 |
|
 |  |  Object-Oriented Technology. ECOOP 2004 Workshop Reader: ECOOP 2004 Workshop, Oslo, Norway, June 14-18, 2004, Final Reports (Lecture Notes in Computer Science)This year, for the eighth time, the European Conference on Object-Oriented Programming (ECOOP) series, in cooperation with Springer, is glad to offer the object-oriented research community the ECOOP 2004 Workshop Reader, a compendium of workshop reports pertaining to the ECOOP 2004 conference, held in Oslo from June 15 to 19, 2004.
ECOOP... |  |  |
|
 Trends in Functional Programming 6This book contains selected papers from the proceedings presented at the Sixth Symposium on Trends in Functional Programming (TFP05). Continuing the TFP series with its previous instances held in Stirling (1999), St. Andrews (2000), Stirling (2001), Edinburgh (2003) and Munich (2004) the symposium was held in Tallinn, Estland in co-location with... |  |  |  |  Hacking Exposed LinuxGNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are... |
|
 The Thermodynamic Universe: Exploring the Limits of PhysicsParticle Physics and High Energy Physics have stagnated since the early 1970s. Now, the underlying principle of reductionism -- so sacred to twentieth-century physics -- is itself being questioned. This book examines these tumultuous developments that are leading to a paradigm shift and a new horizon for Physics.
Presenting the new paradigm... |  |  Absolute Beginner's Guide to Personal FirewallsThe Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal... |  |  Multimedia Content Encryption: Techniques and Applications
How to Design a Secure Multimedia Encryption Scheme
The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |