1
by Cohen, Ryan.
Published 2014
Format:
Table of Contents: ... Reviewer -- Introduction -- Chapter 1: Overview of Embedded Application Development for Intel Architecture...
Click to View
2
3
4
5
6
7
by McGrath, Michael J.
Published 2013
Format:
Table of Contents: ... Code -- Summary -- References -- Chapter 4: Sensor Network Topolog ies and Design Considerations...
Click to View
8
9
by Awad, Mariette.
Published 2015
Format:
Table of Contents: ... -- Acknowledgments -- Chapter 1: Machine Learning -- Key Terminology -- Developing a Learning Machine -- Machine...
Click to View
10
by Uitto, Juha I.
Published 2022
Format:
Table of Contents: ... -- The Independent Evaluation Office of the United Nations Development Program: Some Strategic Choices -- Learning...
Click to View
11
12
13
by Reinders, James.
Published 2020
Format:
Table of Contents: ... -- Concurrency vs. Parallelism -- Summary -- Chapter 2: Where Code Executes -- Single-Source -- Host Code...
Click to View
14
by World Bank
Published 2014
Subjects: ...COMMUNICATIONS DEVELOPMENT...
Get full text
Get full text
15
by Roos, Vera.
Published 2022
Format:
Table of Contents: ..., Processes and Applications -- Chapter 4: Situationally and Relationally Guided Ethical Conduct...
Click to View
16
by Krajci, Iggy.
Published 2013
Format:
Table of Contents: ... -- Application Compatibility: Native Development Kit and Binary Translator -- Overview -- Chapter 6: Installing...
Click to View
17
by Ravichandran, Aruna.
Published 2016
Format:
Table of Contents: ... Development -- Agile Empowerment Challenges -- Modern Application Architectures -- Microservices: Small Isn...
Click to View
18
by DeJaeghere, Joan.
Published 2021
Format:
Table of Contents: ... -- References -- Chapter 2: Life Skills Education for Youth in Developing Countries: What Are They and Why Do...
Click to View
19
by Youssef, Ali.
Published 2014
Format:
Table of Contents: ... -- Chapter 1 Brief History of Wi-Fi -- History and Current Growth and Proliferation of Wi-Fi in Hospitals...
Click to View
20
by Nayak, Umesha.
Published 2014
Format:
Table of Contents: ... Program -- Chapter 2: History of Computer Security -- Introduction -- Communication -- World Wars...
Click to View