Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Java : Developing with Java 2, Micro Edition
Wireless Java : Developing with Java 2, Micro Edition
  • Master J2ME and its Mobile Information Device Profile (MIDP)
  • Learn how to program MIDlets, Java's answer to building wireless distributed applications
  • Gain the skills needed to use one of the most popular programming languages in next-generation applications

Despite Java’s...

Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing begins with the introduction of multimedia information applications, the need for the development of the multimedia database management systems (MDBMSs), and the important issues and challenges of multimedia systems. The temporal relations, the spatial relations, the spatio-temporal...
Mastering Dojo: JavaScript and Ajax Tools for Great Web Experiences (Pragmatic Programmers)
Mastering Dojo: JavaScript and Ajax Tools for Great Web Experiences (Pragmatic Programmers)
The last couple of years have seen big changes in server-side web programming. Now it's the client's turn; Dojo is the toolkit to make it happen and Mastering Dojo shows you how.

Dojo is a set of client-side JavaScript tools that help you build better web applications. Dojo blurs the line between local, native applications and browser based...

Using Hoshin Kanri to Improve the Value Stream
Using Hoshin Kanri to Improve the Value Stream
Every industrial engineer should purchase Using Hoshin Kanri to Improve the Value Stream. It provides the key to using the Hoshin Kanri framework and integrating it with the foundations of industrial engineering.

— Marjorie Koch, President, Lean Division, Institute of Industrial Engineers

Cudneys book...

Business Information Systems: 14th International Conference, BIS 2011, Pozna, Poland
Business Information Systems: 14th International Conference, BIS 2011, Pozna, Poland

BIS 2011 held in Pozna´n, Poland, was the 14th in a series of international conferences on business information systems. The BIS conference series has been recognized by professionals from the very beginning as a forum for the exchange and dissemination of topical research in the development, implementation, application and...

Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
The International Workshop on Complex Networks—CompleNet (www.complenet.org)—was initially proposed in 2008 with the first workshop taking place in 2009. The initiative was the result of efforts from researchers from the Bio-Complex Laboratory in the Department of Computer Sciences at Florida Institute of...
Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict
Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict

The 1999 conflict between India and Pakistan near the town of Kargil in contested Kashmir was the first military clash between two nuclear-armed powers since the 1969 Sino-Soviet war. Kargil was a landmark event not because of its duration or casualties, but because it contained a very real risk of nuclear escalation. Until the Kargil...

Practical JavaScript, DOM Scripting and Ajax Projects
Practical JavaScript, DOM Scripting and Ajax Projects
Practical JavaScript, DOM, and Ajax Projects is ideal for web developers already experienced in JavaScript who want to take their knowledge to the next level. It presents ten complete example projects for you to learn from and adapt for use in your own work.

The book starts with a quick recap of the fundamentals of modern JavaScript...

Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
SharePoint 2010 Disaster Recovery Guide
SharePoint 2010 Disaster Recovery Guide

If you’ve done any previous research on SharePoint disaster recovery topics, such as content recovery, backup and restore, and high availability, you’ve probably found quite a bit of information on the subject. That held true for us when we wrote the original Disaster Recovery Guide for SharePoint 2007, and it’s just as true...

Maximizing ASP.NET Real World, Object-Oriented Development
Maximizing ASP.NET Real World, Object-Oriented Development

Using ASP.NET, you can build Web applications that deliver unprecedented power and performance. But to make the most of ASP.NET, Web developers need to think and work very differently from the ways they've programmed in the past. In Maximizing ASP.NET Jeffrey Putz helps you make the transitionand reap the rewards.

...
Rare Event Simulation using Monte Carlo Methods
Rare Event Simulation using Monte Carlo Methods
In a probabilistic model, a rare event is an event with a very small probability of occurrence. The forecasting of rare events is a formidable task but is important in many areas. For instance a catastrophic failure in a transport system or in a nuclear power plant, the failure of an information processing system in a bank, or in the communication...
Result Page: 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy