Home | Amazing | Today | Tags | Publishers | Years | Search 
Implementation of the Icon Programming Language (Princeton Series in Computer Science)
Implementation of the Icon Programming Language (Princeton Series in Computer Science)

Icon is a high-level, general-purpose programming language that offers a broad range of string- and list-processing facilities. It also has a novel expression evaluation mechanism and allows an unusual degree of run-time flexibility. Because of these features, implementing Icon presents problems considerably different from those involved with...

Play Redux: The Form of Computer Games (Digital Culture Books)
Play Redux: The Form of Computer Games (Digital Culture Books)
A new look at digital gaming and the aesthetics of play
 
Play is a very interesting thing. Somewhat strangely, though, play is not studied as often as are the consequences of play.
 
The reason for this becomes clear when we try to study play: it is a...
Picture Yourself Creating Video Games
Picture Yourself Creating Video Games

Picture yourself creating your very own entertaining and exciting video games to play and share with others, without needing any programming knowledge or game creation experience. "Picture Yourself Creating Video Games" shows amateur video game enthusiasts how to make their own games with The Game Factory 2, a simple drag-and-drop...

150 Best Jobs for Your Skills (Jist's Best Jobs)
150 Best Jobs for Your Skills (Jist's Best Jobs)

150 Best Jobs for Your Skills identifies the top ten skills that are the most important in today’s economy, based on data from the U.S. Department of Labor and the latest O*NET. It helps job seekers find a fulfilling job and students explore their future career options by focusing on the 50 most promising jobs for each skill. It...

Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown...

Biometrics and ID Management: COST 2101 European Workshop, BioID 2011
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011

This volume of Springer Lecture Notes in Computer Sciences (LNCS) constitutes the final publication of the EU COST 2101 Action “Biometrics for Identity Documents and Smart Cards,” which has been successfully running during the years 2006-2010. One of the many valuable outputs of this initiative is the realization of a new...

Elemental Magic, Volume I: The Art of Special Effects Animation
Elemental Magic, Volume I: The Art of Special Effects Animation

In the spring of 2004, at the Annecy International Animation Festival in France, a dear friend and I had a conversation about animation books. Interesting, we noted, that there is not a single book dedicated to classical hand-drawn special effects animation, even though it is an enormously important aspect of the animation business,...

Recommender Systems: An Introduction
Recommender Systems: An Introduction

“Which digital camera should I buy? What is the best holiday for me and my family? Which is the best investment for supporting the education of my children? Which movie should I rent? Which web sites will I find interesting? Which book should I buy for my next vacation? Which degree and university are the best for my...

BlackBerry Development Fundamentals
BlackBerry Development Fundamentals

Welcome to BlackBerry Development Fundamentals. I hope you enjoy reading this book and keep it on your bookshelf for a long time. After working for Research In Motion (RIM) and helping its customers understand their options for building custom applications for the BlackBerry platform, I knew the time was right for a book like this....

Fundamentals of Graphics Communication with AutoDESK 2008 Inventor DVD
Fundamentals of Graphics Communication with AutoDESK 2008 Inventor DVD

Engineering and technical graphics have gone through significant changes in the last decade, due to the use of computers and CAD software. It seems as if some new hardware or software development that impacts technical graphics is occurring every year. Although these changes are important to the subject of technical graphics, there...

Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark

You are holding the proceedings of FSE 2011, the 18th International Workshop on Fast Software Encryption. This workshop was organized in cooperation with the International Association for Cryptologic Research. It was held in Lyngby, Denmark, during February 13–16, 2011.

The FSE 2011 Program Committee (PC) consisted of...

Location-Based Information Systems: Developing Real-Time Tracking Applications
Location-Based Information Systems: Developing Real-Time Tracking Applications

Location-based services (LBS) are nally coming out of research labs and getting into the hands of nal users. It is fairly common to see cellular carriers and private companies o ering LBS to locate your children, friends, and sites of interest, track assets, enhance the security of key personnel, help people with disabilities use...

Result Page: 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy