Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Paradigms
Software Paradigms
Programming is about the creation of software to solve problems. Problems come in
many forms: simple to complex, small to large, I/O-intensive to compute-intensive.
Over the past four decades, we’ve tried to solve a lot of different types of problems
with software. At some, we have been exceptionally successful and the
...
Pervasive Games: Theory and Design (Morgan Kaufmann Game Design Books)
Pervasive Games: Theory and Design (Morgan Kaufmann Game Design Books)
Quickly emerging from the fast-paced growth of mobile communications and wireless technologies, pervasive games take gaming away from the computer screen and back to the three-dimensional world. Now games can be designed to be played in public spaces like shopping malls, conferences, museums and other non-traditional game venues. Game designers...
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
Instant Pain Control: Using the Body's Trigger Points
Instant Pain Control: Using the Body's Trigger Points
The framework of the human body is held together by a substance known as fascia. This is a connective tissue which envelops the muscles, nerves and blood vessels and which gives cohesion and order to the myriad components of the body, It allows movement between adjacent structures and reduces the effects of pressure and...
Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
The convergence of computing and communications has been predicted for many years. Today's explosion of a myriad of new types of personal computing and communications devices—notebook computers, personal digital assistants, "smart" phones, two-way pagers, digital cameras and so on—has resulted in new ways for people to...
Programming in C (3rd Edition) (Developer's Library)
Programming in C (3rd Edition) (Developer's Library)
It’s hard to believe that 20 years have passed since I first wrote Programming in C. At that
time the Kernighan & Ritchie book The C Programming Language was the only other
book on the market. How times have changed!

When talk about an ANSI C standard emerged in the early 1980s, this book was split
into two
...
Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)
Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)

At DART'09, held in conjunction with the 2009 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2009) and Intelligent Agent Technology (IAT 2009) in Milan (Italy), practitioners and researchers working on pervasive and intelligent access to web services and distributed information retrieval met to compare their work ad...

Real-Time and Embedded Computing Systems and Applications : 9th International Conference, RTCSA 2003
Real-Time and Embedded Computing Systems and Applications : 9th International Conference, RTCSA 2003
This volume contains the 37 papers presented at the 9th International Conference
on Real-Time and Embedded Computing Systems and Applications (RTCSA
2003). RTCSA is an international conference organized for scientists and
researchers from both academia and industry to hold intensive discussions on
advancing technologies topics
...
Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

Strategic Software Engineering
Strategic Software Engineering
Software is a disruptive technology that has changed how almost every
sector of human society and the economy works. Software is now pervasive;
it is a component of almost every industrial product or at least
essential to the development of such products. Software capabilities lie at
the core of the new national and
...
Advertising: A Very Short Introduction (Very Short Introductions)
Advertising: A Very Short Introduction (Very Short Introductions)

Advertising is riddled with myths and misunderstandings. It is simultaneously believed to be both immensely powerful and immensely wasteful, to increase economic prosperity and to be morally questionable. Neither its historic origins nor its  modern operations are well understood. Many of these mythsand misunderstandings are almost as...

Activity Recognition in Pervasive Intelligent Environments (Atlantis Ambient and Pervasive Intelligence)
Activity Recognition in Pervasive Intelligent Environments (Atlantis Ambient and Pervasive Intelligence)

This book consists of a number of chapters addressing different aspects of activity recognition, roughly in three main categories of topics. The first topic will be focused on activity modeling, representation and reasoning using mathematical models, knowledge representation formalisms and AI techniques. The second topic will concentrate on...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy