|
|
|
|
Software Automatic Tuning: From Concepts to State-of-the-Art Results
Software automatic tuning is a technology paradigm enabling software adaptation to a variety of computational conditions. Originating from the stream of research works on highperformance computing, it is considered to be the most promising approach to the required performance advancements on the next generation supercomputing platforms. Also,... | | Beginning Java 8 Language Features: Lambda Expressions, Inner Classes, Threads, I/O, Collections, and Streams
Beginning Java 8 Language Features covers essential and advanced features of the Java programming language such as the new lambda expressions (closures), inner classes, threads, I/O, Collections, garbage collection, streams, and more. Author Kishori Sharan provides over 60 diagrams and 290 complete programs to help you visualize and... | | Java in Two Semesters: Featuring JavaFX (Texts in Computer Science)
This easy-to-follow textbook teaches Java programming from first principles, as well as covering design and testing methodologies. The text is divided into two parts. Each part supports a one-semester module, the first part addressing fundamental programming concepts, and the second part building on this foundation, teaching the... |
|
|
Java: The Complete Reference, Ninth Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
The Definitive Java Programming Guide
Fully updated for Java SE 8, Java: The Complete Reference, Ninth Edition... | | Programming Erlang: Software for a Concurrent WorldErlang solves one of the most pressing problems facing developers today: how to write reliable, concurrent, high-performance systems. It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.
Moore's Law is the observation that the amount you can do on a single chip... | | Algorithmic Cryptanalysis (Cryptography and Network Security)Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,... |
|
Assemble the Social Web with zembly
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More!
With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and scale next-generation web applications as it is... | | Kinect for Windows SDK Programming Guide
Build motion-sensing applications with Microsoft's Kinect for Windows SDK quickly and easily
-
Building application using Kinect for Windows SDK.
-
Covers the Kinect for Windows SDK v1.6.
-
A practical step-by-step tutorial to make learning easy for a beginner.
-
A detailed...
| | VPNs Illustrated : Tunnels, VPNs, and IPsecVirtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually... |
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 |