Home | Amazing | Today | Tags | Publishers | Years | Search 
Multiparadigm Constraint Programming Languages (Cognitive Technologies)
Multiparadigm Constraint Programming Languages (Cognitive Technologies)

"Modeling" has become one of the primary concerns in modern Software Engineering. The reason is simple: starting development processes from clear and succinct models has proven to foster not only quality but also productivity. With the advance of modeling there also came a desire for automatic code generation from models....

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Windows Small Business Server 2011 Administrator's Companion
Windows Small Business Server 2011 Administrator's Companion

If you run a small business, you don’t need us to tell you that the highly competitive marketplace, unpredictable economic cycles, time pressures, and technological demands are constantly exerting pressure on your bottom line.

Your business needs the same technologies that large companies do. You need the...

Damage and Interfacial Debonding in Composites (Studies in Applied Mechanics)
Damage and Interfacial Debonding in Composites (Studies in Applied Mechanics)

This book represents thirteen papers that are based on the presentations made in the five session symposium on "Damage and Interfacial Debonding in Composites" on the occasion of the 32nd Society of Engineering Science Meeting; held in New Orleans, Louisiana, October 29 - November 1, 1995. The five sessions were mainly in the...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Microsoft SQL Server 2008 R2 Administration Cookbook
Microsoft SQL Server 2008 R2 Administration Cookbook

Most books about SQL Server take one of the two approaches. The first approach is to provide a broad introduction to SQL Server administration. While overviews are great for beginners, they don't provide enough information, leaving the reader wanting for details and practical advice. The second approach is to attempt to cover every...

Microsoft Project 2010 Inside Out
Microsoft Project 2010 Inside Out

Welcome to Microsoft Project 2010 Inside Out. This book is your comprehensive Project 2010 reference, in which you can learn not only the essentials, but also the intermediate topics and advanced techniques for using Project 2010 like a power user.

Conquer Microsoft Project 2010—from the inside out!

...

Bionanotechnology: Lessons from Nature
Bionanotechnology: Lessons from Nature

Today is the most exciting time to be working in nanotechnology, and bionanotechnology in particular. Chemistry, biology, and physics have revealed an immense amount of information on molecular structure and function, and now we are poised to make use of it for atomic-level engineering. New discoveries are being made every day, and...

Informatics in Control, Automation and Robotics: Selected Papers from the International Conference on Informatics in Control, Automation and Robotics 2007
Informatics in Control, Automation and Robotics: Selected Papers from the International Conference on Informatics in Control, Automation and Robotics 2007

The present book includes a set of selected papers from the fourth “International Conference on Informatics in Control Automation and Robotics” (ICINCO 2007), held at the University of Angers, France, from 9 to 12 May 2007. The conference was organized in three simultaneous tracks: “Intelligent Control Systems and...

Migrating to iPhone and iPad for .NET Developers
Migrating to iPhone and iPad for .NET Developers

Ever since I spotted and started reading my first computer book in 1981, I knew Information Technology (IT) was going to be an important part of my life. I feel privileged to have been able to make a career out of something I enjoy, and the fact that it changes on what seems to be a monthly basis means it never gets boring. It still...

Linking Government Data
Linking Government Data

The Linked Open Data Project started just four years ago in 2007. In that short time Linked Data has grown into an almost mainstream activity for many governments around the world. As of this writing, the US Government’s open data site listed twenty one countries whose governments publish open data regarding the operations of...

Digital Asset Management
Digital Asset Management

My interest in this subject started when I joined the broadcast equipment manufacturer, Chyron. For a few years I was the product manager for their playout automation and asset management product lines. These were one of the first applications that gave television broadcasters the means to manage the ingest, storage, archiving, and...

Result Page: 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 772 771 770 769 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy