Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
The Coder's Path to Wealth and Independence
The Coder's Path to Wealth and Independence

Developers, programmers, technical architects, and consultants: You are highly skilled and have deep commitment to your craft as well as the motivation to excel. It’s time to step away from the perceived security of a full-time salaried position, or a marginally successful solo business, and step into a world of freedom, independence,...

Projects in Computing and Information Systems: A Student's Guide
Projects in Computing and Information Systems: A Student's Guide
Undertaking a project is a key component of nearly all computing/information systems degree programmes at both undergraduate and postgraduate levels. Projects in Computing and Information Systems covers the four key aspects of project work (planning, conducting, presenting and taking the project further) in chronological fashion, and...
Better Business Decisions from Data: Statistical Analysis for Professional Success
Better Business Decisions from Data: Statistical Analysis for Professional Success

Everyone encounters statistics on a daily basis. They are used in proposals, reports, requests, and advertisements, among others, to support assertions, opinions, and theories. Unless you’re a trained statistician, it can be bewildering. What are the numbers really saying or not saying? Better Business Decisions from Data:...

Publish / Subscribe Systems: Design and Principles (Wiley Series on Communications Networking & Distributed Systems)
Publish / Subscribe Systems: Design and Principles (Wiley Series on Communications Networking & Distributed Systems)

This book offers an unified treatment of the problems solved by publish/subscribe, how to design and implement the solutions

In this book, the author provides an insight into the publish/subscribe technology including the design, implementation, and evaluation of new systems based on the technology.  The book also...

Computability: Turing, Gödel, Church, and Beyond
Computability: Turing, Gödel, Church, and Beyond

In the 1930s a series of seminal works published by Alan Turing, Kurt Gödel, Alonzo Church, and others established the theoretical basis for computability. This work, advancing precise characterizations of effective, algorithmic computability, was the culmination of intensive investigations into the foundations of mathematics. In the...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources  of end users, the...

Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management

The Internet already is the broadest and most used source of legal information: in the web one can find most statutory texts (all in some jurisdictions), a vast amount of case law, huge repertoires of doctrinal contributions, many blogs and fora discussing different legal issues. Moreover, as legal activities (legislative,...

Fuzzy Quantifiers: A Computational Theory (Studies in Fuzziness and Soft Computing)
Fuzzy Quantifiers: A Computational Theory (Studies in Fuzziness and Soft Computing)
From a linguistic perspective, it is quantification which makes all the difference between “having no dollars” and “having a lot of dollars”. And it is the meaning of the quantifier “most” which eventually decides if “Most Americans voted Kerry” or “Most Americans voted Bush” (as it...
GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)
GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)

We are entering the golden age of GPU computing. Since the introduction of CUDA in 2007, more than 100 million computers with CUDA-capable GPUs have been shipped to end users. Unlike the previous GPGPU shader programming models, CUDA supports parallel programming in C. From my own experience in teaching CUDA programming, C programmers...

Human Machine Interaction: Research Results of the MMI Program
Human Machine Interaction: Research Results of the MMI Program

Human Machine Interaction, or more commonly Human Computer Interaction, is the study of interaction between people and computers. It is an interdisciplinary field, connecting computer science with many other disciplines such as psychology, sociology and the arts.

The present volume documents the results of the MMI research program...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy