It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
nTIM PATRICK has been working professionally as a software architect and developer for nearly
25 years. By day he develops custom business applications in Visual Basic for small to medium-
sized organizations. He is a Microsoft Certified Solution Developer (MCSD). In April 2007,
Microsoft awarded Ti ...
This book has been written to support a practically oriented course in programming language
translation for senior undergraduates in Computer Science. More specifically, it is aimed at students
who are probably quite competent in the art of imperative programming (for example, in C++,
Pascal, or Mod ...
wxPython In Action,By combining introductions, overviews, and how-to examples, the In Action
books are designed to help learning and remembering. According to research in
cognitive science, the things people remember are things they discover during
self-motivated explora ...
ADIAL Basis Function (RBF) networks were introduced
into the neural network literature by Broomhead and
Lowe [1], which are motivated by observation on the local
response in biologic neurons. Due to their better
approximation capabilities, simpler network structures and
faster learning algorithms, R ...
Embedded System Design:
A Unified Hardware/Software Approach
Frank Vahid and Tony Givargis
Department of Computer Science and Engineering
University of California