 |
|
 Graph-Theoretic Concepts in Computer Science: 35th International Workshop, WG 2009, Montpellier, France, June 24-26, 2009, Revised PapersThis book constitutes the thoroughly refereed post-conference proceedings of the 35th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2009, held in Montpellier, France, in June 2009.
The 28 revised full papers presented together with two invited papers were carefully reviewed and selected from 69 submissions.... |  |  |  |  |
|
 Understanding SCA (Service Component Architecture)Use SCA to Simplify the Development and Delivery of Service-Based Applications
Service Component Architecture (SCA) is a new programming model that enables developers to build distributed applications more efficiently and effectively than previous... |  |  Semantic Techniques in Quantum Computation
The idea of quantum computation, in the algorithmic sense, originated from the suggestion by Feynman (1982) that a computer based on the principles of quantum mechanics might be capable of efficiently simulating quantum systems of interest to physicists; such simulation seems to be very difficult with classical computers. Feynman’s... |  |  Java: The Good Parts
What if you could condense Java down to its very best features and build better applications with that simpler version? In this book, veteran Sun Labs engineer Jim Waldo reveals which parts of Java are most useful, and why those features make Java among the best programming languages available.
Every language eventually... |
|
|
 High Availability MySQL Cookbook
High Availability is something that all web sites hope to achieve, especially those that are linked to big companies.
MySQL, an open source relational database management system (RDBMS), can be made highly available to protect from corruption, hardware failure, software crashes, and user error. Running a MySQL setup is quite... |  |  Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great... |  |  NHibernate 2.x Beginner's Guide
NHibernate is an open source object-relational mapper, or simply put, a way to retrieve data from your database into standard .NET objects. Quite often we spend hours designing the database, only to go back and re-design a mechanism to access that data and then optimize that mechanism. This book will save you time on your project, providing... |
|
Result Page: 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 |