Free Delivery Over $100
2814 books were found.
The technique underlying polar codes is “channel polarization”: creating extremal channels those that are either... Read More >>
A database is in principle just a large collection of related or separate data, systematically stored in a computer.... Read More >>
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application... Read More >>
The European Commission facilitates and supports applied research in knowledge management through its Information... Read More >>
While written with practitioners and students entering the field of clinical informatics in mind, the book eschews... Read More >>
Die IT-Service-Branche befindet sich seit 10 Jahren in einem schmerzhaften Umbruch. Sie ist mit neuen Geschäftsmodellen,... Read More >>
Provides a tutorial introduction to this important mathematical technique used in communications, information theory,... Read More >>
That piece 2 of art, a 1.8x 1.8m oil on canvas plus collage entitled Berinl in honour of the Danish explorer, gathers... Read More >>
This book is a result of the Tenth International Conference on Information Systems Development (ISD2001) held at... Read More >>
Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of... Read More >>
In delivering lectures and writing books, we were most often forced to pay absolutely no attention to a great body... Read More >>
The numerous possible explanations for this situation include poor project management, unsuitable methods and tools... Read More >>
Der Vertrieb von IT-Produkten verlangt spezielles Know-how, das dieser Leitfaden praxisbezogen für Neueinsteiger... Read More >>
Bremer Preface The industrial world today is divided between two camps: a culture based on the principles of Total... Read More >>
The papers are organized in topical sections on testing in practice, test frameworks for distributed systems, testing... Read More >>
Read More >>
Managerial support is often the biggest impediment to the successful adoption of Agile in organizations. This book... Read More >>
Security of Data and Transaction Processing brings together in one place important contributions and up-to-date... Read More >>
More generally, in order to model the sophisticated ways in which human beings process information, as well as going... Read More >>
Dabei steigt die Komplexität der Anforderungen, weil Prozesse weltweit ausgerichtet werden müssen und die Veränderungsgeschwindigkeit... Read More >>
This book is about maintaining computer software. Re searchers will be given principles to expand upon, and will... Read More >>
With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security,... Read More >>