A course in computer programming provides the typical student's first exposure to the field of computer science. Most students in such a course will have used computers all their lives, for email, games, web browsing, word processing, social networking, and a host of other tasks, but it is not until they write their first programs that...
Data mining has developed rapidly and has become very popular in the past two decades, but actually has
its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases.
The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In
corporate...
Welcome to the Microsoft Office 2007 Fundamentals Projects Binder! The projects in this binder cover the primary features and
commands of Office 2007 and provide valuable opportunities to apply or extend skills learned in an accompanying textbook.
The 150 projects in this binder can be used with any Microsoft® Office 2007 textbook to...
When asked whether I’d be interested in writing a book about the
Google phone, I immediately jumped at the offer. Although I’ve been
a dyed-in-the-wool iPhone user since June 2007 (the day it came out),
the Google phone has piqued my interest from the fi rst day that I heard
about it. Since the early rumors of a Google...
We believe that learning in computer science and engineering should reflect the
current state of the field, as well as introduce the principles that are shaping computing.
We also feel that readers in every specialty of computing need to appreciate
the organizational paradigms that determine the capabilities, performance,
and,...
Enterprise Java Beans enable rapid and simplified development of secure and portable applications based on Java technology. Creating and using EJBs can be challenging and rewarding. Among the challenges are learning the EJB technology itself, learning how to use the development environment you have chosen for EJB development, and the testing...
This book covers every aspect of mobile app development, starting with major application components and screen layout and design, before moving on to how to manage sensors such as internal gyroscopes and near field communications. Towards the end, it delves into smartphone multimedia capabilities as well as graphics and animation, web access,...
The 16th International Conference on Applications of Natural Language to Information
Systems (NLDB 2011) was held during June 28–30, 2011, at the University
of Alicante, Spain. Since the first NLDB conference in 1995, the main
goal has been to provide a forum for the discussion and dissemination of research
on the integration of...
On behalf of the Program Committee, it is our pleasure to present to you the
proceedings of the 8th Conference on Detection of Intrusions and Malware &
Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international
experts from academia, industry and government to present and discuss
novel security research....
Real time 3D games have been around for well over ten years now. We’ve played them, created assets in
the style of our favorites, and maybe even “mod”ed a few of them. But until recently, the cost of licensing
one of the premier game engines has ranged from several hundred thousand to several million dollars
per title...
concerned with the study of the development and use of advanced information
technologies and systems for national, international, and societal security-related
applications. In the past few years,we have witnessed that ISI experienced tremendous
growth and attracted significant interest involving academic researchers in
related fields...
Books which examine the folklore of Europe's traditional "witch" plants are not uncommon, and some give some coverage to describing the psychotropic and hallucinogenic effects of these plants on the human body. However this book is rather more unusual than that in that the author is first and foremost a biochemist with an...