Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software for Dependable Systems: Sufficient Evidence?
Software for Dependable Systems: Sufficient Evidence?
Critical systems are often subject to certiication: a formal assurance that the system has met relevant technical standards designed to ensure it will not unduly endanger the public and can be depended upon to deliver its intended service safely and securely. Today, certiication1 of the dependability of a software-based system usually relies more...
Introduction to Reversible Computing (Chapman & Hall/CRC Computational Science)
Introduction to Reversible Computing (Chapman & Hall/CRC Computational Science)

Few books comprehensively cover the software and programming aspects of reversible computing. Filling this gap, Introduction to Reversible Computing offers an expanded view of the field that includes the traditional energy-motivated hardware viewpoint as well as the emerging application-motivated software approach.

...

Mac OS X for Java Geeks
Mac OS X for Java Geeks
Mac OS X for Java Geeks delivers a complete and detailed look at the Mac OS X platform, geared specifically at Java developers. Programmers using the 10.2 (Jaguar) release of Mac OS X, and the new JDK 1.4, have unprecedented new functionality available to them. Whether you are a Java newbie, working your way through...
Cloud and Precipitation Microphysics: Principles and Parameterizations
Cloud and Precipitation Microphysics: Principles and Parameterizations
This book focuses specifically on bin and bulk parameterizations for the prediction of cloud and precipitation at various scales - the cloud scale, mesoscale, synoptic scale, and the global climate scale. It provides a background to the fundamental principles of parameterization physics, including processes involved in the production of clouds, ice...
Emerging Systems Approaches in Information Technologies: Concepts, Theories and Applications
Emerging Systems Approaches in Information Technologies: Concepts, Theories and Applications
Through a systematic view of technologies, researchers are now finding it less complicated to examine, predict, and explain complex interactions between fields such as engineering and computer science. Emerging Systems Approaches in Information Technologies: Concepts, Theories, and Applications presents innovative research findings...
Introduction to Automata Theory, Languages and Computation (Addison-Wesley series in computer science)
Introduction to Automata Theory, Languages and Computation (Addison-Wesley series in computer science)

Ten years ago the authors undertook to produce a book covering the known material on formal languages, automata theory, and computational complexity. In retrospect, only a few significant results were overlooked in the 237 pages. In writing a new book on the subject, we find the field has expanded in so many new directions that a...

Dear Mr. Buffett: What An Investor Learns 1,269 Miles From Wall Street
Dear Mr. Buffett: What An Investor Learns 1,269 Miles From Wall Street

Janet Tavakoli takes you into the world of Warren Buffett by way of the recent mortgage meltdown. In correspondence and discussion with him over 2 years, they both saw the writing on the wall, made clear by the implosion of Bear Stearns. Tavakoli, in clear and engaging prose, explains how the credit mess happened beginning with the mortgage...

Windows NT SNMP
Windows NT SNMP

As communications networks grow in size and complexity, it becomes increasingly difficult to locally manage and control all of the devices (e.g., routers, servers, and workstations) on those networks. SNMP (Simple Network Management Protocol) gives you a way to manage network devices remotely. You can use SNMP to check on the...

Family Medicine Certification Review (Lipsky, Family Medicine Certification Review)
Family Medicine Certification Review (Lipsky, Family Medicine Certification Review)

Written by family physicians, this book is a comprehensive question-and-answer review for the American Board of Family Medicine certification and recertification exams. Questions match the content, complexity, and type of questions on the exam, and fifty clinical set problems—a major portion of the exam—are included.

...
Advanced Memory Optimization Techniques for Low-Power Embedded Processors
Advanced Memory Optimization Techniques for Low-Power Embedded Processors
The design of embedded systems warrants a new perspective because of the following two reasons: Firstly, slow and energy inefficient memory hierarchies have already become the bottleneck of the embedded systems. It is documented in the literature as the memory wall problem. Secondly, the software running on the contemporary embedded devices is...
Amazon Web Services Made Simple: Learn how Amazon EC2, S3, SimpleDB and SQS Web Services enables you to reach business goals faster
Amazon Web Services Made Simple: Learn how Amazon EC2, S3, SimpleDB and SQS Web Services enables you to reach business goals faster
Hundreds of thousands of customers have joined the Amazon Web Services™ community in order to build solutions for their businesses. The AWS cloud computing platform provides the flexibility to build your application, your way, regardless of your use case or industry. You can save time, money, and the difficulties of managing your own...
MintDuino: Building an Arduino-compatible Breadboard Microcontroller
MintDuino: Building an Arduino-compatible Breadboard Microcontroller
The MintDuino is deceiving—this little tin of electronics is capable of providing the brains for an unlimited number of devices limited only by your imagination… and, of course, your bank account.

While the MintDuino is certainly capable of being used during a moment of inspiration,
...
unlimited object storage image
Result Page: 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy