Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Object-Oriented Technology. ECOOP 2004 Workshop Reader: ECOOP 2004 Workshop, Oslo, Norway, June 14-18, 2004, Final Reports (Lecture Notes in Computer Science)
Object-Oriented Technology. ECOOP 2004 Workshop Reader: ECOOP 2004 Workshop, Oslo, Norway, June 14-18, 2004, Final Reports (Lecture Notes in Computer Science)
This year, for the eighth time, the European Conference on Object-Oriented Programming (ECOOP) series, in cooperation with Springer, is glad to offer the object-oriented research community the ECOOP 2004 Workshop Reader, a compendium of workshop reports pertaining to the ECOOP 2004 conference, held in Oslo from June 15 to 19, 2004.

ECOOP
...
Key Clinical Trials in Erectile Dysfunction
Key Clinical Trials in Erectile Dysfunction

Contained within this short volume are some of the Key Clinical Trials relating to the medical treatment of erectile dysfunction (ED). In an attempt to understand the potential significance, a critique of the studies’ strengths and weaknesses is included as well as a diagrammatic summary of the trial design and key results. Most of the...

XSLT Programmer's Reference 2nd Edition
XSLT Programmer's Reference 2nd Edition

This compact, relevant, updated version reflects recent changes in the XSLT specification and developments in XSLT parsers. The material on tools and implementations has been revised; so too have all the examples. It also includes a new chapter on writing extension functions.

XML has firmly established itself as the universal...

Integrated Research in GRID Computing: CoreGRID Integration Workshop 2005 (Selected Papers) November 28-30, Pisa, Italy
Integrated Research in GRID Computing: CoreGRID Integration Workshop 2005 (Selected Papers) November 28-30, Pisa, Italy
Integrated Research in Grid Computing presents a selection of the best papers presented at the CoreGRID Integration Workshop (CGIW2005), which took place on November 28-30, 2005 in Pisa, Italy.

The aim of CoreGRID is to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer technologies in...

Data Mining: Special Issue in Annals of Information Systems
Data Mining: Special Issue in Annals of Information Systems

Over the course of the last twenty years, research in data mining has seen a substantial increase in interest, attracting original contributions from various disciplines including computer science, statistics, operations research, and information systems. Data mining supports a wide range of applications, from medical decision making,...

Beginning Visual C#
Beginning Visual C#
By using this book with Visual Studio® .NET you’ll come to understand the fundamentals of the C# language and learn to program the .NET Framework. We’ll help you succeed – from your first steps in the language up to the point where you are ready to write real world C# applications.

With Beginning Visual C#, you will learn...

Spirulina in Human Nutrition and Health
Spirulina in Human Nutrition and Health

Astonishingly rich in nutrients, Spirulina is one of the most popular and well researched functional foods in the multi-billion dollar global food supplement market. This ancient species provides readily bioavailable protein along with carotenoids, essential fatty acids, vitamins, and minerals and has therapeutic applications in...

Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)

Learn how to employ JADE to build multi-agent systems!

JADE (Java Agent DEvelopment framework) is a middleware for the development of applications, both in the mobile and fixed environment, based on the Peer-to-Peer intelligent autonomous agent approach. JADE enables developers to implement and...

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Complex Networks and Their Applications VII: Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX ... 2018 (Studies in Computational Intelligence)
Complex Networks and Their Applications VII: Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX ... 2018 (Studies in Computational Intelligence)
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex Networks and their Applications...
Handbook of Peer-to-Peer Networking
Handbook of Peer-to-Peer Networking

The Handbook of Peer-to-Peer Networking is a comprehensive and unified repository of the various models, applications, methodologies, trends, and challenges of peer-to-peer computing, making it an essential reference for researchers and proffesionals alike. This handbook addresses current issues as well as emerging concepts...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy