Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Automatic Tuning: From Concepts to State-of-the-Art Results
Software Automatic Tuning: From Concepts to State-of-the-Art Results

Software automatic tuning is a technology paradigm enabling software adaptation to a variety of computational conditions. Originating from the stream of research works on highperformance computing, it is considered to be the most promising approach to the required performance advancements on the next generation supercomputing platforms. Also,...

Beginning Java 8 Language Features: Lambda Expressions, Inner Classes, Threads, I/O, Collections, and Streams
Beginning Java 8 Language Features: Lambda Expressions, Inner Classes, Threads, I/O, Collections, and Streams

Beginning Java 8 Language Features covers essential and advanced features of the Java programming language such as the new lambda expressions (closures), inner classes, threads, I/O, Collections, garbage collection, streams, and more. Author Kishori Sharan provides over 60 diagrams and 290 complete programs to help you visualize and...

Java in Two Semesters: Featuring JavaFX (Texts in Computer Science)
Java in Two Semesters: Featuring JavaFX (Texts in Computer Science)

This easy-to-follow textbook teaches Java programming from first principles, as well as covering design and testing methodologies. The text is divided into two parts. Each part supports a one-semester module, the first part addressing fundamental programming concepts, and the second part building on this foundation, teaching the...

IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers,...

Sterile Filtration: A Practical Approach
Sterile Filtration: A Practical Approach

This book focuses on sterilizing grade filters in the biopharmaceutical industry, emphasizing practical applications of universal and dependable operational protocols, integrity testing, and troubleshooting to streamline the production and preparation of pharmaceuticals.

Addresses the complexities of globalizing redundancy in
...

Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science
Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science

Key Features

  • This book contains recipes on how to use Apache Spark as a unified compute engine
  • Cover how to connect various source systems to Apache Spark
  • Covers various parts of machine learning including supervised/unsupervised learning & recommendation engines

Book...

Java: The Complete Reference, Ninth Edition
Java: The Complete Reference, Ninth Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

The Definitive Java Programming Guide

Fully updated for Java SE 8, Java: The Complete Reference, Ninth Edition...

Programming Erlang: Software for a Concurrent World
Programming Erlang: Software for a Concurrent World
Erlang solves one of the most pressing problems facing developers today: how to write reliable, concurrent, high-performance systems. It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.

Moore's Law is the observation that the amount you can do on a single chip...

Algorithmic Cryptanalysis (Cryptography and Network Security)
Algorithmic Cryptanalysis (Cryptography and Network Security)
Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,...
Assemble the Social Web with zembly
Assemble the Social Web with zembly

Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More!

With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and scale next-generation web applications as it is
...

Kinect for Windows SDK Programming Guide
Kinect for Windows SDK Programming Guide

Build motion-sensing applications with Microsoft's Kinect for Windows SDK quickly and easily

  • Building application using Kinect for Windows SDK.
  • Covers the Kinect for Windows SDK v1.6.
  • A practical step-by-step tutorial to make learning easy for a beginner.
  • A detailed...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy