Develop and execute winning wireless strategies for your company Offering the prospect of instantaneous, cable-free Internet connectivity and an array of Web services to cell phones, handheld computer
Bridges the gap between virtual reality and computer vision in manufacturingWhat will it take to make virtual manufacturing a reality? In this groundbreaking book, leading VR researchers reveal the la
You can immediately have the power to perform electromagnetic simulation. If you have a fundamental understanding of electromagnetic theory and the knowledge of at least one high-level computer langu
Most online investors hit the computer screen mentally and emotionally unprepared -- and pay dearly for their education. The Disciplined Online Investor shows online investors how to understand and ov
This amazingly comprehensive volume has been updated to include the latest computer and internet terminology, plus changes recently adopted by Spanish language academies. Arranged in an easy-to-use fo
Embodied conversational agents are computer-generated cartoonlike characters thatdemonstrate many of the same properties as humans in face-to-face conversation, including theability to produce and res
Thompson (mechanical engineering, UMIST, UK and researcher and author in the field) addresses maintainability and reliability issues in engineering systems and products from a design perspective. Cha
A collection of articles discussing the context for, the alternatives to, and the conditions that surround and encourage effective team performance in organizations
Traces the making of the 1998 computer-animated motion picture, A Bug's Life, exhibiting the work of film's animators, art directors, and computer wizards, who also made Toy Story. 40,000 first printi
This volume - a definitive reference devoted exclusively to the Star Wars milieu - draws together data from films, radio dramas, novels, short stories, computer games, and more, running the full gamu
"This volume, likely to become a standard reference work, describes an extraordinary number of approaches to the representation of musical information for purposes of computer processing. It is a cons
Computerworld columnist Moschella anticipates the next wave of computer innovation speculating on the information technology (IT) industry's next moves in the global market. The author begins with a
Leading authorities from around the world discuss the latest topics in international user-interface design.With most major companies in the computer industry depending on exports for 50 percent or mor
This unique book and computer disk package will help researchers, instructors, and students in pharmacy, medicinal chemistry, biochemistry, or other biomedical sciences reach a deeper understanding of
The name on the computer screen is James Barbous Matlock. Vietnam veteran. College professor. He's Washington's choice to stop a far-reaching conspiracy, an undercover assignment destined to put Ma
Supremely comprehenive, Lubricants in Operation covers fundamental aspects, significant applications, hygiene, and legal concerns relevant to this field of mechanical engineering. Specialists working
Over 60,000 entries -- covering business, computer, and scientific terms; colloquial, idiomatic, and current slang expressions; and more. Updated and revised biographical and geographical database
Streamline the processes vital to optimum performanceWith over 100,000 copies sold worldwide, Improving Performance is recognized as the book that launched the Process Improvement revolution. It was t
PVM is a software package that enables the computer user to define a networked heterogeneous collection of serial, parallel, and vector computers to function as one large computer. Written by the tea
If you have access to a personal computer and want to explore the Internet, Everybody's Guide is the place to begin. Foreword by Mitchell Kapor. If you have access to a personal computer and want to
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers
Substantial revision of the easy-to-read first edition in the area of intellectual property rights. Includes new chapters on computer software as applied to copyright and international patents. Contai
The thirty original contributions in this book provide a working definition of "computational neuroscience" as the area in which problems lie simultaneously within computer science and neuroscience. T
A handy source for practicing engineers and researchers, this book offers collected examples of successful performance evaluation of high speed telecommunications switching fabrics such as ATM network
Semantics of Programming Languages exposes the basic motivations and philosophy underlying the applications of semantic techniques in computer science. It introduces the mathematical theory of program
The growth in digital devices, which require discrete formulation of problems, has revitalized the role of combinatorics, making it indispensable to computer science. Furthermore, the challenges of ne
Drawing on recent computer and cognitive science, Mitchell (architecture, Harvard) explores the languages of architectural form and graphic composition to illuminate the underlying concepts of design.
In describing the technical experiences of one company from the beginning of the computer era, this book unfolds the challenges that IBM's research and development laboratories faced, the technologica
Lucid, accessible exploration of propositional logic, propositional calculus, and predicate logic. Topics include computer science and systems analysis, linguistics, and problems in the foundations of
This book describes a theory of memory representation, organization, and processing for understanding complex narrative texts. The theory is implemented as a computer program called BORIS which reads
Newspapers (E. Taylor, et al.). Magazines (M. Vignelli, et al.). Books (J. Tschichold, et al.). Technical Appendix. Glossary of Computer Terminology. Acknowledgments. Bibliography. Index.
Deals constructively with recognized software problems. Focuses on the unreliability of computer programs and offers state-of-the-art solutions. Covers?software development, software testing, structur
Suitable for international computer networks students, this title presents an accessible approach to data communications and networking. It contains 830 figures and 150 tables to provide a visual and
Troubleshooting reference for the Java programmer. Authors computer science teaching experience led him to discover the importance of debugging. His research showed that people who learn debugging ski
Learn to protect your online business using this insightful and practical guide to computer security. Through use of real examples, you'll understand and address the risks associated with using email,
Emphasizing the four primary goals of computer security--confidentiality, authentication, integrity, and non-repudiation--this helpful handbook provides a detailed tutorial on data security models tha
An introductory guide to using the Internet provides a solution-oriented handbook designed to help novice computer users learn the basics of browsing, searching, communications, and safety on the Inte
The book assumes that the students will have access to a computer algebra system.Appendix C describes the features of AXIOM, Maple, Mathematica, and REDUCE that are most relevant to the text. We do no