Home | Amazing | Today | Tags | Publishers | Years | Search 
Object-Oriented Programming with Visual Basic.NET
Object-Oriented Programming with Visual Basic.NET
Visual Basic is arguably the most popular application development programming language in use today. Thousands, if not millions, of programmers use it every day to build both commercial and scientific applications. The language is also one of the most maligned programming languages, second perhaps only to Cobol.

...
.NET 4.0 Generics Beginner's Guide
.NET 4.0 Generics Beginner's Guide
It is my pleasure to write the foreword to a book which will introduce you to the world of generic programming with C# and other .NET languages. You will be able to learn a lot from this book, as it introduces you to the elegant power of generic programming in C#. Through it, you will become a better C# programmer, and a better programmer in...
Exim: The Mail Transfer Agent
Exim: The Mail Transfer Agent
Back in 1995, the central computing services at Cambridge University were running a variety of mail transfer agents, including Sendmail, Smail 3, and PP. Some years before, I had converted the systems whose mail I managed from Sendmail to Smail to make it easier to handle the special requir ements of the early 1990s...
Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Phase Transitions in Machine Learning
Phase Transitions in Machine Learning

From its inception in the 1930s, the rich and vigorous field of computer science has been concerned with the resources, both in time and in memory, needed to carry out a computation. A number of fundamental theorems were discovered that resorted to a worst-case analysis. The central question was whether a given algorithm could be...

Computer Vision: Detection, Recognition and Reconstruction (Studies in Computational Intelligence)
Computer Vision: Detection, Recognition and Reconstruction (Studies in Computational Intelligence)

Computer vision is the science and technology of making machines that see. It is concerned with the theory, design and implementation of algorithms that can automatically process visual data to recognize objects, track and recover their shape and spatial layout.

The International Computer Vision Summer School - ICVSS was...

From Gutenberg to Google: Electronic Representations of Literary Texts
From Gutenberg to Google: Electronic Representations of Literary Texts

Although this book focuses on the problems and potentials for electronic representations of the fundamental materials of document-based knowledge in literature, similar conditions obtain for representations of works in music, philosophy, history, the law, and religion. These fields find in paper documents the primary materials of...

Testing IT: An Off-the-Shelf Software Testing Process
Testing IT: An Off-the-Shelf Software Testing Process

Why is astronomy considered a science while astrology is considered only a pseudoscience? In other words, how can we prove that a theory faithfully describes reality, and that this theory can then be used to predict unknown facts? Karl Popper, the well-known philosopher, studied these problems and summarized his conclusions in one...

Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)
Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)

Written by four experienced Nokia Telecommunications software developers, this practical book focuses on object-based and component-based software development. The authors concentrate on the most important issues in real-life software development, such as the development process itself, software architecture, the development of user...

Challenges in Natural Language Processing (Studies in Natural Language Processing)
Challenges in Natural Language Processing (Studies in Natural Language Processing)

Throughout most of the 1960s, 1970s, and 1980s, computational linguistics enjoyed an excellent reputation. A sense of the promise of the work to society was prevalent, and high expectations were justified by solid, steady progress in research.

Nevertheless, by the close of the 1980s, many people openly expressed doubt about...

Emerging Wireless Technologies and the Future Mobile Internet
Emerging Wireless Technologies and the Future Mobile Internet
The current Internet is an outgrowth of the ARPANET (Advanced Research Projects Agency Network) that was initiated four decades ago. The TCP/IP (Transmission Control Protocol/Internet Protocol) designed by Vinton Cerf and Robert Kahn in 1973 did not anticipate, quite understandably, such extensive use of wireless channels and...
Recommender Systems: An Introduction
Recommender Systems: An Introduction

“Which digital camera should I buy? What is the best holiday for me and my family? Which is the best investment for supporting the education of my children? Which movie should I rent? Which web sites will I find interesting? Which book should I buy for my next vacation? Which degree and university are the best for my...

Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy