Suggested Topics within your search.
Suggested Topics within your search.
Cloud computing
5
Computer programs
2
Psychology, Experimental
2
Ad hoc networks (Computer networks)
1
Application software
1
COMPUTERS
1
Cameras
1
Computer networks
1
Computer science
1
Computer security
1
Computer software
1
Computer vision
1
Cryptography
1
Databases -- Handbooks, manuals, etc. Statistics -- Data processing -- Handbooks, manuals, etc. Big data -- Handbooks, manuals, etc
1
Design
1
Development
1
Digital techniques
1
Electric circuits, Nonlinear
1
Electronic circuits
1
Electronic surveillance
1
General
1
Global system for mobile communications
1
Internet
1
Linux system
1
Mobile communication systems
1
Networking
1
Operating systems (Computers)
1
Python (Computer program language)
1
Raspberry Pi (Computer)
1
Security
1
-
1Published 2009Table of Contents: “... of Multiple Visual Sensors; Optimal Visual Sensor Network Configuration; Collaborative Control of Active...”
Printed Book -
2by He, Jing SelenaSubjects: “...Ad hoc networks (Computer networks). 38367...”
Published 2014
Get full text
Printed Book -
3by Rajkumar BuyyaTable of Contents: “... Computing 3. Virtualization 4. Cloud Computing Architecture 5. Aneka: Cloud application platform 6...”
Published 2013
Printed Book -
4by Rajkumar BuyyaTable of Contents: “... Computing 3. Virtualization 4. Cloud Computing Architecture 5. Aneka: Cloud application platform 6...”
Published 2013
Printed Book -
5by Buyya, RajkumarTable of Contents: “... Computing 3. Virtualization 4. Cloud Computing Architecture 5. Aneka: Cloud application platform 6...”
Published 2013
Printed Book -
6by Buyya, RajkumarTable of Contents: “... Computing 3. Virtualization 4. Cloud Computing Architecture 5. Aneka: Cloud application platform 6...”
Published 2013
Printed Book -
7by Huber, Alexander JosephTable of Contents: “...Machine generated contents note: 1.1 Mobile Computing and Ubiquitous Computing -- 1.2 The Driving...”
Published 2002
Get full text
Printed Book -
8by Gutmann, PeterSubjects: “...COMPUTERS Networking Security. bisacsh...”
Published 2004
SpringerLink - Full text online
Printed Book -
9by Donat, WolframTable of Contents: “... -- Connecting the Peripherals -- Configuring the Pi -- Shutting Down the Pi -- Summary -- ch. 2 Linux...”
Published 2018
Printed Book -
10by Dalheimer, Matthias KalleTable of Contents: “..., and compiling programs -- Networking -- Printing -- File sharing -- The X Window system -- System start...”
Published 2006
Get full text
Printed Book -
11Table of Contents: “... and cons of open-source software -- 1.4.Understanding your computer -- 1.5.What is PsychoPy? -- 1.0.Getting...”
Printed Book -
12Table of Contents: “... and cons of open-source software -- 1.4.Understanding your computer -- 1.5.What is PsychoPy? -- 1.0.Getting...”
Printed Book -
13by Chu-Carroll, Mark C.Table of Contents: “... computing in the cloud -- Security in app engine services -- Administering your app engine deployment...”
Published 2011
Printed Book -
14
-
15Published 2009Table of Contents: “... and piecewise-linear analysis--Simulation--Cellular neural networks and cellular wave computers--Bifurcation...”
Get full text
Printed Book -
16by Field CadyTable of Contents: “... Spark Overview 190 13.6 Spark Operations 192 13.7 Two Ways to Run PySpark 193 13.8 Configuring Spark 194...”
Published 2017
Printed Book