Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Language and Automata Theory and Applications: 5th International Conference
Language and Automata Theory and Applications: 5th International Conference
These proceedings contain the papers that were presented at the 5th International Conference on Language and Automata Theory and Applications (LATA 2011), held in Tarragona, Spain, during May 26–31, 2011.

The scope of LATA is rather broad, including: algebraic language theory; algorithms for semi-structured
...
Multimedia Messaging Service: An Engineering Approach to MMS
Multimedia Messaging Service: An Engineering Approach to MMS
The Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for...
e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009.
e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009.
The present book includes extended and revised versions of a set of selected best papers from the 6th International Joint Conference on e-Business and Telecommunications (ICETE), which was held in July 2009, in Milan, Italy. This conference reflects a continuing effort to increase the dissemination of recent research results...
Testing Python: Applying Unit Testing, TDD, BDD and Acceptance Testing
Testing Python: Applying Unit Testing, TDD, BDD and Acceptance Testing

Fundamental testing methodologies applied to the popular Pythonlanguage

Testing Python; Applying Unit Testing, TDD, BDD andAcceptance Testing is the most comprehensive book available ontesting for one of the top software programming languages in theworld. Python is a natural choice for new and experienceddevelopers,...

Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Data Mining and Knowledge Discovery Technologies (Advances in Data Warehousing and Mining)
Data Mining and Knowledge Discovery Technologies (Advances in Data Warehousing and Mining)
Data warehousing and OLAP (online analytical processing) technologies have gained a widespread acceptance since the 90’s as a support for decision-making. A data warehouse is a collection of subject-oriented, integrated, consolidated, time-varying, and non-volatile data (Kimball, 1996; Inmon, 1996). It is manipulated through OLAP tools, which...
Perl Medic : Transforming Legacy Code
Perl Medic : Transforming Legacy Code
Bring new power, performance, and scalability to your existing Perl code!

Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of...

Smart Graphics: 9th International Symposium, SG 2008, Rennes, France, August 27-29, 2008, Proceedings
Smart Graphics: 9th International Symposium, SG 2008, Rennes, France, August 27-29, 2008, Proceedings
For centuries, artists and designers have been creating communicative graphics. With the advent of new forms of media, the emergence of paradigms such as ubiquitous computing, and the rapid evolution of interaction devices, there is a continuous cycle of renewal of the technologies and methods to support artists, interaction designers and...
HTI+ Exam Cram 2
HTI+ Exam Cram 2

Welcome to the Home Technology Integrator (HTI+) Exam Cram 2! This book is designed to help you prepare to take—and pass—the Computing Technology Industry Association (CompTIA) certification exams HT0-101, "Residential Systems," and HT0-102, "Systems Infrastructure and Integration." This...

Core Java™ 2 Volume I - Fundamentals, Seventh Edition
Core Java™ 2 Volume I - Fundamentals, Seventh Edition

In late 1995, the Java programming language burst onto the Internet scene and gained instant celebrity status. The promise of Java technology was that it would become the universal glue that connects users with information, whether that information comes from web servers, databases, information...

Towards a Service-Based Internet: Third European Conference, ServiceWave 2010
Towards a Service-Based Internet: Third European Conference, ServiceWave 2010

The ServiceWave conference series is committed to being the premier European forum for researchers, educators and industrial practitioners to present and discuss the most recent innovations, trends, experiences and concerns in software services (or the “Future of the Internet of Service”) and related underlying infrastructure...

Think Good, Feel Good: A Cognitive Behavioural Therapy Workbook for Children and Young People
Think Good, Feel Good: A Cognitive Behavioural Therapy Workbook for Children and Young People

Newly updated edition of the highly successful core text for using cognitive behaviour therapy with children and young people

The previous edition of Think Good, Feel Good was an exciting, practical resource that pioneered the way mental health professionals approached Cognitive Behaviour Therapy with...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy