Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management
S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management

This book constitutes the refereed proceedings of the First Workshop on Subject-Oriented Business Process Management, S-BPM ONE 2009, held in Karlsruhe, Germany, in October 2009. The papers are organized in topical sections on visionary engagements; essential capabilities; and penetration perspectives.

This volume contains a...

Business Information Systems: 14th International Conference, BIS 2011, Pozna, Poland
Business Information Systems: 14th International Conference, BIS 2011, Pozna, Poland

BIS 2011 held in Pozna´n, Poland, was the 14th in a series of international conferences on business information systems. The BIS conference series has been recognized by professionals from the very beginning as a forum for the exchange and dissemination of topical research in the development, implementation, application and...

Tabletops - Horizontal Interactive Displays (Human-Computer Interaction Series)
Tabletops - Horizontal Interactive Displays (Human-Computer Interaction Series)

This book is an attempt to bring together current research in the domain of interactive horizontal displays. The book integrates and summarises findings from the most important international tabletop research teams. It provides a state-of-the-art overview and allows for the discussion of emerging and future directions in research and...

Cloud Computing Bible
Cloud Computing Bible

In the five months that I have been researching and writing Cloud Computing Bible, it has become clear to me that most people recognize that cloud computing is a big deal, even if they are not really clear why that is so. Every day newspaper and magazine articles and radio and TV stories report on cloud computing. The phrase “in the...

Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A...

Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
The International Workshop on Complex Networks—CompleNet (www.complenet.org)—was initially proposed in 2008 with the first workshop taking place in 2009. The initiative was the result of efforts from researchers from the Bio-Complex Laboratory in the Department of Computer Sciences at Florida Institute of...
How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Unity for Architectural Visualization
Unity for Architectural Visualization

Transform your architectural design into an interactive real-time experience using Unity

Overview

  • Simple instructions to help you set up an interactive and real-time scene
  • Excellent tips on making your presentations attractive by creating interactive designs
  • Most important...
Continuous Delivery and DevOps: A Quickstart guide
Continuous Delivery and DevOps: A Quickstart guide

Streamline and optimize your workflow with this fast and engaging guide to continuous delivery and DevOps. Delivering quality software every time will become a way of life.

Overview

  • Real world and realistic examples of how to go about implementing continuous delivery and DevOps
  • Learn...
Learning ROS for Robotics Programming - Second Edition
Learning ROS for Robotics Programming - Second Edition

Your one-stop guide to the Robot Operating System

About This Book

  • Model your robot on a virtual world and learn how to simulate it
  • Create, visualize, and process Point Cloud information
  • Easy-to-follow, practical tutorials to program your own robots

Who...

Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)
Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)

Publius Syrus stated back in 42 B.C., “You cannot put the same shoe on every foot.” (Maxim 596) Though written long before the advent of forensic science, Syrus’ maxim summarizes the theme of Forensic Medicine of the Lower Extremity: Human Identification and Trauma Analysis of the Thigh, Leg, and Foot. Put simply, the lower...

TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

unlimited object storage image
Result Page: 806 805 804 803 802 801 800 799 798 797 796 795 794 793 792 791 790 789 788 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy