Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Constraint Databases and Applications: First International Symposium, CDB 2004, Paris, France, June 12-13, 2004, Proceedings (Lecture Notes in Computer Science)
Constraint Databases and Applications: First International Symposium, CDB 2004, Paris, France, June 12-13, 2004, Proceedings (Lecture Notes in Computer Science)
The ?rst International Symposium on the Applications of Constraint Databases (CDB2004) took place in Paris, France, on June 12–13, 2004, just before the ACM SIGMOD and PODS conferences. Since the publication of the paper “Constraint Query Languages” by Kan- lakis, Kuper and Revesz in 1990, the last decade has seen a growing...
Sudoku Programming with C
Sudoku Programming with C

Sudoku Programming with C teaches you how to write computer programs to solve and generate Sudoku puzzles. This is a practical book that will provide you with everything you need to write your own books of Sudoku Classic and Samurai puzzles. But be warned: after reading it, you'll discover that the puzzles in...

Elements of Programming
Elements of Programming
Elements of Programming provides a different understanding of programming than is presented elsewhere. Its major premise is that practical programming, like other areas of science and engineering,must be based on a solid mathematical foundation. The book shows that algorithms implemented in a real programming language,...
Novel Algorithms and Techniques in Telecommunications and Networking
Novel Algorithms and Techniques in Telecommunications and Networking
This book includes the proceedings of the 2008 International Conference on Telecommunications and Networking (TeNe).

TeNe 08 is part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 08).
...
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use

Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requirements. It’s a tremendous opportunity for tens of...

Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis

As a programmer working for Logica UK in London in the mid-1980’s, I became a passionate advocate of formal methods. Extrapolating from small successes with VDM and JSP, I was sure that widespread use of formal methods would bring an end to the software crisis.

One approach especially intrigued me. John Guttag and Jim
...

The Mathematica GuideBook for Numerics
The Mathematica GuideBook for Numerics
Computers were initially developed to expedite numerical calculations. A newer, and in the long run, very fruitful field is the manipulation of symbolic expressions. When these symbolic expressions represent mathematical entities, this field is generally called computer algebra [8]. Computer algebra begins with relatively...
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

CONCUR 2004 -- Concurrency Theory
CONCUR 2004 -- Concurrency Theory

This book constitutes the refereed proceedings of the 15th International Conference on Concurrency Theory, CONCUR 2004, held in London, UK in August/September 2004.

The 29 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 134 submissions. Among the topics covered are concurrency...

Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed
Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed

This comprehensive book covers the strategy, tactics, and processes needed for successful project portfolio management. It outlines a road map to unprecedented project management improvement and includes a detailed implementation plan for both strategic planning and a PMO that gives you measurable results in weeks. The author delineates four...

First Concepts of Topology (New Mathematical Library)
First Concepts of Topology (New Mathematical Library)
This book is one of a series written by professional mathematicians in order to make some important mathematical ideas interesting and understandable to a large audience of high school students and laymen. Most of the volumes in the New Mathematical Library cover topics not usually included in the high school curriculum; they vary in difficulty,...
Real World Instrumentation with Python: Automated Data Acquisition and Control Systems
Real World Instrumentation with Python: Automated Data Acquisition and Control Systems

This is a book about automated instrumentation, and the automated control systems used with automated instrumentation. We will look at how to use the Python programming language to quickly and easily implement automated instrumentation and control systems.

Automated instrumentation can be found in a wide variety of settings,...

Result Page: 51 50 49 48 47 46 45 44 43 42 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy