Home | Amazing | Today | Tags | Publishers | Years | Search 
Systems and Software Verification: Model-Checking Techniques and Tools
Systems and Software Verification: Model-Checking Techniques and Tools

Model checking is a powerful approach for the formal verification of software. It automatically provides complete proofs of correctness, or explains, via counter-examples, why a system is not correct. Here, the author provides a well written and basic introduction to the new technique. The first part describes in simple terms the theoretical...

Scalable Network Monitoring in High Speed Networks
Scalable Network Monitoring in High Speed Networks

Network monitoring serves as basis for a wide scope of network operations, engineering and management. Precise network monitoring involves inspecting every packet traversing in a network. However, this is infeasible in today’s and future high-speed networks, due to significant overheads of processing, storing, and transferring...

The Nested Universal Relation Database Model (Lecture Notes in Computer Science)
The Nested Universal Relation Database Model (Lecture Notes in Computer Science)

During the 1980's the flat relational model (relational model), which was initiated by Codd in 1970, gained immense popularity and acceptance in the market place. One of the main reasons for this success is that the relational model provides physical data independences i.e. changing the physical organization of the database does not...

Windows Phone 7 Silverlight Cookbook
Windows Phone 7 Silverlight Cookbook

I am delighted that Jonathan and Robb undertook the task of writing this book. Both Jonathan and Robb have been involved in the .NET community for a number of years and developed a passion for the Windows Phone. With this book, they have decided to share their knowledge and experience with their readers to help developers dive into doing more...

System Center Configuration Manager 2007 R3 Complete
System Center Configuration Manager 2007 R3 Complete

Thank you for picking up System Center Configuration Manager 2007 R3 Complete. Whether you are evaluating before implementation, or working with Configuration Manager on a day-to-day basis, this book is meant to give you a well-rounded look at what Configuration Manager can help you do.

If this is your first look at...

Software Development and Professional Practice
Software Development and Professional Practice

What’s this book all about? Well, it’s about how to develop software, from a personal perspective. We’ll look at what it means for you to take a problem and produce a program to solve it from beginning to end. That said, this book focuses a lot on design. How do you design software? What things do you take into...

Analog-to-Digital Conversion
Analog-to-Digital Conversion

A book is like a window that allows you to look into the world. The window is shaped by the author and that makes that every window presents a unique view of the world. This is certainly true for this book. It is shaped by the topics and the projects throughout my career. Even more so, this book reflects my own style of working and...

Moodle JavaScript Cookbook
Moodle JavaScript Cookbook

Moodle is the best e-learning solution on the block and is revolutionizing courses on the Web. Using JavaScript in Moodle is very useful for administrators and dynamic developers, as it uses built-in libraries to provide the modern and dynamic experience that is expected by web users today.

The Moodle JavaScript Cookbook will take...

Replication: Theory and Practice
Replication: Theory and Practice

Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have traditionally looked at replication from different viewpoints and with different goals (e.g., performance versus fault tolerance), recent developments have led to a convergence of these different...

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

Experience and Knowledge Management in Software Engineering
Experience and Knowledge Management in Software Engineering

Nowadays, there is software everywhere in our life. It controls cars, airplanes, factories, medical implants. Without software, banking, logistics and transportation, media, and even scientific research would not function in the accustomed way. Building and maintaining software is a knowledge-intensive endeavour and requires that specific...

Implementation and Application of Automata: 15th International Conference, CIAA 2010
Implementation and Application of Automata: 15th International Conference, CIAA 2010

This volume of Lecture Notes in Computer Science contains revised versions of papers presented at the 15th International Conference on Implementation and Application of Automata, CIAA 2010. The conference was held at the University of Manitoba in Winnipeg, Canada, on August 12–15, 2010. The previous CIAA conferences were held in London,...

Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy