Home | Amazing | Today | Tags | Publishers | Years | Search 
The Testing Network: An Integral Approach to Test Activities in Large Software Projects
The Testing Network: An Integral Approach to Test Activities in Large Software Projects

At the end of the 1990s, many IT professionals began to remember experiences gained a long time ago and to rediscover methods rooted in the 1970s and 1980s. Are we doing the right things the right way? How do we face the challenges of testing complex network-centric information systems and service-oriented business applications?

...

An Introduction to MultiAgent Systems
An Introduction to MultiAgent Systems

Multiagent systems are systems composed of multiple interacting computing elements, known as agents. Agents are computer systems with two important capabilities. First, they are at least to some extent capable of autonomous action - of deciding for themselves what they need to do in order to satisfy their design objectives. Second, they are...

Modeling & Simulation-Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange
Modeling & Simulation-Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange

Data Engineering has become a necessary and critical activity for business, engineering, and scientific organizations as the move to service oriented architecture and web services moves into full swing. Notably, the US Department of Defense is mandating that all of its agencies and contractors assume a defining presence on the Net-centric...

Decision Support: An Examination of the DSS Discipline (Annals of Information Systems)
Decision Support: An Examination of the DSS Discipline (Annals of Information Systems)

The origin of this volume came while planning the 2009 International Conference on Decision Support Systems. The theme of that 2-day conference was “Assessing Today and Envisioning Tomorrow.” We wanted to summarize where the field had been and generate ideas regarding where it was going. The meeting brought together...

Machine Learning for Vision-Based Motion Analysis: Theory and Techniques
Machine Learning for Vision-Based Motion Analysis: Theory and Techniques

Techniques of vision-based motion analysis aim to detect, track, identify, and generally understand the behavior of objects in image sequences. With the growth of video data in a wide range of applications from visual surveillance to human-machine interfaces, the ability to automatically analyze and understand object motions from video...

MPEG Handbook
MPEG Handbook

A complete professional `bible' on all aspects of audio and video compression using MPEG technology. The MPEG Handbook is both a theoretical and practical treatment of the subject. Fundamental knowledge is provided alongside practical guidance eg how to avoid quality loss or the creation of MPEG elementary streams and their multiplexing...

Managing Open Source Projects: A Wiley Tech Brief
Managing Open Source Projects: A Wiley Tech Brief

The only guide to managing and integrating the open source model

With the phenomenal success of Linux, companies are taking open source business solutions much more seriously than ever before. This book helps to satisfy the growing demand for guidance on how to manage open source enterprise development projects. Expert Jan Sandred...

Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Engineering of Software: The Continuing Contributions of Leon J. Osterweil
Engineering of Software: The Continuing Contributions of Leon J. Osterweil

Software engineering research can trace its roots to a small number of highly influential individuals. Among that select group is Prof. Leon J. Osterweil, whose work has fundamentally defined or impacted major directions in software analysis, developmenttools and environments, and software process. His exceptional and sustained contributions...

Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences
Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences

Computer and Information Sciences is a unique and comprehensive review of advanced technology and research in the field of Information Technology. It provides an up to date snapshot of research in Europe and the Far East (Hong Kong, Japan and China) in the most active areas of information technology, including Computer Vision, Data...

Result Page: 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy