Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Relativism and Monadic Truth
Relativism and Monadic Truth

Relativism has dominated many intellectual circles, past and present, but the twentieth century saw it banished to the fringes of mainstream analytic philosophy. Of late, however, it is making something of a comeback within that loosely configured tradition, a comeback that attempts to capitalize on some important ideas in foundational...

The Unified Modeling Language Reference Manual
The Unified Modeling Language Reference Manual

The authors have done an outstanding job with this UML book. The definitions of the terms are the best I have seen. The organization and material in the encyclopedia are fantastic!

--Perry Cole, MCIWorldCom

The Unified Modeling Language (UML) has rapidly become the standard notation for modeling...

Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)

Learn how to employ JADE to build multi-agent systems!

JADE (Java Agent DEvelopment framework) is a middleware for the development of applications, both in the mobile and fixed environment, based on the Peer-to-Peer intelligent autonomous agent approach. JADE enables developers to implement and...

An Introduction To The Theory Of Spatial Object Modelling For GIS (Research Monographs in GIS)
An Introduction To The Theory Of Spatial Object Modelling For GIS (Research Monographs in GIS)

In 1983 I left the International Institute for Aerospace Survey and Earth Sciences (ITC) and went to Wageningen Agricultural University, where I took the chair of “Land Surveying and Teledetection”. Up to that time I had been active mainly in geodesy and photogrammetry, but at Wageningen it soon became...

Secure Systems Development with UML
Secure Systems Development with UML
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.

Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML...

CONCUR 2008 - Concurrency Theory: 19th International Conference, CONCUR 2008, Toronto, Canada, August 19-22, 2008, Proceedings
CONCUR 2008 - Concurrency Theory: 19th International Conference, CONCUR 2008, Toronto, Canada, August 19-22, 2008, Proceedings
This book constitutes the refereed proceedings of the 19th International Conference on Concurrency Theory, CONCUR 2008, held in Toronto, Canada, August 19-22, 2008.

The 33 revised full papers presented together with 2 tool papers were carefully reviewed and selected from 120 submissions. The topics include model checking, process calculi,...

The Truth About HTML5 (For Web Designers)
The Truth About HTML5 (For Web Designers)

This is the book for web designers, web developers, and front-end coders who want to get up to speed with HTML5 in 2012. This is the book that isn’t afraid to point out what everyone gets wrong about HTML5’s new markup, so you don’t make the same mistakes. This is the book that will show you what rocks in HTML5 today and...

Modeling Reactive Systems With Statecharts : The Statemate Approach
Modeling Reactive Systems With Statecharts : The Statemate Approach
The book provides a detailed description of a set of languages for modeling reactive systems, which underlies the STATEMATE toolset. The approach is dominated by the language of Statecharts, used to describe behavior, combined Activity-charts for describing activities (i.e., the functional building blocks--capabilities or objects) and the data that...
Illustrated C# 2012
Illustrated C# 2012
The purpose of this book is to teach you the syntax and semantics of the C# programming language in as clear a manner as possible. C# is a wonderful programming language! I love coding in it. I don’t know how many programming languages I’ve learned over the years, but C# is by far my favorite. I hope that by using this...
Information Modelling and Knowledge Bases XVIII:  Volume 154 Frontiers in Artificial Intelligence and Applications
Information Modelling and Knowledge Bases XVIII: Volume 154 Frontiers in Artificial Intelligence and Applications
In the last decades information modelling and knowledge bases have become hot topics not only in academic communities related to information systems and computer science but also in business areas where information technology is applied.

The 16th European-Japanese Conference on Information Modelling and Knowledge Bases EJC 2006 continues
...
Building Spring 2 Enterprise Applications
Building Spring 2 Enterprise Applications
This book covers the Spring Framework, the Java application framework of choice for tens of thousands of Java developers worldwide. We feel it is important to introduce you to the Spring Framework by showing you how to use it. So we wrote a book that uses a complex sample application to demonstrate how the Spring Framework is used in a typical...
Hypercomputation: Computing Beyond the Church-Turing Barrier (Monographs in Computer Science)
Hypercomputation: Computing Beyond the Church-Turing Barrier (Monographs in Computer Science)
Hypercomputation is a relatively new theory of computation that is about computing methods and devices that transcend the so-called Church-Turing thesis. This book will provide a thorough description of the field of hypercomputation covering all attempts at devising conceptual hypermachines and all new promising computational paradigms that may...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy