Home | Amazing | Today | Tags | Publishers | Years | Search 
Rewriting Logic and Its Applications: 8th International Workshop, WRLA 2010
Rewriting Logic and Its Applications: 8th International Workshop, WRLA 2010
Rewriting is a form of inference, and one that interacts in several ways with other forms of inference such as decision procedures and proof search. We discuss a range of issues at the intersection of rewriting and inference. How can other inference procedures be combined with rewriting? Can rewriting be used to describe...
JavaFX 2.0: Introduction by Example
JavaFX 2.0: Introduction by Example

JavaFX 2.0 is Java’s next generation graphical user interface (GUI) toolkit for developers to rapidly build

rich cross-platform applications. Built from the ground up, JavaFX takes advantage of modern GPUs through hardware-accelerated graphics while providing well-designed programming interfaces enabling developers to
...
XAML Developer Reference
XAML Developer Reference
XAML is ubiquitous today. Whether with Silverlight, WPF, WF, various XPS formats, or XML-based formats, XAML is being used in a whole lot of Microsoft platform- based technologies. Though based on XML, XAML is unlike most other markup languages, because it is strongly linked to CLR assemblies through its objects.
 
...
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Guide to Web Development with Java: Understanding Website Creation
Guide to Web Development with Java: Understanding Website Creation
I have been teaching web development for 14 years. I started with Perl. I can still remember the behemoth programs that contained all the logic and HTML. I remember using a text editor to write the program. Debugging consisted of a lot of print statements. It was a fun time, full of exploration, but I do not miss them.

...
Social Media for Trainers: Techniques for Enhancing and Extending Learning (Essential Tools Resource)
Social Media for Trainers: Techniques for Enhancing and Extending Learning (Essential Tools Resource)

This book is intended primarily for the workplace training practitioner, working partly or entirely in the traditional four - walled classroom. It will also be of use to those working in delivering training online via web conferencing tools, such as WebEx or Elluminate, and those involved in instructional design work for both traditional and...

Digital Control and Estimation: A Unified Approach (Prentice Hall Information and System Sciences Series)
Digital Control and Estimation: A Unified Approach (Prentice Hall Information and System Sciences Series)

Many books already exist on the topics of digital control and estimation. The prospective reader of this book might well then ask. "why another book in this area?"

One problem with the existing literature is that it emphasizes the differences between discrete and continuous theory. This dichotomy is largely
...

GSM System Engineering (Artech House Mobile Communications Series)
GSM System Engineering (Artech House Mobile Communications Series)
Cellular communications is one of the fastest growing and most challenging telecommunication applications ever. Today, it represents a large and continuously increasing percentage of all new telephone subscribers around the world. In the long term, cellular digital technology may become the universal way of communication.
...
Handbook of Cosmetic Science and Technology, Second Edition
Handbook of Cosmetic Science and Technology, Second Edition
Although cosmetics for the purpose of beautifying, perfuming, cleansing, or for rituals have existed since the origin of civilization, only in the 20th century great progress has been made in the diversification of products and functions and in the safety and protection of the consumer.

Before 1938, cosmetics were
...
Remote Sensing of Snow and Ice
Remote Sensing of Snow and Ice
Although our planet is characterized by water, the extent to which water in its frozen state plays a role in the functioning of the Earth is perhaps underappreciated. Snow and ice cover about a sixth of the Earth’s surface, as snow lying on the ground, as glaciers and larger masses of terrestrial ice, including the huge...
OGRE 3D 1.7 Application Development Cookbook
OGRE 3D 1.7 Application Development Cookbook

Harnessing the power of an elaborate graphics engine, such as Ogre 3D is time-consuming, but a highly rewarding pursuit. Developers, over the world, attest to Ogre's elegance, versatility, and efficiency, not to mention that its code is open source and supported by a thriving online community. This book explores many useful and fun ways...

Result Page: 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy