Home | Amazing | Today | Tags | Publishers | Years | Search 
EJB 3.0 Database Persistence with Oracle Fusion Middleware 11g
EJB 3.0 Database Persistence with Oracle Fusion Middleware 11g

EJB (Enterprise JavaBeans) 3.0 is a commonly used database persistence technology in Java EE applications. EJB 3.0 has simplified the development of EJBs with an annotations-based API that eliminates the use of remote/local interfaces, home/local home interfaces, and deployment descriptors. A number of other books are available on EJB 3.0,...

NHibernate 3.0 Cookbook
NHibernate 3.0 Cookbook

NHibernate is an innovative, flexible, scalable, and feature-complete open source project for data access. Although it sounds like an easy task to build and maintain database applications, it can be challenging to get beyond the basics and develop applications that meet your needs perfectly.

The NHibernate Cookbook explains each...

Mobile Networks and Management: First International Conference
Mobile Networks and Management: First International Conference

The First International ICST Conference on Mobile Networks and Management (MONAMI) was held in Athens, Greece during October 13–14, 2009, hosted by the National Technical University of Athens. Through what we hope will be a long-lasting series of events, this new international conference aims at bringing together top researchers,...

Microsoft Enterprise Library 5.0
Microsoft Enterprise Library 5.0

Microsoft Enterprise Library is a collection of reusable software components (also known as Application Blocks) that are designed to assist developers with common enterprise development challenges. Before using an Application block, you should have a good understanding of your application requirements and of the scenarios that the Application...

Mastering Joomla! 1.5 Extension and Framework Development: The Professional Guide to Programming Joomla!
Mastering Joomla! 1.5 Extension and Framework Development: The Professional Guide to Programming Joomla!

Joomla! is the world's hottest open-source content management system, and the winner of the 2006 Open Source CMS Prize. Out of the box, Joomla! does a great job of managing the content needed to make your website sing. But for many people, the true power of Joomla! lies in its application framework that makes it possible for thousands of...

History of Programming Languages (Acm Monograph Series)
History of Programming Languages (Acm Monograph Series)

These proceedings of the ACM SIGPLAN History of Programming Languages (HOPL) conference are a record, in the words of those who helped make the history, of a baker's dozen of the languages that set the tone of most of today's programming. It is difficult to describe the feeling that prevailed at the conference. There were no parallel...

Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part I
Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part I

It is with great pleasure that we present the proceedings of the 6th International, Symposium on Visual Computing (ISVC 2010), which was held in Las Vegas, Nevada. ISVC provides a common umbrella for the four main areas of visual computing including vision, graphics, visualization, and virtual reality.

The goal is to provide a...

Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III
Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III

The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereed proceedings of the 6th International Symposium on Visual Computing, ISVC 2010, held in Las Vegas, NV, USA, in November/December 2010. The 93 revised full papers and 73 poster papers presented together with 44 full and 6 poster papers of 7 special tracks were...

Femtocells: Design & Application
Femtocells: Design & Application

As a cellular standard evolves, there are many variables that must be optimized. A few of these variables are directly related to higher throughput, increased user capacity, and in general improved system performance. The optimization techniques have involved higherorder modulation, improved multiple access (in both time and frequency), more...

Advances in Coding Theory and Crytography (Series on Coding Theory and Cryptology)
Advances in Coding Theory and Crytography (Series on Coding Theory and Cryptology)

Due to the increasing importance of digital communications, the area of research in coding theory and cryptography is broad and fast developing. In this book there are presented some of the latest research developments in the area. The book grew as a combination of two research conferences organized in the area: the Vlora Conference in Coding...

Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy