Home | Amazing | Today | Tags | Publishers | Years | Search 
Graph-Theoretic Concepts in Computer Science: 35th International Workshop, WG 2009, Montpellier, France, June 24-26, 2009, Revised Papers
Graph-Theoretic Concepts in Computer Science: 35th International Workshop, WG 2009, Montpellier, France, June 24-26, 2009, Revised Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 35th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2009, held in Montpellier, France, in June 2009.

The 28 revised full papers presented together with two invited papers were carefully reviewed and selected from 69 submissions....

Coherent Behavior in Neuronal Networks (Springer Series in Computational Neuroscience)
Coherent Behavior in Neuronal Networks (Springer Series in Computational Neuroscience)

Recent experimental research advances have led to increasingly detailed descriptions of how networks of interacting neurons process information. With these developments, it has become clear that dynamic network behaviors underlie information processing, and that the observed activity patterns cannot be fully explained by simple concepts such as...

SOA-Based Enterprise Integration: A Step-by-Step Guide to Services-based Application
SOA-Based Enterprise Integration: A Step-by-Step Guide to Services-based Application

Foreword by Ray Harishankar, IBM Fellow

"There are many books on the market on the topic of SOA and SOA's business and technology value. This book focuses on one of the key technical values of SOA and does an excellent job of describing SOA-based application integration by clarifying the relationship and patterns of SOA with other...

Understanding SCA (Service Component Architecture)
Understanding SCA (Service Component Architecture)

Use SCA to Simplify the Development and Delivery of Service-Based Applications

 

Service Component Architecture (SCA) is a new programming model that enables developers to build distributed applications more efficiently and effectively than previous...

Semantic Techniques in Quantum Computation
Semantic Techniques in Quantum Computation

The idea of quantum computation, in the algorithmic sense, originated from the suggestion by Feynman (1982) that a computer based on the principles of quantum mechanics might be capable of efficiently simulating quantum systems of interest to physicists; such simulation seems to be very difficult with classical computers. Feynman’s...

Java: The Good Parts
Java: The Good Parts

What if you could condense Java down to its very best features and build better applications with that simpler version? In this book, veteran Sun Labs engineer Jim Waldo reveals which parts of Java are most useful, and why those features make Java among the best programming languages available.

Every language eventually...

Mobile Intelligence (Wiley Series on Parallel and Distributed Computing)
Mobile Intelligence (Wiley Series on Parallel and Distributed Computing)

Nowadays, it is very common to see people everywhere and at anytime use mobile telecommunications devices, such as cellular/mobile phones, Personal Digital Assistants (PDAs), or laptop equipped with wireless connectivity to communicate with the network and access information. This phenomenon, which is generally known as mobile computing is...

Trust Management for Service-Oriented Environments
Trust Management for Service-Oriented Environments

The Web was originally created to enable the sharing of information among scientists. Sir Tim Berners-Lee first proposed the idea of creating a ?Web of information? when he suggested a solution to integrate three technologies: HTML (HyperText Markup Language), HTTP (HyperText Transfer Protocol), andWeb browsers [131]. HTML was proposed as a...

Oracle Database 11g Underground Advice for Database Administrators
Oracle Database 11g Underground Advice for Database Administrators

Today DBAs are expected to deploy and manage large databases with quality service and little to no downtime. The DBA's main focus is on increasing productivity and eliminating idle redundancy throughout the enterprise. However, there is no magic set of best practices or hard and fast rules that DBAs need to follow, and this can make life...

High Availability MySQL Cookbook
High Availability MySQL Cookbook

High Availability is something that all web sites hope to achieve, especially those that are linked to big companies.

MySQL, an open source relational database management system (RDBMS), can be made highly available to protect from corruption, hardware failure, software crashes, and user error. Running a MySQL setup is quite...

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...

NHibernate 2.x Beginner's Guide
NHibernate 2.x Beginner's Guide

NHibernate is an open source object-relational mapper, or simply put, a way to retrieve data from your database into standard .NET objects. Quite often we spend hours designing the database, only to go back and re-design a mechanism to access that data and then optimize that mechanism. This book will save you time on your project, providing...

Result Page: 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy