An up-to-date and comprehensive treatment of the fundamentals of scheduling theory, including recent advances and state-of-the-art topics
Principles of Sequencing and Scheduling strikes a unique balance between theory and practice, providing an accessible introduction to the concepts, methods, and results of scheduling theory and...
"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.
You may already be aware that the Java virtual machine runs on everything from the largest mainframe to the smallest microchip and supports almost every conceivable application. What you may not realize is that to develop software in some of these scenarios requires a targeted, single purpose language, a Domain Specific Language. The popular...
This is a book about maintaining the single most complex, unfathomable, and overhyped
appliance you will ever own. Upgrading and maintaining your computer is a
difficult and bewildering task, and yet you are the most qualified person to handle it.
The main reason is because you are perhaps the only person you can trust entirely to...
Develop your own 3D elearning game using gamification, systems design, and gameplay programming techniques About This Book Develop a game framework for a 3D eLearning game Program dynamic interactive actors and objects to populate your game world An easy-to-follow guide along with an extensive source code to support and guide readers through...
Red Hat Linux 9 is a powerful, flexible open source operating system. Its popularity is growing, both in home use and in corporate environments of all sizes. Its user interface makes it every bit as accessible as other operating systems, and its open source pedigree opens the doors to a mind-blowing amount of free software.
The field of machine learning is concerned with the question of how to construct computer programs that automatically improve with experience. In recent years many successful machine learning applications have been developed, ranging from data-mining programs that learn to detect fraudulent credit card transactions, to ...
Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the expressed purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the...
Congratulations! When you bought that shiny new anodized aluminum iMac, you made a great choice. Now you want take advantage and control of that baby's awesome speed, high performance, powerful operating system, and fantastic applications, and iMac for Dummies, 5th Edition is here to help you do just that!