|
|
|
|
Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003, Proceedings, Part I (Lecture Notes in Computer Science)
These proceedings contain the papers presented at the 5th Annual Genetic and Evolutionary Computation Conference (GECCO 2003). The conference was held in Chicago, USA, July 12–16, 2003.
A total of 417 papers were submitted to GECCO 2003. After a rigorous doubleblind reviewing process, 194 papers were accepted for full... | | Deploying IPv6 NetworksAn essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.
-
Learn about IPv6 services and the relevant IPv6 features that make them possible
-
Plan, deploy, and manage IPv6 services at... | | XPath 2.0 Programmer's Reference (Programmer to Programmer)From its origins as a sublanguage of XSLT, XPath has come into its own as a key element of XML. XPath 2.0 has emerged as a robust language twice the size of its predecessor, complex and capable of standing on its own.
This substantive volume, by the editor of the W3C® XSLT 2.0 specification, is the authoritative reference on XPath 2.0. It... |
|
|
|
GNU Octave Beginner's Guide
Using a range of very different examples, this beginner's guide will take you through the
most important aspects of GNU Octave. The book starts by introducing how you work with
mathematical objects like vectors and matrices, demonstrating how to perform simple
arithmetic operations on these objects and explaining how to use some of... | | CSS Pocket Reference (Pocket Reference)
Cascading Style Sheets (CSS) is the W3C standard for the visual
presentation of web pages (although it can be used in other
settings as well). After a short introduction to the key concepts
of CSS, this pocket reference provides an alphabetical reference
to all CSS3 selectors, followed by an alphabetical reference to... | | Cryptography Engineering: Design Principles and Practical Applications
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the... |
|
|
Result Page: 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 |