Home | Amazing | Today | Tags | Publishers | Years | Search 
Web and Wireless Geographical Information Systems: 10th International Symposium
Web and Wireless Geographical Information Systems: 10th International Symposium

Continuing advances in the development of wireless and Internet technologies generate ever increasing interest in the diffusion, usage, and processing of georeferenced data of all types. Spatially-aware wireless and Internet devices also offer new ways of accessing and analyzing geo-spatial information in both realworld and virtual spaces....

OpenLayers 2.10 Beginner's Guide
OpenLayers 2.10 Beginner's Guide

Web mapping is the process of designing, implementing, generating, and delivering maps on the World Wide Web and its products. OpenLayers is a powerful, community driven, open source, pure JavaScript web mapping library. With it, you can easily create your own web map mashup using WMS, Google Maps, and a myriad of other map backends....

Using Microsoft Publisher 2010
Using Microsoft Publisher 2010

Those of you who know me (or my work) know that I am best known for the books and articles that I have written about enterprise networking products, such as Exchange Server and Office Communications Server. Even so, I decided to take a break from the norm and write a book on Microsoft Publisher 2010.

The reason why I decided to...

Formal Verification of Object-Oriented Software: International Conference, FoVeOOS 2010
Formal Verification of Object-Oriented Software: International Conference, FoVeOOS 2010

Formal software verification has outgrown the area of academic case studies, and industry is showing serious interest. The logical next goal is the verification of industrial software products. Most programming languages used in industrial practice are object-oriented, e.g., Java, C++, or C#. The International Conference on Formal...

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

Treewidth: Computations and Approximations (Lecture Notes in Computer Science)
Treewidth: Computations and Approximations (Lecture Notes in Computer Science)

This treatise investigates a number of problems related to treewidth and pathwidth of graphs. The main objective is to obtain good bounds on the complexity of determining the treewidth and pathwidth for various classes of graphs.

Originating from the author's Ph.D. thesis, this monograph presents original own work....

The Social Semantic Web
The Social Semantic Web

The Social Web (including services such as MySpace, Flickr, last.fm, and WordPress) has captured the attention of millions of users as well as billions of dollars in investment and acquisition. Social websites, evolving around the connections between people and their objects of interest, are encountering boundaries in the areas of information...

Replication: Theory and Practice
Replication: Theory and Practice

Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have traditionally looked at replication from different viewpoints and with different goals (e.g., performance versus fault tolerance), recent developments have led to a convergence of these different...

PowerPivot for Business Intelligence Using Excel and SharePoint
PowerPivot for Business Intelligence Using Excel and SharePoint

PowerPivot comprises a set of technologies for easy access to data mining and business intelligence analysis from Microsoft Excel and SharePoint. Power users and developers alike can create sophisticated, online analytic processing (OLAP) solutions using PowerPivot for Excel, and then share those solutions with other users via PowerPivot for...

Financial Modelling in Python (The Wiley Finance Series)
Financial Modelling in Python (The Wiley Finance Series)

"Fletcher and Gardner have created a comprehensive resource that will be of interest not only to those working in the field of finance, but also to those using numerical methods in other fields such as engineering, physics, and actuarial mathematics. By showing how to combine the high-level elegance, accessibility, and flexibility of...

Cloud Computing: Principles, Systems and Applications (Computer Communications and Networks)
Cloud Computing: Principles, Systems and Applications (Computer Communications and Networks)

Cloud computing continues to emerge as a subject of substantial industrial and academic interest. Although the meaning and scope of “cloud computing” continues to be debated, the current notion of clouds blurs the distinctions between grid services, web services, and data centers, among other areas. Clouds also bring...

Topological Methods in Data Analysis and Visualization: Theory, Algorithms, and Applications (Mathematics and Visualization)
Topological Methods in Data Analysis and Visualization: Theory, Algorithms, and Applications (Mathematics and Visualization)

The deluge of data observed throughout research and industry has turned the analysis of the resulting information into the primary limiting factor for the rapid progress of science, engineering, and medicine. The field of visualization strives to tackle this data analysis challenge by devising visual representations that afford users an...

Result Page: 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy