Home | Amazing | Today | Tags | Publishers | Years | Search 
Expert One-on-One Oracle
Expert One-on-One Oracle
Tom Kyte is of a rare breed. To begin, he's technically expert in his subject (administration of and development of applications for Oracle database management systems). What's more (and what distinguishes him from the ranks of the super-competent), he is both able and willing to share his considerable store of wisdom with Oracle users via...
Recent Trends of Mobile Collaborative Augmented Reality Systems
Recent Trends of Mobile Collaborative Augmented Reality Systems

Augmented reality (AR) is a direct or indirect view of real world scenes in which physical objects are annotated with, or overlaid by computer generated digital information. The past two decades have seen a fast growing body of research and development dedicated to techniques and technologies for AR. In particular, due to the recent...

Wirelessness: Radical Empiricism in Network Cultures
Wirelessness: Radical Empiricism in Network Cultures

Motion, to take a good example, is originally a turbid sensation, of which the native shape is perhaps best preserved in the phenomenon of vertigo. (James 1996a, 62)

Between 1999 and 2009, a “ turbid ” or disordered sensation of change was felt as wireless connections expanded and eroded the edges of the Internet...

Operating Systems In Depth: Design and Programming
Operating Systems In Depth: Design and Programming

The goal of this book is to bring together and explain current practice in operating systems. This includes much of what is traditionally covered in operating-system textbooks: concurrency, scheduling, linking and loading, storage management (both real and virtual), fi le systems, and security. However, I also cover issues that come up...

Human-in-the-Loop Simulations: Methods and Practice
Human-in-the-Loop Simulations: Methods and Practice

Both the editors of this book were exposed to human-in-the-loop simulations while pursuing their doctoral degrees in the Center for Human-Machine Systems at Georgia Tech. In fact, S. Narayanan served as Ling Rothrock’s teaching assistant for the simulation course taught by Prof. Christine Mitchell. It has been over 15 years...

AutoCAD 2010: A Problem-Solving Approach
AutoCAD 2010: A Problem-Solving Approach

AutoCAD, developed by Autodesk Inc., is the most popular PC-CAD system available in the market. Today, over 7 million people use AutoCAD and other AutoCAD based design products. 100% of the Fortune 100 firms are Autodesk customers and 98% of the Fortune 500 firms are Autodesk customers. AutoCAD's open architecture has allowed...

Metaclasses and Their Application: Data Model Tailoring and Database Integration (Lecture Notes in Computer Science)
Metaclasses and Their Application: Data Model Tailoring and Database Integration (Lecture Notes in Computer Science)

Conventional object-oriented data models are "closed". Although they allow users to define application-specific classes, they usually come with a fixed set of modeling primitives. This constitutes a major problem as different application domains have different requirements on a data model. For example, database integration...

Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)
Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)

Stable and dependable IT services and infrastructures are nowadays of paramount importance not only for modern enterprises but also for home users. However, as distributed information infrastructures continue to spread and grow, resulting in Internet-based, wireless and mobile systems, traditional solutions for managing and...

R for SAS and SPSS Users (Statistics and Computing)
R for SAS and SPSS Users (Statistics and Computing)

While SAS and SPSS have many things in common, R is very different. My goal in writing this book is to help you translate what you know about SAS or SPSS into a working knowledge of R as quickly and easily as possible. I point out how they differ using terminology with which you are familiar, and show you which add-on packages will...

C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

Thor's Microsoft Security Bible: A Collection of Practical Security Techniques
Thor's Microsoft Security Bible: A Collection of Practical Security Techniques

What is security? Is it a mindset? Is it a measurable and actionable posture or position? Or is it a bit of both? People, as a race, learn from doing; they learn by example. Ingrained into our psyche is a process that builds new information upon previous knowledge as we learn. As Isaac Newton said, “If I have seen further than...

Guide to ILDJIT (SpringerBriefs in Computer Science)
Guide to ILDJIT (SpringerBriefs in Computer Science)

We are all familiar with the time-honored idea of a Virtual Machine that is neutral with respect to computer architecture and can be used to execute a high-level language, after its translation to the VM byte-code. This approach can be found in several successful mono-language systems, that support popular languages such as Java or...

Result Page: 238 237 236 235 234 233 232 231 230 229 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy