Home | Amazing | Today | Tags | Publishers | Years | Search 
Approximation and Online Algorithms: 7th International Workshop, WAOA 2009, Copenhagen
Approximation and Online Algorithms: 7th International Workshop, WAOA 2009, Copenhagen

The 7th Workshop on Approximation and Online Algorithms (WAOA 2009) focused on the design and analysis of algorithms for online and computationally hard problems. Both kinds of problems have a large number of applications from a variety of fields. WAOA 2009 took place in Copenhagen, Denmark, during September 10–11, 2009. The workshop...

Pattern Recognition: 31st DAGM Symposium, Jena, Germany, September 9-11, 2009, Proceedings
Pattern Recognition: 31st DAGM Symposium, Jena, Germany, September 9-11, 2009, Proceedings

In 2009, for the second time in a row, Jena hosted an extraordinary event. In 2008, Jena celebrated the 450th birthday of the Friedrich Schiller University of Jena with the motto “Lichtgedanken” – “flashes of brilliance.” This year, for almost one week, Jena became the center for the pattern recognition research...

Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009
Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009

This volume collects the papers accepted for presentation at MIRAGE 2009. The MIRAGE conference is continuing to receive international recognition, with this year’s presentations coming from 25 countries despite the large worldwide financial crisis. This time Asia submitted far fewer papers than previously and fewer than Europe. France...

Adaptive Multimedia Retrieval: Retrieval, User, and Semantics: 5th International Workshop, AMR 2007
Adaptive Multimedia Retrieval: Retrieval, User, and Semantics: 5th International Workshop, AMR 2007

This book is a selection of the revised contributions that were initially submitted to the International Workshop on Adaptive Multimedia Retrieval (AMR 2007). The workshop was organized at the University Pierre and Marie Curie in Paris, France, during July 5–6, 2007.

The goal of the AMR workshops is to intensify the exchange...

SharePoint 2010 Disaster Recovery Guide
SharePoint 2010 Disaster Recovery Guide

If you’ve done any previous research on SharePoint disaster recovery topics, such as content recovery, backup and restore, and high availability, you’ve probably found quite a bit of information on the subject. That held true for us when we wrote the original Disaster Recovery Guide for SharePoint 2007, and it’s just as true...

Out of the Inner Circle: A Hacker's Guide to Computer Security
Out of the Inner Circle: A Hacker's Guide to Computer Security

This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system....

Cyber Risks for Business Professionals: A Management Guide
Cyber Risks for Business Professionals: A Management Guide

The benefits which Internet technologies offer to business professionals also present considerable risks. The management of these risks is the focus of this book.

Realize the benefits of Internet technologies, while ensuring your company is protected from the associated risks!

An effective risk management...

Inside Microsoft SharePoint 2010
Inside Microsoft SharePoint 2010

The purpose of this book is to help you design and develop custom business solutions for SharePoint 2010, which includes the two products SharePoint Foundation and SharePoint Server 2010. Our goal is to teach you how to create, debug, and deploy the fundamental building blocks such as Features, Pages, Web Parts, Site Columns, Content...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

The iMovie '11 Project Book
The iMovie '11 Project Book

I love that I’ve been able to write a book about projects in iMovie. Editing video, after all, is a project in many ways. It often requires a good deal of time and attention to detail. It’s something you elect to do, probably in your spare time, because you want to document what happened at an event, or preserve memories,...

Microsoft SQL Server 2008 High Availability
Microsoft SQL Server 2008 High Availability

Every new version of SQL Server brings with it new tools and features for database administrators (DBAs), developers, and architects, for them to be able to provide an effective solution for the end users in a simpler and more efficient manner. The terms effective and efficiency can be measured in a technical perspective as High Availability...

Tuscany SCA in Action
Tuscany SCA in Action

What brought the five of us together to write a book on Apache Tuscany and Service Component Architecture (SCA)? We all had practical experience of how difficult and costly integration of applications and technologies can be, and we were excited about how Tuscany and SCA can help solve these problems. Having been involved...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy