Home | Amazing | Today | Tags | Publishers | Years | Search 
Lectures in Game Theory for Computer Scientists
Lectures in Game Theory for Computer Scientists

Game playing is a powerful metaphor that fits many situations where interaction between autonomous agents plays a central role. Numerous tasks in computer science, such as design, synthesis, verification, testing, query evaluation, planning, etc. can be formulated in game-theoretic terms. Viewing them abstractly as games reveals the...

Next-Generation Internet: Architectures and Protocols
Next-Generation Internet: Architectures and Protocols

The field of computer networking has evolved significantly over the past four decades since the development of ARPANET, the first large-scale computer network. The Internet has become a part and parcel of everyday life virtually worldwide, and its influence on various fields is well recognized. The TCP/IP protocol suite and packet...

Microsoft Dynamics CRM 2011 Administration Bible
Microsoft Dynamics CRM 2011 Administration Bible

Welcome to the world of CRM! This chapter introduces you to the concepts of customer relationship management (CRM) without getting into many of the specifics about Dynamics CRM. If you are a long-time Dynamics CRM administrator, then you can focus on the XRM section of this chapter. If you have administered or used other CRM...

The Web Designer's Guide to iOS Apps: Create iPhone, iPod touch, and iPad apps with Web Standards
The Web Designer's Guide to iOS Apps: Create iPhone, iPod touch, and iPad apps with Web Standards

If you are a designer who knows HTML, CSS, and JavaScript, you can easily learn how to make native iPhone, iPod touch, and iPad apps—and distribute them worldwide via the App Store. When combined with an Objective-C framework, web standards can be used to format and style content for iOS, using native controls and behaviors for an...

Software Testing with Visual Studio 2010 (Microsoft .NET Development Series)
Software Testing with Visual Studio 2010 (Microsoft .NET Development Series)

AS A PROCES S IMPROVEMENT professional, I have experienced many team challenges. Big challenges. It is not unusual to see teams that seem so perfectly compatible start in excitement only to fizzle in different directions and end up not working together. Products suffer, customers suffer, and ultimately...

CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience
CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...

API Design for C++
API Design for C++

Writing large applications in C++ is a complex and tricky business. However, designing reusable C++ interfaces that are robust, stable, easy to use, and durable is even more difficult. The best way to succeed in this endeavor is to adhere to the tenets of good Application Programming Interface (API) design.

An API presents a...

Blender 2.5 Materials and Textures Cookbook
Blender 2.5 Materials and Textures Cookbook

The Blender 3D suite is probably one of the most used 3D creation and animation tools currently in existence. The reason for that popularity is both its tool set and the extraordinary fact that it can be downloaded free of charge. Blender has been around since 1998 but it was not until it entered the GNU General Public License, open source...

Alfresco 3 Records Management
Alfresco 3 Records Management

This book is structured in a sequential way that walks you through the steps necessary to set up your Alfresco Records Management system. Chapters follow a logical progression with each chapter building on the knowledge and implementation details learned in earlier chapters. If you are a records manager, business analyst, or a software...

Foundations of XML Processing: The Tree-Automata Approach
Foundations of XML Processing: The Tree-Automata Approach

Computer science, like other mathematical fields, cannot live without a tight relationship with reality. However, such a relationship is, frankly, not very common. This is probably why people so enthusiastically welcome a true meeting of theory and practice. In that sense, the coming together of XML and tree automata theory was a...

Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition
Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition

The success of a learning endeavor rests on several factors, including the complexity of the material and the level of direct involvement on the part of the student. It takes more than passive attendance at a lecture to learn most complex subjects. To truly learn and understand all of the elements of a complex issue requires exploration...

Advanced iOS 4 Programming: Developing Mobile Applications for Apple iPhone, iPad, and iPod touch
Advanced iOS 4 Programming: Developing Mobile Applications for Apple iPhone, iPad, and iPod touch

This book is aimed primarily at application developers with a basic understanding of the C language and object-orientation concepts such as encapsulation and polymorphism. You don’t need to be an expert C coder to follow this book. All you need is a basic understanding of structures, pointers, and functions. That said, you will...

Result Page: 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 178 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy