|
|
|
|
|
Star Schema The Complete Reference
The definitive guide to dimensional design for your data warehouse
Learn the best practices of dimensional design. Star Schema: The Complete Reference offers in-depth coverage of design principles and their underlying rationales. Organized around design concepts and illustrated with detailed examples, this is a... | | Algorithms and Computation: 21st International Symposium, ISAAC 2010
This volume contains the proceedings of the 21st Annual International Symposium on Algorithms and Computations (ISAAC 2010), held in Jeju, Korea during December 15–17, 2010. Past editions have been held in Tokyo, Taipei, Nagoya, Hong Kong, Beijing, Cairns, Osaka, Singapore, Taejon, Chennai, Taipei, Christchurch, Vancouver, Kyoto, Hong... | | |
|
Game Programming Gems 6 (Book & CD-ROM)Welcome to the sixth volume of the Game Programming Gems series. With team sizes constantly expanding, developers are finding themselves pushed to become increasingly specialized. This makes it important to have cutting-edge, ready-to-use material in your specialization, as well as resources that you can call upon if you need to work outside your... | | Advanced Visual Basic 6: Power Techniques for Everyday ProgramsIn Advanced Visual Basic 6, leading Visual Basic expert Matthew Curland demonstrates powerhouse techniques programmers can use to write high-performance, robust, and reusable VB code. Readers learn how to leverage the close relationships between VB, COM, and OLE Automation, extending the envelope of VB's capabilities and... | | Engineering a Compiler, Second Edition
The practice of compiler construction changes continually, in part because the designs of
processors and systems change. For example, when we began to write Engineering a Compiler
(eac) in 1998, some of our colleagues questioned the wisdom of including a chapter on
instruction scheduling because out-of-order execution threatened to make... |
|
WebGL: Up and Running
In early 1994, Tim Berners-Lee put out an open call for a virtual reality specification for
the Web; Mark Pesce and I answered. Only being able to afford one plane ticket, we sent
Mark to Geneva to present our Labyrinth prototype at the first-ever World Wide Web
Developers’ Conference. With typical bombast, ... | | Hacking: The Art of ExploitationThis text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
Hacking is the art of creating problem solving, whether used to find an unconventional solution to... | | Tcl/Tk, Second Edition: A Developer's GuideTcl/Tk (Tool Command Language/Tool Kit) makes it fast and easy to implement any type of application, from games to network analyzers. Tcl/Tk is a full-bodied, mature programming platform used by NASA rocket scientists, Wall Street database experts, Internet designers, and open source programmers around the world. Tcl/Tk's multi-faceted and... |
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 |