Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Processor Microarchitecture: An Implementation Perspective (Synthesis Lectures on Computer Architecture)
Processor Microarchitecture: An Implementation Perspective (Synthesis Lectures on Computer Architecture)

Computers are at the heart of most activities nowadays. A processor is the central component of a computer, but nowadays, we can find processors embedded in many other components, such as game consoles, consumer electronic devices and cars, just to mention a few.

This lecture presents a thorough study of the microarchitecture...

The Moderator's Survival Guide: Handling Common, Tricky, and Sticky Situations in User Research
The Moderator's Survival Guide: Handling Common, Tricky, and Sticky Situations in User Research

The Moderator's Survival Guide is your indispensable resource for navigating the rocky shoals of your one-on-one user research sessions. Inside, you’ll find guidance for nearly 100 diverse situations (ranging from business-as-usual to tricky and sticky) that might occur during usability studies, contextual inquiries, or user...

Higher-Order Perl: Transforming Programs with Programs
Higher-Order Perl: Transforming Programs with Programs
"Higher-Order Perl is the most exciting, most clearly-written, most comprehensive, and most forward-looking programming book I've read in at least ten years. It's your map to the future of programming in any language."
—Sean M. Burke, Leading Programmer, Comprehensive Perl Archive Network (CPAN)
Most Perl programmers were
...
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Privacy in Social Networks (Synthesis Lecutres on Data Mining and Knowledge Discovery)
Privacy in Social Networks (Synthesis Lecutres on Data Mining and Knowledge Discovery)

This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and...

Game Feel: A Game Designer's Guide to Virtual Sensation (Morgan Kaufmann Game Design Books)
Game Feel: A Game Designer's Guide to Virtual Sensation (Morgan Kaufmann Game Design Books)
"Feel" is the essence of human-computer interaction. It is the single most important (yet often overlooked) element in games that makes the game art form unique. No other traditional art form like film, literature, music encompasses interactivity, as games do. This book bring "feel" to the forefront and gives it a proper...
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)

Before the invention of the Internet and the creation of the Web, the vast majority of human conversations were in spoken form, with the only notable, but extremely limited, exception being epistolary exchanges. Some important spoken conversations, such as criminal trials and political debates (e.g., Hansard, the transcripts of...

Fuzzy Modeling Tools for Data Mining and Knowledge Discovery (The Morgan Kaufmann Series in Data Management Systems)
Fuzzy Modeling Tools for Data Mining and Knowledge Discovery (The Morgan Kaufmann Series in Data Management Systems)
Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration is a handbook for analysts, engineers, and managers involved in developing data mining models in business and government. As youll discover, fuzzy systems are extraordinarily valuable tools for representing and manipulating all kinds of data, and genetic...
The Grid 2: Blueprint for a New Computing Infrastructure (The Elsevier Series in Grid Computing)
The Grid 2: Blueprint for a New Computing Infrastructure (The Elsevier Series in Grid Computing)
“This is a source book for the history of the future.

Vint Cerf, Senior Vice President, Internet Architecture and Engineering, MCI Communications

The grid promises to fundamentally change the way we think about and use computing. This infrastructure will connect multiple regional and national computational...

Telling Stories: A Short Path to Writing Better Software Requirements
Telling Stories: A Short Path to Writing Better Software Requirements

From systems designers to top management, everyone loves a good story

Once upon a time, it was well understood that stories teach better than plain facts. Why then are most software requirements documents a baffling hodge-podge of diagrams, data dictionaries, and bullet points, held together by little more than a name and a staple?...

Design Methods for Reactive Systems: Yourdon, Statemate, and the UML
Design Methods for Reactive Systems: Yourdon, Statemate, and the UML
Design Methods for Reactive Systems describes methods and techniques for the design of software systemsparticularly reactive software systems that engage in stimulus-response behavior. Such systems, which include information systems, workflow management systems, systems for e-commerce, production control systems, and embedded...
Principles of Transaction Processing, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Principles of Transaction Processing, Second Edition (The Morgan Kaufmann Series in Data Management Systems)

This book offers a clear, concise guide for anyone involved in developing applications, evaluating products, designing systems, managing databases, or engineering products. It provides an understanding of the internals of transaction processing systems, describing how they work and how best to use them. It includes the architecture of...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy