Home | Amazing | Today | Tags | Publishers | Years | Search 
Domestic Violence: A Reference Handbook
Domestic Violence: A Reference Handbook

This book is intended to provide comprehensive information about domestic violence; what it is, its causes, the extent of the problem, whom it affects, available services, and possible solutions. To provide the reader with a broad and in-depth view of the issue, domestic violence is explored from historical, social,...

Python Testing Cookbook
Python Testing Cookbook

Testing has always been a part of software development. For decades, comprehensive testing was defined by complex manual test procedures backed by big budgets; but something revolutionary happened in 1998. In his Guide to Better Smalltalk, Smalltalk guru Kent Beck introduced an automated test framework called SUnit. This triggered an...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Business Process Management Workshops: BPM 2010 International Workshops and Education Track
Business Process Management Workshops: BPM 2010 International Workshops and Education Track

Business process management (BPM) is an established research domain for computer science, information systems, and management scholars. The record number and wide scope of submissions to the eighth installation of the International Conference on Business Process Management was an indication of the vibrancy of the area and the varied...

Algorithm-Architecture Matching for Signal and Image Processing
Algorithm-Architecture Matching for Signal and Image Processing

Advances in signal and image processing together with increasing computing power are bringing mobile technology closer to applications in a variety of domains like automotive, health, telecommunication, multimedia, entertainment and many others. The development of these leading applications, involving a large diversity of algorithms...

HTI+ Exam Cram 2
HTI+ Exam Cram 2

Welcome to the Home Technology Integrator (HTI+) Exam Cram 2! This book is designed to help you prepare to take—and pass—the Computing Technology Industry Association (CompTIA) certification exams HT0-101, "Residential Systems," and HT0-102, "Systems Infrastructure and Integration." This...

Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing
Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing

This book and its companion volume, LNCS vols. 6145 and 6146, constitute the proceedings of the International Conference on Swarm Intelligence (ICSI 2010) held in Beijing, the capital of China, during June 12-15, 2010. ICSI 2010 was the first gathering in the world for researchers working on all aspects of swarm intelligence, and...

Integration of Software Specification Techniques for Applications in Engineering
Integration of Software Specification Techniques for Applications in Engineering

This volume is a documenlation of I he main results in Ihe research area "Inte gration of Software Specification Techniques for Applications in Engineering". On one hand it is based on the Priority Program "Integration von Techniken der Soflwarespezifikation fur ingenieurwissensehaftliehe Anwendungen", short Soft...

Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne
Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne

CHES 2009, the 11th workshop on Cryptographic Hardware and Embedded Systems, was held in Lausanne, Switzerland, September 6–9, 2009. The workshop was sponsored by the International Association for Cryptologic Research (IACR).

The workshop attracted a record number of 148 submissions from 29 countries, of which the...

Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan, China
Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan, China

The 2011 International Conference on Web Information Systems and Mining

(WISM 2011) was held during September 24–25, 2011 in Taiyuan, China. WISM 2011 received 472 submissions from 20 countries and regions. After rigorous reviews, 112 high-quality papers were selected for publication in the WISM...
Advances in Databases and Information Systems: 15th International Conference, ADBIS 2011, Vienna
Advances in Databases and Information Systems: 15th International Conference, ADBIS 2011, Vienna

The main objective of the ADBIS series of conferences is to provide a highly visible forum for the dissemination of research accomplishments and to promote interactions and collaborations among the database and information systems research communities from Central and Eastern European countries and with the rest of the world. The ADBIS...

Combinatorial Image Analysis: 14th International Workshop, IWCIA 2011
Combinatorial Image Analysis: 14th International Workshop, IWCIA 2011
This volume includes the articles presented at the 14th International Workshop on Combinatorial Image Analysis, IWCIA 2011, held in Madrid, Spain, May 23–25, 2011. The 13 previous meetings were held in Paris (France) 1991, Ube (Japan) 1992, Washington D.C. (USA) 1994, Lyon (France) 1995, Hiroshima (Japan) 1997, Madras...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy