Logo

Moglichkeiten Zur Gestaltung Verbindlicher Telekooperation

Diplomarbeit aus dem Jahr 2001 im Fachbereich Informatik - Technische Informatik, Note: 1.1, Albert-Ludwigs-Universitat Freiburg, Sprache: Deutsch, Abstract: Das Problem der Fluchtigkeit in der...


It-Offshoring

Masterarbeit aus dem Jahr 2013 im Fachbereich Informatik - Wirtschaftsinformatik, Note: 1,0, Hochschule fur Technik und Wirtschaft Berlin, Sprache: Deutsch, Abstract: Die Wirtschaftswelt unterliegt...


Traffic Control Unter Linux

Bachelorarbeit aus dem Jahr 2010 im Fachbereich Informatik - Allgemeines, Note: 1, Fachhochschule Technikum Wien, Sprache: Deutsch, Abstract: Die Geschwindigkeit, mit der Daten uber Netzwerke...


Entwicklung Einer Webbasierten Software Zur Planung Und Steuerung Von Linkbuilding-Strategien Zur Suchmaschinenoptimierung Von Internetseiten

Bachelorarbeit aus dem Jahr 2012 im Fachbereich Informatik - Sonstiges, Note: 1,7, Universitat Osnabruck, Sprache: Deutsch, Abstract: Die vorliegende Arbeit befasst sich mit der Entwicklung einer...


Erp-Fallstudien

Studienarbeit aus dem Jahr 2011 im Fachbereich Informatik - Wirtschaftsinformatik, Note: 1,3, Fachhochschule Brandenburg, Sprache: Deutsch, Abstract: In dieser ERP-Fallstudie sollen unterschiedliche...


Data Protection for Photographers

All photographers, both amateur and professional, are faced with the important issues of data protection and storage. Without knowledge of the options, tools, and procedures for safe and effective...


Digital Information Design and Access

A comprehensive view of digital information design technologies, tools, indexing and access.


Library Instructional Computer Process (Licp)

About LICP - Leading by Example Licp (Library Instructional Computer Process) has set designs to aid individuals by getting them the results they need quickly. Our step by step guidance and picture...


Unmasking Project Management 2013

Unmasking Project Management helps professionals in information technology (IT) and business identify successful approaches to management of information systems (MIS) that will work for their...


Intelligence Management

The current rapid development in both computing power and the ability to present and mine complex data sets in useful ways provides the backdrop to Intelligence Management: Knowledge Driven...


Average Time Complexity of Decision Trees

Decision tree is a widely used form of representing algorithms and knowledge. Compact data models and fast algorithms require optimization of tree complexity. This book is a research monograph on...


Skill Lifecycle Management

Masterarbeit aus dem Jahr 2012 im Fachbereich Informatik - Wirtschaftsinformatik, Note: 1,0, Universitat Duisburg-Essen, Sprache: Deutsch, Abstract: Die Beschreibung eines Mitarbeiters als Summe...


Funktionale Sicherheit

Mit seinem Workshop 2013 zum Thema "Funktionale Sicherheit" bietet der Fachausschuss Echtzeitsysteme Wissenschaftlern, Nutzern und Herstellern ein Formu an, auf dem neue Trends und Entwicklungen zu...


C++ Programming

This book adopts a quantitative approach to helping programmers and CS students learn C++ fast. For every C++ programming language feature covered, the book explains the concepts clearly, followed...


The New New Thing

In the weird glow of the dying millennium, Michael Lewis sets out on a safari through Silicon Valley to find the world's most important technology entrepreneur, the man who embodies the spirit of the...


Career Building Through Using Digital Design Tools

The field of digital design offers immense opportunities for creative young people. Digital designers are in high demand to help design and create images for Web sites and digital media. Business is...


Career Building Through Using Search Engine Optimization Techniques

With companies turning to the Internet to help them grow their business, individual web pages can often get lost in the shuffle. One solution that many companies use is search engine optimization....


Agile Strategy Management

Your strategic initiatives are constantly under fire due to the evolving nature of markets, technology, laws, and government. To ensure your strategy succeeds, it must remain flexible while...


Protecting Oracle Database 12c

Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration...


Understanding Computers in a Changing Society

Understanding Computers in a Changing Society gives your students a classic introduction to computer concepts with a modern twist! Known for its emphasis on basic computer concepts and societal...


Oracle Backup and Recovery

Backup and recovery are mission-critical DBA tasks, and it is critical that every Oracle professional develop a RMAN strategy that guarantees recoverability while minimizing unplanned downtime. RMAN...


The Ala Guide to Researching Modern China

As China has evolved into an economic superpower, interest in its culture and current place in the world has skyrocketed; China Studies are now taught in almost every college or university in the...


Time and Petri Nets

At first glance the concepts of time and of Petri nets are quite contrary: while time determines the occurrences of events in a system, classic Petri nets consider their causal relationships and they...


Prediction and Classification of Respiratory Motion

This book describes recent radiotherapy technologies including tools for measuring target position during radiotherapy and tracking-based delivery systems. This book presents a customized prediction...


Legal Ontology Engineering

Enabling information interoperability, fostering legal knowledge usability and reuse, enhancing legal information search, in short, formalizing the complexity of legal knowledge to enhance legal...


Microeconomic Theory and Computation

Economists can use computer algebra systems to manipulate symbolic models, derive numerical computations, and analyze empirical relationships among variables. Maxima is an open-source multi-platform...


Computational Techniques for Structural Health Monitoring

The increased level of activity on structural health monitoring (SHM) in various universities and research labs has resulted in the development of new methodologies for both identifying the existing...


Pocket Data Mining

Owing to continuous advances in the computational power of handheld devices like smartphones and tablet computers, it has become possible to perform Big Data operations including modern data mining...


Moving Target Defense

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and...


Optimal Design of Distributed Control and Embedded Systems

Optimal Design of Distributed Control and Embedded Systems focuses on the design of special control and scheduling algorithms based on system structural properties as well as on analysis of the...