Home | Amazing | Today | Tags | Publishers | Years | Search 
Yahoo! User Interface Library 2.x Cookbook
Yahoo! User Interface Library 2.x Cookbook

Welcome to Yahoo User Interface 2.x Cookbook, the RAW edition. A RAW (Read As we Write) book contains all the material written for the book so far, but available for you right now, before it’s finished. As the author writes more, you will be invited to download the new material and continue reading, and learning. Chapters in a RAW...

Handbook of Cosmetic Science and Technology, Third Edition
Handbook of Cosmetic Science and Technology, Third Edition

Thanks to the contribution of leading experts in cosmetology, the first editions of the Handbook were successful and received excellent reviews. The editors appreciate the excellent author contributions.

The first edition, published in 2001, reviewed the multiple facets of the cosmetic field including the physiology of...

Markov Models for Pattern Recognition: From Theory to Applications
Markov Models for Pattern Recognition: From Theory to Applications

The development of pattern recognition methods on the basis of so-called Markov models is tightly coupled to the technological progress in the field of automatic speech recognition. Today, however, Markov chain and hidden Markov models are also applied in many other fields where the task is the modeling and analysis of chronologically...

Design of Image Processing Embedded Systems Using Multidimensional Data Flow
Design of Image Processing Embedded Systems Using Multidimensional Data Flow

With the availability of chips offering constantly increasing computational performance and functionality, design of more and more complex applications becomes possible. This is particularly true for the domain of image processing, which is characterized by huge computation efforts. Unfortunately, this evolution risks to be stopped by...

Ektron Developer's Guide: Building an Ektron Powered Website
Ektron Developer's Guide: Building an Ektron Powered Website

GIVEN THAT YOU’RE READING the introduction to a Wrox book about Ektron, you likely have (or will soon have) some level of technical responsibility for a website powered by the Ektron Framework. Maybe you’re tasked with the duty of maintaining an existing site and are looking for information to help make that process more...

Lean-Agile Acceptance Test-Driven Development: Better Software Through Collaboration
Lean-Agile Acceptance Test-Driven Development: Better Software Through Collaboration

Developing software with testable requirements is the theme of this book. A testable requirement is one with an acceptance test. Acceptance tests drive the development of the software. As many development groups have experienced, creating acceptance tests prior to implementing requirements decreases defects and...

Windows 7 Device Driver (Addison-Wesley Microsoft Technology Series)
Windows 7 Device Driver (Addison-Wesley Microsoft Technology Series)

This book provides the technical guidance and understanding needed to write device drivers for the new Windows 7 Operating System. It takes this very complex programming development, and shows how the Windows Driver Framework has greatly simplified this undertaking. It explains the hardware and software architecture you must...

Autonomic Network Management Principles: From Concepts to Applications
Autonomic Network Management Principles: From Concepts to Applications

The development of network technologies and networked services has been tremendous the last decade and is expected to be more intensive in the near future with the technological progress in the field of radio communications, data communication, protocols, software engineering, applications and so on. In this plethora of technologies,...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

Computers and Games: 7th International Conference, CG 2010, Kanazawa, Japan
Computers and Games: 7th International Conference, CG 2010, Kanazawa, Japan

This book contains the papers of the 7th Computer and Games Conference (CG 2010) held in Kanazawa, Japan. The conference took place during September 24–26, 2010 in conjunction with the 15th Computer Olympiad and the 17th World Computer Chess Championship.

The Computer and Games conference series is a major international...

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011

concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. In the past few years,we have witnessed that ISI experienced tremendous growth and attracted significant interest involving academic researchers in related fields...

Parallel and Distributed Computing and Networks: International Conference, PDCN 2010
Parallel and Distributed Computing and Networks: International Conference, PDCN 2010

We are delighted to present the proceedings of the 2010 International Conference on Parallel and Distributed Computing and Networks (PDCN 2010) held in Chongqing, China, during 13–14 December, 2010. The objective of PDCN is to provide a forum for researchers, educators, engineers, and government officials involved in the general...

Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy