Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algebraic Methodology and Software Technology: 12th International Conference, AMAST 2008 Urbana, IL, USA, July 28-31, 2008, Proceedings (Lecture Notes in Computer Science)
Algebraic Methodology and Software Technology: 12th International Conference, AMAST 2008 Urbana, IL, USA, July 28-31, 2008, Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed proceedings of the 12th International Conference on Algebraic Methodology and Software Technology, AMAST 2008, held in Urbana, IL, USA, in July 2008.

The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 58 submissions. Among the topics covered are all...

Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks

I first began developing social applications when Facebook opened up its developer platform in 2007, giving people like me a taste of the extensive social data that an application can use to improve growth and target personalization settings. At the time, I was building social fantasy sports applications for CBSSports.com, pulling user...

The Fashion Design Reference & Specification Book: Everything Fashion Designers Need to Know Every Day
The Fashion Design Reference & Specification Book: Everything Fashion Designers Need to Know Every Day

An essential primer for students and first-stop reference for professionals, The Fashion Design Reference & Specification Book takes the fashion designer through the entire design process, from conceiving a garment to marketing it.

This valuable handbook contains the information and ideas essential to planning...

Kanban in Action
Kanban in Action

Summary

Kanban in Action is a down-to-earth, no-frills, get-to-know-the-ropes introduction to kanban. It's based on the real-world experience and observations from two kanban coaches who have introduced this process to dozens of teams. You'll learn the principles of why kanban works, as well as...

Speech Processing for IP Networks: Media Resource Control Protocol (MRCP)
Speech Processing for IP Networks: Media Resource Control Protocol (MRCP)

Media Resource Control Protocol (MRCP) is a new IETF protocol, providing a key enabling technology that eases the integration of speech technologies into network equipment and accelerates their adoption resulting in exciting and compelling interactive services to be delivered over the telephone. MRCP leverages IP telephony and Web technologies...

The Unified Modeling Language Reference Manual
The Unified Modeling Language Reference Manual

The authors have done an outstanding job with this UML book. The definitions of the terms are the best I have seen. The organization and material in the encyclopedia are fantastic!

--Perry Cole, MCIWorldCom

The Unified Modeling Language (UML) has rapidly become the standard notation for modeling...

Mastering Enterprise JavaBeans (2nd Edition)
Mastering Enterprise JavaBeans (2nd Edition)

Mastering Enterprise JavaBeans, 2nd Ed. by Ed Roman and Scott Ambler includes the new EJB specification and expanded coverage on more advanced topics for developers. (Publishers Weekly)

"...the style is informal, with clear explanations…an enjoyable read and good value for money..." (Computer...

Secure Systems Development with UML
Secure Systems Development with UML
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.

Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML...

Netcentric System of Systems Engineering with DEVS Unified Process
Netcentric System of Systems Engineering with DEVS Unified Process

Addressing the new challenges that engineers face, this book presents fundamental concepts to help tackle the integration of modeling and simulation with command, and control systems of systems through the use of concepts and standards for interoperability and testing based on the Discrete Event Systems Specification Unified Process. The text...

TCP/IP Unleashed (3rd Edition)
TCP/IP Unleashed (3rd Edition)

TCP/IP Unleashed, Third Edition, explains the features and complexities of the TCP/IP protocol suite in a comprehensive, logical format. The book is designed for easy reference and incorporates step-by-step guidelines and configuration examples to enhance the reader's learning experience. Our expert authors walk through the fundamentals of...

Formal Refinement for Operating System Kernels
Formal Refinement for Operating System Kernels
The kernel of any operating system is its most critical component. The remainder of the system depends upon a correctly functioning and reliable kernel for its operation.

The purpose of this book is to show that the formal specification of kernels can be followed by a completely formal refinement process that leads to the extraction of...

Software Abstractions : Logic, Language, and Analysis
Software Abstractions : Logic, Language, and Analysis
Software is built on abstractions. Pick the right ones, and programming
will flow naturally from design; modules will have small and simple interfaces;
and new functionality will more likely fit in without extensive
reorganization. Pick the wrong ones, and programming will be a series
of nasty surprises: interfaces will become
...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy