Home | Amazing | Today | Tags | Publishers | Years | Search 
The Theory of Computation
The Theory of Computation

This is the best text on complexity theory I have seen, and could easily become the standard text on the subject...This is the first modern text on the theory of computing. ---William Ward Jr, Ph.D, University of South Alabama

Taking a practical approach, this modern introduction to the theory of computation focuses on the study of...

Pro Silverlight 4 in VB
Pro Silverlight 4 in VB

Silverlight 4 is the latest iteration of Microsoft's cross-browser technology for creating rich user experiences on the Web. Like its predecessor, Silverlight 3, it rides atop the .NET Framework for maximum ease of use and coding efficiency. The new technology carries forward much of the work that has been done before and augments it in...

Automated Database Applications Testing: Specification Representation for Automated Reasoning
Automated Database Applications Testing: Specification Representation for Automated Reasoning

This book introduces SpecDB, an intelligent database created to represent and host software specifications in a machine-readable format, based on the principles of artificial intelligence and unit testing database operations. SpecDB is demonstrated via two automated intelligent tools. The first automatically generates database constraints...

Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

Compiler Design: Virtual Machines
Compiler Design: Virtual Machines

While compilers for high-level programming languages are large complex software systems, they have particular characteristics that differentiate them from other software systems. Their functionality is almost completely well-defined – ideally there exist complete precise descriptions of the source and target languages, while additional...

Moodle 2.0 First Look
Moodle 2.0 First Look

The book looks at the main functional areas of Moodle that have significant new features, explains the new features and how to use them. It draws attention to significant differences from how things used to behave, and gives the reader an idea of the kind of consequences these changes will bring to them. If you are an existing Moodle user,...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

C# in Depth, Second Edition
C# in Depth, Second Edition

C# has changed significantly since it was first introduced. With the many upgraded features, C# is more expressive than ever. However, an in depth understanding is required to get the most out of the language.

C# in Depth, Second Edition is a thoroughly revised, up-to-date book that covers the new features of C# 4...

Electrons and Phonons: The Theory of Transport Phenomena in Solids
Electrons and Phonons: The Theory of Transport Phenomena in Solids

LIKE a chemical compound, scientific knowledge is purified by recrystallization. When first published, each new grain of fact or theory shines from a mud of irrelevant or erroneous details. In subsequent discussion the grains are redissolved, and filtered. Finally, in books and treatises, the solution is allowed to precipitate into a single...

Breakthrough Strategic IT and Process Planning
Breakthrough Strategic IT and Process Planning

This book is the first publication that combines the principles of business process management with strategic IT planning; the result being a groundbreaking work on strategic IT and process planning. While Breakthrough Strategic IT and Process Planning focuses on the real world of organizations, extensive treatment is also devoted to the...

High-performance and Hardware-aware Computing
High-performance and Hardware-aware Computing

High-performance system architectures are increasingly exploiting heterogeneity: multi- and manycore-based systems are complemented by coprocessors, accelerators, and reconfigurable units providing huge computational power. However, applications of scientific interest (e.g. in high-performance computing and numerical simulation) are not yet...

Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Result Page: 850 849 848 847 846 845 844 843 842 841 840 839 838 837 836 835 834 833 832 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy