Internet & Technology

686 documents
ISCRAM on EmForum #ISCRAM2010

ISCRAM on EmForum #ISCRAM2010

Susanne Jul, PhD Vice-Chair Mark Haselkorn, PhD 2010 Conference Chair Overview What is ISCRAM? Why is ISCRAM? ISCRAM 2010 ISCRAM and you ISCRAM International…
Project Report on embedded systems

Project Report on embedded systems

Thapar University A Project Report On EMBEDDED SYSTEMS AND DTMF BASED WIRELESS CAR Submitted to: Dr. Amit Kumar Kohli Submitted by: Gurjyot Singh 10706034…
JMeter User Manual

JMeter User Manual

Converted JMeter user's manual to PDF format. The URL is http://jakarta.apache.org/jmeter/usermanual/index.html. The links do not work because the manual was…
Ventilation Network Software

Ventilation Network Software

DEVELOPED BY M.VENKAT RAMANA RAO M.V.RAMANA RAO* VENSNET (SOFTWARE FOR VENTILATION NETWORKS) ABSTRACT : With the rapid advance in the semiconductor electronics the…
Citizen Journalism by Moses Kemibaro for Kenya ICT Board Media Workshop April 2010

Citizen Journalism by Moses Kemibaro for Kenya ICT Board Media Workshop April 2010

Citizen Journalism Moses Kemibaro, Dotsavvy Limited Kenya ICT Board Media Workshop 23rd April 2010 Leading Thought. “Citizen journalists are the people formerly…
Apple - 5th Week of April 2010 USPTO Published Patent Applications

Apple - 5th Week of April 2010 USPTO Published Patent Applications

Patent applications of Apple published by the USPTO on 29 April 2010
The World is Flat - Implications for School Leadership

The World is Flat - Implications for School Leadership

The World is Flat: A Brief History of the Twenty-First Century Implications for School Leadership William Brennan I often walk the halls and enter classrooms…
Face Recognition Technology

Face Recognition Technology

101seminartopics.com INTRODUCTION The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly being…
247-186-1-PB

247-186-1-PB

CEAI, Vol. 6, No. 3, pp. 57-62, 2004 Printed in Romania A SPATIAL WATERMARKING ALGORITHM FOR DIGITAL IMAGES Dumitru Dan BURDESCU, Liana STANESCU University of…
Granovetter 1983 - The Strength of Weak Ties - Revisited

Granovetter 1983 - The Strength of Weak Ties - Revisited

Texto de Granovetter The Strength of Weak Ties - Teoria dos laços fracos revisada.
ijee1017

ijee1017

Int. J. Engng Ed. Vol. 14, No. 3, p. 191±196, 1998 Printed in Great Britain. 0949-149X/91 $3.00+0.00 # 1998 TEMPUS Publications. Using the Analytic Hierarchy…
data mart

data mart

data mart, data warehousing
White Paper: Why microblogging and activity streams will overtake email for enterprise communications and collaboration.

White Paper: Why microblogging and activity streams will overtake email for enterprise communications and collaboration.

Despite the growing use of intranets, wikis, Instant Messaging and content management tools like SharePoint, email remains the dominant communication and…
Compromising Tor Anonymity Exploiting P2P Information Leakage

Compromising Tor Anonymity Exploiting P2P Information Leakage

Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adop- tion of P2P protocols for legal usage. In a…
Joomla Tackling Tables

Joomla Tackling Tables

Brought to you by http://harrisonartstv.com/
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks