Home | Amazing | Today | Tags | Publishers | Years | Search 
XML and Java: Developing Web Applications
XML and Java: Developing Web Applications

XML and Java: Developing Web Applications is a tutorial that will teach Web developers, programmers, and system engineers how to create robust XML business applications for the Internet using the Java technology. The authors, a team of IBM XML experts, introduce the essentials of XML and Java development, from a review of basic concepts to...

Mobile Image Communication Using JPEG2000
Mobile Image Communication Using JPEG2000
This thesis is concerned with image communication considering all stages from the beginning to the very end. In order to appropriately handle large raster imagery, the fundamental goal is to reduce the influence of the most limiting factors in mobile environments. In a clear departure from the traditional strategies, this goal is reached by...
Guide to Advanced Empirical Software Engineering
Guide to Advanced Empirical Software Engineering
Empirical studies have become an integral element of software engineering research and practice. This unique text/reference includes chapters from some of the top international empirical software engineering researchers and focuses on the practical knowledge necessary for conducting, reporting and using empirical methods in software engineering....
Computer Networking Illuminated (Jones and Bartlett Illuminated)
Computer Networking Illuminated (Jones and Bartlett Illuminated)
The study of computer networking concepts and administration is an essential part of the education of computer science and information science students. A basic networking course should provide a strong theoretical background, practice in network design and creation, and the experience of maintaining and managing a network. Having taught computer...
The Art of Computer Programming. Vol 1: Fundamental Algorithms. 2nd Printing.
The Art of Computer Programming. Vol 1: Fundamental Algorithms. 2nd Printing.

Fundamental Algorithms begins with mathematical preliminaries. The first section offers a good grounding in a variety of useful mathematical tools: proof techniques, combinatorics, and elementary number theory. Knuth then details the MIX processor, a virtual machine architecture that serves as the programming target for subsequent...

Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003
Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003
SAC 2003 was the tenth in a series of annual workshops on Selected Areas in Cryptography. This marked the third time that the workshop had been held at Carleton University in Ottawa with previous workshops being held there in 1995 and 1997. The intent of the SAC workshops is to provide a relaxed atmosphere in which researchers in cryptography can...
Patterns for Performance and Operability: Building and Testing Enterprise Software
Patterns for Performance and Operability: Building and Testing Enterprise Software
Structured to follow the software life cycle, Patterns for Performance and Operability provides advice and examples-based instructions at every phase. You can read it from start to finish or go directly to those chapters that interest you the most. Whatever approach you choose, you will learn:

How to:

·...

Creating Assertion-Based IP (Series on Integrated Circuits and Systems)
Creating Assertion-Based IP (Series on Integrated Circuits and Systems)
Assertion-based IP is much more than a comprehensive set of related assertions. It is a full-fledged reusable and configurable transaction-level verification component, which is used to detect both interesting and incorrect behaviors. Upon detecting interesting or incorrect behavior, the assertion-based IP alerts other verification components...
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to...
Pro SharePoint 2007 Development Techniques
Pro SharePoint 2007 Development Techniques
The landscape of doing SharePoint development has changed considerably in the last year, with the release of SharePoint Server 2007 and its related technologies. You need a contemporary reference to stay on top of the latest ways to combine .NET development techniques with your SharePoint development techniques, and SharePoint 2007 Development...
Recent Advances in Modeling and Simulation Tools for Communication Networks and Services
Recent Advances in Modeling and Simulation Tools for Communication Networks and Services
Simulation for research and design accounts for a substantial fraction of engineering computation. With valid and credible models, simulation is often dramatically more cost-effective than are real experiments, which can be expensive, dangerous, or, in fact, impossible because a new system may not yet be available.

Modeling and
...
Computers and Education: Towards Educational Change and Innovation
Computers and Education: Towards Educational Change and Innovation
This volume contains a selection of papers covering the latest research and experiences on the application of Information and Communication Technologies in the field of Education, especially in the Ibero-American space.

Areas covered include:

- Design, development and evaluation of innovative educational environments
-
...

Result Page: 782 781 780 779 778 777 776 775 774 773 772 771 770 769 768 767 766 765 764 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy