Home | Amazing | Today | Tags | Publishers | Years | Search 
Business Process Model and Notation: Third International Workshop, BPMN 2011
Business Process Model and Notation: Third International Workshop, BPMN 2011

The Business Process Model and Notation (BPMN) has seen a huge uptake in both academia and industry over the past years. It is seen by many as the de facto standard for business process modeling and has become very popular with business analysts, tool vendors and end users. As of version 2.0, the BPMN contains a comprehensive set of...

Android 3.0 Animations: Beginner's Guide
Android 3.0 Animations: Beginner's Guide

Android 3.0 Animation, a Beginner's Guide, will introduce each of the most popular animation techniques to you as an Android developer. Using step-by-step instructions, you will learn how to create interactive dynamic forms, moving graphics, and 3D motion.

You will be taken on a journey from simple stop motion animations...

Handbook of Pattern Recognition & Computer Vision
Handbook of Pattern Recognition & Computer Vision

The area of pattern recognition and computer vision, after over 35 years of continued development, has now reached its maturity. The theories, techniques and algorithms are mostly well developed. There are a number of applications which are still being explored. New approaches motivated by applications and new computer architectures...

PHP & MySQL: The Missing Manual
PHP & MySQL: The Missing Manual

You’ve built a web page in HTML. You’ve even styled it with Cascading Style Sheets (CSS) and written a little JavaScript to validate your custom-built web forms. But that wasn’t enough, so you learned a lot more JavaScript, threw in some jQuery, and constructed a whole lot of web pages. You’ve even moved your...

Software Reliability Methods (Texts in Computer Science)
Software Reliability Methods (Texts in Computer Science)

This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software...

Engineering Secure Software and Systems: Third International Symposium
Engineering Secure Software and Systems: Third International Symposium

It is our pleasure to welcome you to the third edition of the International Symposium on Engineering Secure Software and Systems.

This unique event aims at bringing together researchers from software engineering and security engineering, which might help to unite and further develop the two communities in this and future...

Financial Cryptography and Data Security: 12th International Conference, FC 2008
Financial Cryptography and Data Security: 12th International Conference, FC 2008

I am are very happy to have taken part in the 12th Financial Cryptography and Data Security Conference (FC 2008). Due to the recent growth in the number of security and cryptography venues, the competition for high-quality submissions has been on the rise. Despite that, the continued success of FC is attested by the research...

Windows PowerShell in Action, Second Edition
Windows PowerShell in Action, Second Edition

Well, it’s been a wild ride since the first edition of this book was released. At that time, PowerShell had just shipped and had a fairly limited scope of influence. Things have changed a lot. PowerShell now ships in the box with Windows (at least Windows 7 and Server 2008 R2). The number of PowerShell users is now in the hundreds...

Chromatography for Sustainable Polymeric Materials: Renewable, Degradable and Recyclable
Chromatography for Sustainable Polymeric Materials: Renewable, Degradable and Recyclable

Polymericmaterials, both “inert” and degradable, constantly interact with the surroundings. Because of this interaction changes take place in the polymer matrix and small molecules are released to the environment. Reliable methods for testing biodegradability and environmental interaction of renewable resources and...

Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)
Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)

With all the fantastic Cisco documentation available online, why does the world of UCCE need this book? UCCE is such a big topic that it would be easy to think that it is possible to try and cover absolutely everything. Unfortunately, this would turn this book into nothing more than a product reference manual that could potentially be...

Approximation Algorithms for NP-Hard Problems
Approximation Algorithms for NP-Hard Problems

Approximation algorithms have developed in response to the impossibility of solving a great variety of important optimization problems. Too frequently, when attempting to get a solution for a problem, one is confronted with the fact that the problem is NP-haid. This, in the words of Garey and Johnson, means "I can't find an...

101 Windows Phone 7 Apps, Volume I: Developing Apps 1-50
101 Windows Phone 7 Apps, Volume I: Developing Apps 1-50

INCLUDES COMPLETE CODE AND ASSETS FOR EACH APP IN THIS VOLUME!

 

Got a great idea for an app? There’s a chapter for that!

 

Calling all developers: Windows Phone 7 is starting to gain...

Result Page: 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy