|
|
|
|
Algebraic Methodology and Software Technology: 12th International Conference, AMAST 2008 Urbana, IL, USA, July 28-31, 2008, Proceedings (Lecture Notes in Computer Science)This book constitutes the refereed proceedings of the 12th International Conference on Algebraic Methodology and Software Technology, AMAST 2008, held in Urbana, IL, USA, in July 2008.
The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 58 submissions. Among the topics covered are all... | | | | |
|
Kanban in Action
Summary
Kanban in Action is a down-to-earth, no-frills, get-to-know-the-ropes introduction to kanban. It's based on the real-world experience and observations from two kanban coaches who have introduced this process to dozens of teams. You'll learn the principles of why kanban works, as well as... | | Speech Processing for IP Networks: Media Resource Control Protocol (MRCP)Media Resource Control Protocol (MRCP) is a new IETF protocol, providing a key enabling technology that eases the integration of speech technologies into network equipment and accelerates their adoption resulting in exciting and compelling interactive services to be delivered over the telephone. MRCP leverages IP telephony and Web technologies... | | The Unified Modeling Language Reference ManualThe authors have done an outstanding job with this UML book. The definitions of the terms are the best I have seen. The organization and material in the encyclopedia are fantastic!
--Perry Cole, MCIWorldCom
The Unified Modeling Language (UML) has rapidly become the standard notation for modeling... |
|
Mastering Enterprise JavaBeans (2nd Edition)Mastering Enterprise JavaBeans, 2nd Ed. by Ed Roman and Scott Ambler includes the new EJB specification and expanded coverage on more advanced topics for developers. (Publishers Weekly)
"...the style is informal, with clear explanations…an enjoyable read and good value for money..." (Computer... | | Secure Systems Development with UMLAttacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.
Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML... | | Netcentric System of Systems Engineering with DEVS Unified Process
Addressing the new challenges that engineers face, this book presents fundamental concepts to help tackle the integration of modeling and simulation with command, and control systems of systems through the use of concepts and standards for interoperability and testing based on the Discrete Event Systems Specification Unified Process. The text... |
|
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |