Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Structures and Problem Solving Using Java (3rd Edition)
Data Structures and Problem Solving Using Java (3rd Edition)

T^his book is designed for a two-semester sequence in computer science, beginning with what is typically known as Data Structures and continuing with advanced data structures and algorithm analysis. It is appropriate for the courses from both the two-course and three-course sequences in "B.l...

Model-Based Development: Applications
Model-Based Development: Applications

A Proven Development Methodology That Delivers On the Promise of Model-Based Approaches

Software continues to become more and more complex, while software consumers’ expectations for performance, reliability, functionality, and speed-to-market are also growing exponentially. H. S. Lahman shows how...

Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web

Privacy is a basic human need, and losing privacy is perceived as an extremely threatening experience. Privacy embraces solitude, personal space, or intimacy with family and friends and as such, it is a ubiquitous and trans-cultural phenomenon. Privacy leverages well-being; without privacy we are at risk of becoming physically or...

Synchronization of Parallel Programmes (Studies in computer science)
Synchronization of Parallel Programmes (Studies in computer science)

The use of modular and parallel programming languages, and the development of distributed architectures is having a profound influence on computer programming and systems design; hardware and performance can now conspire to produce much higher operating speeds than could previously be achieved through sequential processing. Executing...

Testing IT: An Off-the-Shelf Software Testing Process
Testing IT: An Off-the-Shelf Software Testing Process

Why is astronomy considered a science while astrology is considered only a pseudoscience? In other words, how can we prove that a theory faithfully describes reality, and that this theory can then be used to predict unknown facts? Karl Popper, the well-known philosopher, studied these problems and summarized his conclusions in one...

Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)
Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)

Concurrent processes can exhibit extremely complicated behavior, and neither informal reasoning nor testing is reliable enough to establish their correctness. In this thesis, we develop a new technique for the verification of parallel programs. The technique is stated in terms of axioms and inference rules, and it is used to prove...

Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)
Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)

Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior classes in abstract or linear...

Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara
Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized...

Cooperative Task-Oriented Computing: Algorithms and Complexity
Cooperative Task-Oriented Computing: Algorithms and Complexity

Cooperative network supercomputing is becoming increasingly popular for harnessing the power of the global Internet computing platform. A typical Internet supercomputer consists of a master computer or server and a large number of computers called workers, performing computation on behalf of the master. Despite the simplicity and benefits of...

Inside the Machine: An Illustrated Introduction to Microprocessors and Computer Architecture
Inside the Machine: An Illustrated Introduction to Microprocessors and Computer Architecture

Inside the Machine is an introduction to computers that is intended to fill the gap that exists between classic but more challenging introductions to computer architecture, like John L. Hennessy’s and David A.

Patterson’s popular textbooks, and the growing mass of works that are simply too basic...

Semantics in Adaptive and Personalized Services: Methods, Tools and Applications (Studies in Computational Intelligence)
Semantics in Adaptive and Personalized Services: Methods, Tools and Applications (Studies in Computational Intelligence)

Semantics in Adaptive and Personalised Services, initially strikes one as a specific and perhaps narrow domain. Yet, a closer examination of the term reveals much more. On one hand there is the issue of semantics. Nowadays, this most often refers to the use of OWL, RDF or some other XML based ontology description language in order to...

Foundations of Databases: The Logical Level
Foundations of Databases: The Logical Level

The definitive book on the foundations and theory of database systems, including advanced topics not presented in any other survey book. Includes a comprehensive resource useful for any database researcher or practitioner that covers both fundamental and advanced topics.

Database theory is a relative newcomer to the field of computer...

Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy