recognized experts in philosophy of science, computer science, and modeling and simulation are contributing to the discussion on how ontology, epistemology, and teleology
Requirements Engineering and Management for Software Development Projects presents a complete guide on requirements for software development including engineering, computer science and management acti
By the year 2050, great advances have been made in the realm of computer science, but the most sophisticated computer ever to have been built is about to be revealed to the world. The brainchild of Pr
In many computer vision applications, objects have to be learned and recognized in images or image sequences. This book presents new probabilistic hierarchical models that allow an efficient represent
Meta-Programming and Model-Driven Meta-Program Development: Principles, Processes and Techniques presents an overall analysis of meta-programming, focusing on insights of meta-programming techniques,
The book is designed to help children learn and understand the concepts of a computer. It gives them step by step instructions and leads them through the process on how to do something. The book also
This book is written for both linguists and computer scientists working in the field of artificial intelligence as well as to anyone interested in intelligent text processing. Lexical function is a co
After fulfilling every objective of a top secret mission to Jupiter's Ganymede and now only days from home, four NASA astronauts learn from their computer systems analyst in Houston through an unautho
Shortly after Alysa Cummings was diagnosed with breast cancer, she sat down at her laptop computer and began keeping a journal. Over the two years of her cancer treatment, Alysa continued writing as s
Survival. It's the primary instinct built into every living thing. Computer programmer Ian Daniels has designed his latest masterpiece, the Survivor Program. Able to boost the creativity and cunning,
Over the past decade the field of Human-Computer Interaction has evolved from the study of the usability of interactive products towards a more holistic understanding of how they may mediate desired h
This is a short novel by science fiction, in which an aggressive computer virus that is transmitted over the Internet affects the behaviour of those who come into contact with it when working with com
Sid, a young computer scientist who is passionate about his profession, yearns to also serve his country. Helped by his professor, Sid accepts a job at the CIA where he can do both. But the forces of
This book constitutes the refereed proceedings of the IFIP WG 9.7 International Conference on the History of Computing, HC 2010, held as part of the 21st World Computer Congress, WCC 2010, in Brisban
? Technology is the key driver of business. May it be airport, ICT , smart governance, manufacturing or plantations. Technology management opens up opportunities for the business and help achieve lea
This edited book presents the most recent theory, research and practice on information and technology literacy as it relates to the education of young children. Because computers have made it so easy
??? ?As digital devices play a more critical role in daily life than ever, more opportunities arise for innovative learning technologies—a trend on full display in the Educational Media and Technology
"You are holding in your hands the strongest tool for building a brilliant future for you and your children" The Champion Doctrine reveals for the first time the methods for programming mental secrets
The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012. The ITCS-12 will be the most comprehensive c
This book is about Future Information Technology, Application, and Service (FutureTech 2012 volume 2). The topics of FutureTech 2012 cover the current hot topics satisfying the world-wide ever-changin
The Modern CEO is a compilation of research, stories, strategies and sets forth a cutting-edge approach to sharing the message of innovative leadership through technology. This book provides an inside
Quantum Soul Clearing - Healing the Scars Life Leaves on the Soul, is a 3-step Spiritual Technology that frees you from painful thoughts, feelings and beliefs, so you can create a life of joy, peace o
Join a technology entrepreneur as he shares the challenges he faced while operating a high-tech think tank for twenty-five years. Author C. J. Rubis delivers a fascinating story-filled narrative of th
Mulilayer Integrated Film Bulk Acoustic Resonators mainly introduces the theory, design, fabrication technology and application of a recently developed new type of device, multilayer integrated film b
MEMS-based Circuits and Systems for Wireless Communications provides comprehensive coverage of RF-MEMS technology from device to system level. This edited volume places emphasis on how system performa
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we ha
Slim Spurling was an inventor, researcher, and internationally recognized dowser. He developed the Light-Life (tm) Ring in 1991, which became the prototype of a cutting edge tensor technology. The sci
Learn how to take back your life! Who doesn't deserve unconditional love? The only thing stopping us from being the love we are is the fear-based programming that we have been imprinted with. Spirited
The fast pace of the technological development during the past about two decades, particularly in television and information technology, has put up such an enormous and sudden pressure on the human mi
This is a sound textbook for Information Technology and MIS undergraduate students, and MBA graduate students and all professionals looking to grasp a fundamental understanding of information quality.
This book considers biometric technology in a broad light, integrating the concept seamlessly into mainstream IT, while discussing the cultural attitudes and the societal impact of identity management
This book constitutes the refereed proceedings of the Third IFIP TC 6 International Conference on Wireless Communications and Information Technology for Developing Countries, WCITD 2010 and the IFIP
In this book, the fundamentals of chemical engineering are presented with respect to applications in micro system technology, microfluidics, and transport processes within microstructures. Special fea
Knowledge Discovery from Legal Databases is the first text to describe data mining techniques as they apply to law. Law students, legal academics and applied information technology specialists are gui
In this monograph we introduce and examine four new temporal logic formalisms that can be used as specification languages for the automated verification of the reliability of hardware and software des
Why you should read this book. Learn how the mind is fractured by trauma and how to put it back together again using hypnotherapy. Read an interesting account of answers to questions such as why Ruth
Netex, an advanced research firm with more than one secret agenda, has developed a mind-altering headset technology which now poses a threat to all of humanity. The headset uses a mysterious sound wav