Electron magnetic resonance in the time domain has been greatly facilitated by
the introduction of novel resonance structures and better computational tools, such
as the increasingly widespread use of density-matrix formalism. This second volume
in our series, devoted both to instrumentation and computation, addresses applications
and...
The history of database research over the past 30 years is one of exceptional
productivity that has led to the database system becoming arguably the most impor
tant development in the field of software engineering- The database is now the
underlying framework of the information system, and has fundamentally changed
the way many...
Few technical lerms have gained such rapid notoriety as the appela
tion "NP-complete." In the short lime since its introduction in the early
1970's, this term has come to symbolize the abyss of inherent intractability
that algorithm designers increasingly face as they seek to solve larger and
more complex problems. A...
With the increasing focus on IT Security comes a higher demand for identity management
in the modern business. This requires a flexible, scalable, and secure authentication
method. Identity control is made mandatory by many public standards, such as PCI, and
PKI is an essential component to set up authentication in many technologies,...
SharePoint 2010 is a complex product, and a diverse skill set is required to administer it. You have to be part database administrator (DBA), part web developer, part network administrator, and part server administrator to fully wrap your mind around this product. This book was written to help you do just that.
This book is about "threads" and how to use them. Thread" is just a name for
a basic software "thing" that can do work on a computer. A thread is smaller,
faster, and more maneuverable than a traditional process. In fact, once threads
have been added to an operating system, a "process" becomes just...
I am are very happy to have taken part in the 12th Financial Cryptography and
Data Security Conference (FC 2008). Due to the recent growth in the number of
security and cryptography venues, the competition for high-quality submissions
has been on the rise. Despite that, the continued success of FC is attested by
the research...
Maybe you've heard the story—or probably urban legend—about the university that didn't lay any grass or pour any concrete when it first opened, leaving the campus grounds as solid dirt. Then, as students began to traverse the campus from one class to the next, campus planners mapped the common paths they took, and then...
This book is the second of two volumes addressing the design challenges associated with new generations of semiconductor technology. The various chapters are compiled from tutorials presented at workshops in recent years by prominent authors from all over the world. Technology, productivity and quality are the main aspects under consideration...
The present volume is dedicated to aspects of algorithmic work in bioinformat
ics and computational biology with an emphasis on string algorithms that play
a central role in the analysis of biological sequences. The papers included are
a selection of articles corresponding to talks given at one of two meetings spon
sored by The Royal...
Don’t be fooled. Although the .5 might give the impression that Dreamweaver CS5.5 is a point release, it’s anything but. Dreamweaver engineers have packed a stunning amount of new features into this version. To mention just a few, there’s code hinting for the popular jQuery JavaScript library, the ability to see what pages...
A complete guide to Pentaho Kettle, the Pentaho Data lntegration toolset for ETL
This practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you’re a database administrator or developer, you’ll first get up to speed on Kettle basics and how to apply Kettle to create ETL...