Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Engineering a Compiler, Second Edition
Engineering a Compiler, Second Edition

The practice of compiler construction changes continually, in part because the designs of processors and systems change. For example, when we began to write Engineering a Compiler (eac) in 1998, some of our colleagues questioned the wisdom of including a chapter on instruction scheduling because out-of-order execution threatened to make...

Querying Moving Objects Detected by Sensor Networks (SpringerBriefs in Computer Science)
Querying Moving Objects Detected by Sensor Networks (SpringerBriefs in Computer Science)

Declarative query interfaces to Sensor Networks (SN) have become a commodity. These interfaces allow access to SN deployed for collecting data using relational queries. However, SN are not confined to data collection, but may track object movement, e.g., wildlife observation or traffic monitoring. While rational approaches are well suited for...

The Art of Readable Code (Theory in Practice)
The Art of Readable Code (Theory in Practice)

As programmers, we’ve all seen source code that’s so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they’re bad and how they could be improved. Their...

Getting Started With Oracle SOA Suite 11g R1  A Hands-On Tutorial
Getting Started With Oracle SOA Suite 11g R1 A Hands-On Tutorial
On July 1, 2009 Oracle announced the 11gR1 release of Fusion Middleware of which SOA Suite is a key part. Service-oriented architecture (SOA), business process management (BPM), event-driven architecture (EDA), and related technologies are at the heart of modern enterprise software solutions aimed at providing greater business agility and...
Quantitative Assessment of Securitisation Deals (SpringerBriefs in Finance)
Quantitative Assessment of Securitisation Deals (SpringerBriefs in Finance)
Securitisation deals have come to the fore during recent years owing to the challenges involved in their assessment and their role in the recent credit crises. These deals are created by the pooling of assets and the tranching of liabilities. The latter is backed by collateral pools. Tranching makes it possible to create liabilities...
Java SE8 for the Really Impatient: A Short Course on the Basics (Java Series)
Java SE8 for the Really Impatient: A Short Course on the Basics (Java Series)

Eagerly anticipated by millions of programmers, Java SE 8 is the most important Java update in many years. The addition of lambda expressions (closures) and streams represents the biggest change to Java programming since the introduction of generics and annotations.

 

...
Hadoop Real World Solutions Cookbook - Second Edition
Hadoop Real World Solutions Cookbook - Second Edition

Key Features

  • Implement outstanding Machine Learning use cases on your own analytics models and processes.
  • Solutions to common problems when working with the Hadoop ecosystem.
  • Step-by-step implementation of end-to-end big data use cases.

Who This Book Is For

...

Solar Cell Technology and Applications
Solar Cell Technology and Applications

Energy experts predict that wholesale electricity prices could easily rise 35 to 65 percent by 2015. Add to this the growing need for energy independence and the need to reduce carbon emissions and it is very clear that the development of low-cost renewable energy, such as solar energy, is essential for our economy and our national security....

CCIE Wireless Exam (350-050) Quick Reference
CCIE Wireless Exam (350-050) Quick Reference

With the introduction of wireless LAN (WLAN), IP networks are now also available for those applications on which wired technologies are not suitable or no wired connectivity is available at all. The following are a few wireless use cases:

  • Home ISP connectivity: Consumer products
  • Building-to-building...
Supplier Relationship Management: How to Maximize Vendor Value and Opportunity
Supplier Relationship Management: How to Maximize Vendor Value and Opportunity

There’s a new buzz phrase in the air: Supplier Relationship Management (SRM). Corporate executives know it’s necessary, but there’s only one problem. Nobody yet knows how to do it. Or they think it’s all about bashing your vendors over the head until they reduce the price another 4%. Supplier Relationship...

Jurisdiction and Arbitration Agreements in International Commercial Law
Jurisdiction and Arbitration Agreements in International Commercial Law

Arbitration and jurisdiction agreements are frequently used in transnational commercial contracts to reduce risk, gain efficacy and acquire certainty and predictability. Because of the similarities between these two types of procedural autonomy agreements, they are often treated in a similar way by courts and practitioners.

This...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy