Home | Amazing | Today | Tags | Publishers | Years | Search 
Object-Oriented Technology. ECOOP 2004 Workshop Reader: ECOOP 2004 Workshop, Oslo, Norway, June 14-18, 2004, Final Reports (Lecture Notes in Computer Science)
Object-Oriented Technology. ECOOP 2004 Workshop Reader: ECOOP 2004 Workshop, Oslo, Norway, June 14-18, 2004, Final Reports (Lecture Notes in Computer Science)
This year, for the eighth time, the European Conference on Object-Oriented Programming (ECOOP) series, in cooperation with Springer, is glad to offer the object-oriented research community the ECOOP 2004 Workshop Reader, a compendium of workshop reports pertaining to the ECOOP 2004 conference, held in Oslo from June 15 to 19, 2004.

ECOOP
...
Software Requirements: Styles & Techniques
Software Requirements: Styles & Techniques
Most IT systems fail to meet expectations. They don't meet business goals and don't support users efficiently. Why? Because the requirements didn't address the right issues. Writing a good requirements specification doesn't take more time. This book shows how it¿s done - many times faster and many times smarter.  What are the...
Unconventional Computation: 7th International Conference, UC 2008, Vienna, Austria, August 25-28, 2008, Proceedings
Unconventional Computation: 7th International Conference, UC 2008, Vienna, Austria, August 25-28, 2008, Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Unconventional Computation, UC 2008, held in Vienna, Austria, in August 2008.

The 16 revised full papers presented together with 4 invited papers were carefully reviewed and selected for inclusion in the book. The papers are devoted to all aspects of...

Projects in Computing and Information Systems: A Student's Guide
Projects in Computing and Information Systems: A Student's Guide
Undertaking a project is a key component of nearly all computing/information systems degree programmes at both undergraduate and postgraduate levels. Projects in Computing and Information Systems covers the four key aspects of project work (planning, conducting, presenting and taking the project further) in chronological fashion, and...
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
Installing and Administering Linux, Second Edition
Installing and Administering Linux, Second Edition
An indispensable working resource for IT professionals moving to Linux-based network systems

More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand...

Speech and Audio Processing in Adverse Environments (Signals and Communication Technology)
Speech and Audio Processing in Adverse Environments (Signals and Communication Technology)
The book reflects the state of the art in important areas of speech and audio signal processing. It presents topics which are missed so far and most recent findings in the field. Leading international experts report on their field of work and their new results.

Considerable amount of space is covered by multi-microphone systems, specific...

Software Defined Radio for 3G (Artech House Mobile Communications Series)
Software Defined Radio for 3G (Artech House Mobile Communications Series)
If you’re a mobile communications engineer considering software radio solutions, this practical resource is essential reading. It covers systems design and partitioning all the way from the antenna to the management and control software. Various options for hardware are provided including a look at current and state of the art silicon...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Be a Successful Green Builder
Be a Successful Green Builder
Increase Profits by Incorporating Sustainable Practices into Your Building Operations

Filled with environmentally friendly methods that reduce the impact of housing on natural areas, Be a Successful Green Builder contains everything needed to get started in the green building business and...

The Search for Extra Terrestrial Intelligence: A Philosophical Inquiry
The Search for Extra Terrestrial Intelligence: A Philosophical Inquiry
The Search for Extra Terrestrial Intelligence critically evaluates claims concerning the status of SETI as a genuine scientific research program and examines the attempts to establish contact with other intelligent life forms in the past thirty years.

Despite a wealth of science fiction and scientific speculation on the origins of
...
Memory Systems: Cache, DRAM, Disk
Memory Systems: Cache, DRAM, Disk
The first book to comprehensively cover the intricacies of optimizing the behavior of modern memory systems using a holistic design approach.

Is your memory hierarchy stopping your microprocessor from performing at the high level it should be? Memory Systems: Cache, DRAM, Disk shows you how to resolve this problem. ...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy