In engineering, compensation is planning for side effects or other unintended issues in a design. The design of an invention can itself also be to compensate for some other existing issue or exception.
One example is in a voltage-controlled crystal oscillator (VCXO), which is normally affected not only by voltage, but to a lesser extent by temperature. A temperature-compensated version (a TCVCXO) is designed so that heat buildup within the enclosure of a transmitter or other such device will not alter the piezoelectric effect, thereby causing frequency drift.
Another example is motion compensation on digital cameras and video cameras, which keep a picture steady and not blurry.
An Introduction To Cryptography
Chapter 1, “The Basics of Cryptography,” provides an overview of the
terminology and concepts you will encounter as you use PGP products.
Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator, contains
discussions of security, privacy, and the vulnerabilities inherent in any
security system, even PGP.
In the rectangle packing problem, encoding schemes
to represent the placements of rectangles are the key
factors determining the efficiency of algorithms. SEQP
AIR is one of the most sophisticated encoding sheme,
which has been considered to have a small solution
space
Understanding the Linux Kernel helps readers understand how Linux performs best and how
it meets the challenge of different environments. The authors introduce each topic by
explaining its importance, and show how kernel operations relate to the utilities that are
familiar to Unix programmers and users.
securité du systéme d exploitation linux :
Introduction
La sécurité physique
La sécurisation du processus d’amorç age
Le BIOS
Les principes fondamentaux relatifs au système et à l’utilisateur
La sécurité du réseau TCP/IP
La sécurité du système de fichiers
Les avantages à tirer des PAM
L’utilisation de ipchains pour le routage et la mise en place d’un pare-feu
Les pare-feu et le routage avec iptables
La sécurité d’Apache et des services FTP et  SMTP
La sécurité réseau: DNS avec BIND
La sécurité réseau: NFS et SAMBA
Le chiffrement des flux de données
Conclusion
This section describes the development and extension of a basic power flow program in Matlab. To the extent feasible, complex vector operations are used, even for the calculation of the Jacobian matrix .
I/O Kit Fundamentals
Chapter 1 What Is the I/O Kit?
Chapter 2 Architectural Overview
Chapter 3 The I/O Registry
Chapter 4 Driver and Device Matching
Chapter 5 The Base Classes
Chapter 6 I/O Kit Families
Chapter 7 Handling Events
Chapter 8 Managing Data
Chapter 9 Managing Power and Device Removal
Appendix A I/O Kit Family Reference
Chapter 10 Base and Helper Class Hierarchy