You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A journalist with two-decades of experience covering WorldCom traces its birth, growth, colossal success, and ultimate collapse, examining the key players, finances, corporate culture, and politics within the telecom giant.
This hands-on guide leads you through mastering your iPad through hand gestures, multi-tasking, closing apps, understanding The Control Center, The Notification Center, screen lock rotation, select and read-aloud text, hidden keys and almost every standard application included with your iPad. This is the most comprehensive eBook covering the iPad on the market today. This is not a 20 page eBook rip-off. iPad UNIVERSITY is the REAL DEAL! Illustrations and enhanced video tutorials, all in a eBook optimized for your iPad and iPhone. You won't believe all that is included in this eBook. We include over 35 chapters and over 200 tips tricks and techniques to help you master your iPad. This book is...
This book presents a comprehensive overview of the recently developed L1 adaptive control theory, including detailed proofs of the main results. The key feature of the L1 adaptive control theory is the decoupling of adaptation from robustness. The architectures of L1 adaptive control theory have guaranteed transient performance and robustness in the presence of fast adaptation, without enforcing persistent excitation, applying gain-scheduling, or resorting to high-gain feedback.
This book brings together successful stories of deployment of synchrophasor technology in managing the power grid. The authors discuss experiences with large scale deployment of Phasor Measurement Units (PMUs) in power systems across the world, enabling readers to take this technology into control center operations and develop good operational procedures to manage the grid better, with wide area visualization tools using PMU data.
Building software often seems harder than it ought to be. It takes longer than expected, the software's functionality and performance are not as wonderful as hoped, and the software is not particularly malleable or easy to maintain. It does not have to be that way. This book is about programming, and the role that formal specifications can play in making programming easier and programs better. The intended audience is practicing programmers and students in undergraduate or basic graduate courses in software engineering or formal methods. To make the book accessible to such an audience, we have not presumed that the reader has formal training in mathematics or computer science. We have, howev...
Flying insects are intelligent micromachines capable of exquisite maneuvers in unpredictable environments. Understanding these systems advances our knowledge of flight control, sensor suites, and unsteady aerodynamics, which is of crucial interest to engineers developing intelligent flying robots or micro air vehicles (MAVs). The insights we gain when synthesizing bioinspired systems can in turn benefit the fields of neurophysiology, ethology and zoology by providing real-life tests of the proposed models. This book was written by biologists and engineers leading the research in this crossdisciplinary field. It examines all aspects of the mechanics, technology and intelligence of insects and...
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.
Poetry has long dominated the cultural landscape of modern Iraq, simultaneously representing the literary pinnacle of high culture and giving voice to the popular discourses of mass culture. As the favored genre of culture expression for religious clerics, nationalist politicians, leftist dissidents, and avant-garde intellectuals, poetry critically shaped the social, political, and cultural debates that consumed the Iraqi public sphere in the twentieth century. The popularity of poetry in modern Iraq, however, made it a dangerous practice that carried serious political consequences and grave risks to dissident poets. The Dangers of Poetry is the first book to narrate the social history of po...