Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Databases and Information Systems VI: Selected Papers from the Ninth International Baltic Conference, DB&IS 2010 - Volume 224 Frontiers in Artificial Intelligence and Applications
Databases and Information Systems VI: Selected Papers from the Ninth International Baltic Conference, DB&IS 2010 - Volume 224 Frontiers in Artificial Intelligence and Applications
This volume presents papers from the Ninth International Baltic Conference on Databases and Information Systems (Baltic DB&IS 2010) which took place in Riga, Latvia, in July 2010. Since this successful biennial series began in 1994, the Baltic DB&IS conferences have become an international forum of high scientific criteria for...
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Novel Algorithms and Techniques in Telecommunications and Networking
Novel Algorithms and Techniques in Telecommunications and Networking
This book includes the proceedings of the 2008 International Conference on Telecommunications and Networking (TeNe).

TeNe 08 is part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 08).
...
Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003, Proceedings, Part I (Lecture Notes in Computer Science)
Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003, Proceedings, Part I (Lecture Notes in Computer Science)

These proceedings contain the papers presented at the 5th Annual Genetic and Evolutionary Computation Conference (GECCO 2003). The conference was held in Chicago, USA, July 12–16, 2003.

A total of 417 papers were submitted to GECCO 2003. After a rigorous doubleblind reviewing process, 194 papers were accepted for full
...

Artificial Intelligence: First CCF International Conference, ICAI 2018, Jinan, China, August 9-10, 2018, Proceedings (Communications in Computer and Information Science)
Artificial Intelligence: First CCF International Conference, ICAI 2018, Jinan, China, August 9-10, 2018, Proceedings (Communications in Computer and Information Science)
This book constitutes the refereed proceedings of the First CCF International Conference on Artificial Intelligence, CCF-ICAI 2018, held in Jinan, China in August, 2018.  The 17 papers presented were carefully reviewed and selected from 82 submissions. The papers are organized in topical sections on unsupervised...
Essential Issues in SOC Design: Designing Complex Systems-on-Chip
Essential Issues in SOC Design: Designing Complex Systems-on-Chip

This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.

SOC design is fast becoming the key...

CONCUR 2004 -- Concurrency Theory
CONCUR 2004 -- Concurrency Theory

This book constitutes the refereed proceedings of the 15th International Conference on Concurrency Theory, CONCUR 2004, held in London, UK in August/September 2004.

The 29 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 134 submissions. Among the topics covered are concurrency...

Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Agile Processes in Software Engineering and Extreme Programming: 8th International Conference, XP 2007, Como, Italy
Agile Processes in Software Engineering and Extreme Programming: 8th International Conference, XP 2007, Como, Italy
This book constitutes the refereed proceedings of the 8th International Conference on Agile Processes in Software Engineering and eXtreme Programming, XP 2007, held in Como, Italy in June 2007.

The 10 revised full papers and 16 revised short papers presented together with 4 poster papers, 18 experience papers, 2 research ideas and 3 panel...

Innovation, Communication and Engineering
Innovation, Communication and Engineering

This volume represents the proceedings of the 2013 International Conference on Innovation, Communication and Engineering (ICICE 2013). This conference was organized by the China University of Petroleum (Huadong/East China) and the Taiwanese Institute of Knowledge Innovation, and was held in Qingdao, Shandong, P.R. China, October 26 - November...

Software Testing and Quality Assurance: Theory and Practice
Software Testing and Quality Assurance: Theory and Practice
A superior primer on software testing and quality assurance, from integration to execution and automation

This important new work fills the pressing need for a user-friendly text that aims to provide software engineers, software quality professionals, software developers, and students with the fundamental developments in testing theory and...

ReactJS by Example- Building Modern Web Applications with React
ReactJS by Example- Building Modern Web Applications with React

Key Features

  • Create pragmatic real-world applications while learning React and its modern developer tools
  • Build sustainable user interfaces by transforming data into components of UI
  • Learn how to generate reusable ReactJS components effectively

Book Description

...

Result Page: 95 94 93 92 91 90 89 88 87 86 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy