A quick guide to everything anyone would want to know about the soaringly popular Internet programming language, Python. Provides an introduction to new features introduced in Python 1.6, and topics covered include regular expressions, extending Python, and OOP. The CD-ROM includes the source code for all of the examples in the text. Softcover....
Get the definitive guide on designing applications on the Microsoft application platform—straight from the Microsoft patterns & practices team. Learn how to choose the most appropriate architecture and the best implementation technologies that the Microsoft application platform offers applications developers. Get critical design...
Designers and developers, create smashing apps for Android devices
If you're developing applications for Android smartphones and tablets, you know it isn't enough just to create the app. The application has to be intuitive, well laid out, and easy to use. Smashing Android UI shows you just how to do that....
Now diffused among end-user devices in mobile and wireline networks, the "cloud" is becoming the "fog." This book focuses on the challenges and solutions related to cloud and fog computing for 5G mobile networks and presents novel approaches to the frameworks and schemes that carry out storage, communication, computation,...
The development of Hypertext Markup Language stopped in 1999 with its final version, n.4, made by the
World Wide Web Consortium (W3C). Technology, however, has not stood still in the meantime: the W3C
also worked on interesting projects such as the generic Standard Generalized Markup Language (SGML)
to XML, as well as on new markup...
This book consists of a number of chapters addressing different aspects of activity recognition, roughly in three main categories of topics. The first topic will be focused on activity modeling, representation and reasoning using mathematical models, knowledge representation formalisms and AI techniques. The second topic will concentrate on...
The vision of a world in which privacy persists and security is ensured but the full potential of the technology is nevertheless tapped guides this work. It is argued that security and privacy can be ensured using technical safeguards if the whole RFID system is designed properly. The challenge is immense since many constraints exist for...
As a developer, you are aware of the increasing concern amongst developers and site architects that websites be able to handle the vast number of visitors that flood the Internet on a daily basis. Scalable Internet Architecture addresses these concerns by teaching you both good and bad design methodologies for...