Home | Amazing | Today | Tags | Publishers | Years | Search 
Product-Focused Software Process Improvement: 12th International Conference, PROFES 2011
Product-Focused Software Process Improvement: 12th International Conference, PROFES 2011

On behalf of the PROFES Organizing Committee we are proud to present the proceedings of the 12th International Conference on Product-Focused Software Process Improvement (PROFES 2011), held in Torre Canne, Italy. Since 1999 PROFES has grown in the software engineering community and has become a premium conference that brings together...

Problem Solving Methods
Problem Solving Methods

Researchers in Artificial Intelligence have traditionally been classified into two categories: the “neaties” and the “scruffies”. According to the scruffies, the neaties concentrate on building elegant formal frameworks, whose properties are beautifully expressed by means of definitions, lemmas, and theorems, but...

Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)
Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)

The specifications in this book are the result of a number of case studies performed by researchers from the Programming Research Group at the University of Amsterdam. The primary goal was to study the use of the techniques developed by the Programming Research Group for the specification of real-life protocols. From the pool of...

Networking Fundamentals: Wide, Local and Personal Area Communications
Networking Fundamentals: Wide, Local and Personal Area Communications

Information networking has emerged as a multidisciplinary diversified area of research over the past few decades. From traditional wired telephony to cellular voice telephony and from wired access to wireless access to the Internet, information networks have profoundly impacted our lifestyle. At the time of writing, over 3 billion...

SolidWorks 2011 Parts Bible
SolidWorks 2011 Parts Bible

SolidWorks as a topic of learning is a huge, sprawling expanse. There is a lot to know, and a lot to write about. While I have made every effort to be complete in this book, I'm sure there are some niche topics that have gone untreated. New in 2011, I have taken this book from a single volume of an immense scope to two individual volumes,...

Introduction to Cryptography
Introduction to Cryptography

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Seductive Interaction Design: Creating Playful, Fun, and Effective User Experiences (Voices That Matter)
Seductive Interaction Design: Creating Playful, Fun, and Effective User Experiences (Voices That Matter)

This book is primarily about principles of human behavior: why people do the things they do, feel the things they feel, and make particular choices.

But there’s more to this book.

If trying to understand human behavior was the only goal, I’d have stopped by now and pointed you to dozens of other...

Networks for Grid Applications: Third International ICST Conference, GridNets 2009
Networks for Grid Applications: Third International ICST Conference, GridNets 2009

The GridNets conference is an annual international meeting that provides a focused and highly interactive forum where researchers and technologists have an opportunity to present and discuss leading research, developments, and future directions in grid networking. The goal of this event is to serve as both the premier conference...

New Perspectives on Microsoft Office 2010, First Course
New Perspectives on Microsoft Office 2010, First Course

The New Perspectives Series’ critical-thinking, problem-solving approach is the ideal way to prepare students to transcend point-and-click skills and take advantage of all that Microsoft Office 2010 has to offer.

In developing the New Perspectives Series, our goal was to create books that give students the software...

Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference

Cutting planes (cuts) are very popular in the OR community, where they are used to strengthen the Linear Programming (LP) relaxation of Mixed-Integer Programs (MIPs) in the hope of improving the performance of an exact LPbased solver. In particular, an intense research effort has been devoted to the study of families of general cuts,...

Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Using Microsoft® Office for Mac 2011
Using Microsoft® Office for Mac 2011

Microsoft was committed to making Office for Mac 2011 a significant improvement over previous versions. To that end, the company focused on collaboration, compatibility, and ease of use, and laid out a four-pronged approach:

• Incorporate features from Office 2007 that were not added to Office 2008 for Mac.

...

Result Page: 126 125 124 123 122 121 120 119 118 117 116 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy