Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Black Art of Java Game Programming
Black Art of Java Game Programming
Gaming on the Web is the next blockbuster business. Have any doubts? The video game industry,
which already eclipses Hollywood in terms of revenue, targets the Web as the next huge growth area.
Software developers are busily porting games to the online environment, or developing entirely new
ones. And numerous popular Web sites, many
...
Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
We describe in this book, new methods for intelligent pattern recognition using soft computing techniques. Soft Computing (SC) consists of several computing paradigms, including fuzzy logic, neural networks, and genetic algorithms, which can be used to produce powerful hybrid intelligent systems for pattern recognition. Hybrid intelligent systems...
A Guide to MATLAB Object-Oriented Programming
A Guide to MATLAB Object-Oriented Programming
I am an admitted object-oriented fanatic. I have been designing and implementing object-oriented software for more than twenty years. When I started designing and implementing object-oriented MATLAB®, I encountered many detractors. They would say things like “The object model isn’t complete,” “You can’t have public...
Programming .NET Components
Programming .NET Components
The introduction of the Microsoft® .NET framework not only brings developers a powerful, cohesive toolset for the development of new Windows and Web applications -- it also replaces COM as the technology of choice for building components on Windows platforms. Components are the fundamental building blocks of .NET applications; they can both...
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Pattern Recognition and Machine Intelligence: 4th International Conference, PReMI 2011, Moscow, Russia, June 27 - July 1, 2011, Proceedings
Pattern Recognition and Machine Intelligence: 4th International Conference, PReMI 2011, Moscow, Russia, June 27 - July 1, 2011, Proceedings

This volume contains the proceedings of the 4th International Conference on Pattern Recognition and Machine Intelligence (PReMI-2011) which was held at the National Research University Higher School of Economics (HSE), Moscow, Russia, during June 27 - July 1, 2011. This was the fourth conference in the series. The first three...

Quantitative Marketing and Marketing Management: Marketing Models and Methods in Theory and Practice
Quantitative Marketing and Marketing Management: Marketing Models and Methods in Theory and Practice

Quantitative marketing has been gaining importance during the last decade. This is indicated by the growing number of model- and method-oriented studies published in leading journals as well as by the many successful applications of quantitative approaches in pricing, advertising, new product planning, and market segmentation decisions. In...

Risk-Pooling Essentials: Reducing Demand and Lead Time Uncertainty (SpringerBriefs in Business)
Risk-Pooling Essentials: Reducing Demand and Lead Time Uncertainty (SpringerBriefs in Business)

This book provides comprehensive and concise definitions of risk pooling and risk-pooling methods, a straightforward statistical explanation, and a value-chain oriented framework for analyzing risk-pooling methods. Risk pooling mitigates demand and lead time uncertainty in logistics and supply chain...

DNS on Windows Server 2003
DNS on Windows Server 2003
DNS on Windows Server 20003 is a special Windows-oriented edition of the classic DNS and BIND, newly updated to document the many changes to DNS, large and small, found in Windows Server 2003. Veteran O'Reilly authors, Cricket Liu, Matt Larson, and Robbie Allen explain the whole...
AspectJ Cookbook
AspectJ Cookbook
This hands-on book shows readers why and how common Java development problems can be solved by using new Aspect-oriented programming (AOP) techniques. With a wide variety of code recipes for solving day-to-day design and coding problems using AOP's unique approach, AspectJ Cookbook demonstrates that AOP is more than...
XPath 2.0 Programmer's Reference (Programmer to Programmer)
XPath 2.0 Programmer's Reference (Programmer to Programmer)
From its origins as a sublanguage of XSLT, XPath has come into its own as a key element of XML. XPath 2.0 has emerged as a robust language twice the size of its predecessor, complex and capable of standing on its own.

This substantive volume, by the editor of the W3C® XSLT 2.0 specification, is the authoritative reference on XPath 2.0. It...

unlimited object storage image
Result Page: 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy