The essential guide to grammars with context conditions This advanced computer science book systematically and compactly summarizes the current knowledge about grammars with context conditions-an important area of formal language theory. According to the types of context conditions, this self-contained reference classifies them into grammars with context conditions placed on the domains of grammat…
New automated, application-independent methodology for designing and deploying sensor networks Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications without much knowledge of the low-level networking aspects of deployment. This new approach is based on the Abstract Task Graph (ATaG), a data-driven progr…
A complete guide to creating usable, realistic game characters with two powerful tools Creating viable game characters requires a combination of skills. This book teaches game creators how to create usable, realistic game assets using the power of an open-source 3D application and a free game engine. It presents a step-by-step approach to modeling, texturing, and animating a character using the po…
Improve the performance of relational databases with indexes designed for today's hardware Over the last few years, hardware and software have advanced beyond all recognition, so it's hardly surprising that relational database performance now receives much less attention. Unfortunately, the reality is that the improved hardware hasn't kept pace with the ever-increasing quantity of data processed t…
Collecting, analyzing, and extracting valuable information from a large amount of data requires easily accessible, robust, computational and analytical tools. Data Mining and Business Analytics with R utilizes the open source software R for the analysis, exploration, and simplification of large high-dimensional data sets. As a result, readers are provided with the needed guidance to model and inte…
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of companies involved in this development. Despite its ubiquity in the modern world, the author highlights that efficient use of IT by businesses can only be g…
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of companies involved in this development. Despite its ubiquity in the modern world, the author highlights that efficient use of IT by businesses can only be g…
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of companies involved in this development. Despite its ubiquity in the modern world, the author highlights that efficient use of IT by businesses can only be g…
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of companies involved in this development. Despite its ubiquity in the modern world, the author highlights that efficient use of IT by businesses can only be g…
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becoming a hot topic in wireless communications, with mobile operators competing to offer inexpensive, reliable services. The selection of an appropriate tec…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide design recommendations and expose common pitfalls giving a highly practical focus. Explains the relevant parts of the protocols that need to be used Demons…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide design recommendations and expose common pitfalls giving a highly practical focus. Explains the relevant parts of the protocols that need to be used Demons…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide design recommendations and expose common pitfalls giving a highly practical focus. Explains the relevant parts of the protocols that need to be used Demons…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide design recommendations and expose common pitfalls giving a highly practical focus. Explains the relevant parts of the protocols that need to be used Demons…
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and te…