Home | Amazing | Today | Tags | Publishers | Years | Search 
Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010
Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010

These proceedings contain the papers presented at the 8th Internationl Symposium on Automated Technology for Verification and Analysis held during September 21–24, 2010 in Singapore. The primary objective of the ATVA conferences remains the same: to exchange and promote the latest advances of state-of-the-art research on...

Arduino Internals
Arduino Internals

Let's investigate the inner-workings of your Arduino. It appears to be a simple machine, but it is not. Much effort has been invested to make it easy to learn and use. Unfortunately, these good intentions can mask some of the Arduino's underlying capabilities. You suspected that there was more, much more, under the simplistic...

Transactions on Data Hiding and Multimedia Security VI
Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed introduction of these four papers, please refer to the Preface written by the organizers...
Combinatorial Image Analysis: 14th International Workshop, IWCIA 2011
Combinatorial Image Analysis: 14th International Workshop, IWCIA 2011
This volume includes the articles presented at the 14th International Workshop on Combinatorial Image Analysis, IWCIA 2011, held in Madrid, Spain, May 23–25, 2011. The 13 previous meetings were held in Paris (France) 1991, Ube (Japan) 1992, Washington D.C. (USA) 1994, Lyon (France) 1995, Hiroshima (Japan) 1997, Madras...
Aspects of Natural Language Processing: Essays Dedicated to Leonard Bolc on the Occasion of His 75th Birthday
Aspects of Natural Language Processing: Essays Dedicated to Leonard Bolc on the Occasion of His 75th Birthday
This book is dedicated to Professor Leonard Bole on the occasion of his 75th birthday, and contains essays written by his friends, former students and col- leagues to celebrate his scientific career. For many years Leonard Bole has played an important role in the Polish computer science community. He was especially known for...
Apache Tomcat 7
Apache Tomcat 7
The first edition of this book covered the then-new Jakarta Tomcat 4. Tomcat has come a long way from there, becoming Apache Tomcat in the process, with version 7 released in January 2011. During this time, Tomcat has become the most popular and used Java servlet container on the market. Other open source application servers also...
.NET 4.0 Generics Beginner's Guide
.NET 4.0 Generics Beginner's Guide
It is my pleasure to write the foreword to a book which will introduce you to the world of generic programming with C# and other .NET languages. You will be able to learn a lot from this book, as it introduces you to the elegant power of generic programming in C#. Through it, you will become a better C# programmer, and a better programmer in...
Microsoft SharePoint 2010 development cookbook
Microsoft SharePoint 2010 development cookbook
There is a heavy demand in the marketplace for SharePoint developers that you could take advantage of—if only you had the opportunity to acquire the relevant skills! However, SharePoint 2010 is a big, old, product with a steep learning curve—so where do you begin?

This book has been designed to take the
...
Professional Cross-Platform Mobile Development in C#
Professional Cross-Platform Mobile Development in C#

PEOPLE TAKE UP MOBILE DEVELOPMENT these days for a lot of reasons. For some it is all about learning something new, but for many it comes out of necessity of a job or career. Perhaps you see mobile development as the next big thing, just like client-server development was in the 1990s, or web development became in the 2000s. Maybe...

iOS Development using MonoTouch Cookbook
iOS Development using MonoTouch Cookbook
Technology is advancing quite rapidly. Portable devices, such as media players, smartphones, and tablets, have brought huge advancements and changes in the way people communicate, share, and consume digital content. Developers need to be up-to-date with the available platforms these devices work on, if they want to be "part of the...
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Come, Let's Play: Scenario-Based Programming Using LSCs and the Play-Engine
Come, Let's Play: Scenario-Based Programming Using LSCs and the Play-Engine
This book does not tell a story. Instead, it is about stories. Or rather, in technical terms, it is about scenarios. Scenarios of system behavior. It concentrates on reactive systems, be they software or hardware, or combined computer-embedded systems, including distributed and real-time systems.

We propose a
...
Result Page: 797 796 795 794 793 792 791 790 789 788 787 786 785 784 783 782 781 780 779 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy