 |
|
|
|
 Microsoft Expression Blend 4 Step by Step
Microsoft Expression Blend 4 is Microsoft’s newest interactive design tool. It’s intended for
designers and developers who need to create user interfaces for rich Internet, desktop, and
mobile applications—and it offers tools that support the design of such applications, from
conception to completion.
... |  |  Using FileMaker Bento
Bento is a product from FileMaker, which is owned by Apple. Designed to bring
FileMaker’s database expertise to users of Mac OS X Leopard and later, it integrates
data from iPhoto, iCal, Mail, and Address Book with databases that you can create
from your own data as well as data imported from other sources.
Bento is... |  |  Object-Oriented Analysis and Design (Undergraduate Topics in Computer Science)
At least some people reading the title of this book may wonder why there should be one more book on the topic of Object Oriented Analysis and Design (OOAD). The short answer to this question is that in our teaching of the subject for over a decade, we have not been able to find a suitable textbook on this topic at our respective... |
|
 Link Mining: Models, Algorithms, and Applications
This book presents in-depth surveys and systematic discussions on models, algorithms and applications for link mining. Link mining is an important field of data mining. Traditional data mining focuses on "flat" data in which each data object is represented as a fixed-length attribute vector. However, many real-world data sets are... |  |  Core Concepts in Data Analysis: Summarization, Correlation and Visualization
In this textbook, I take an unconventional approach to data analysis. Its contents
are heavily influenced by the idea that data analysis should help in enhancing and
augmenting knowledge of the domain as represented by the concepts and statements
of relation between them. According to this view, two main pathways for
data analysis are... |  |  Cryptanalysis of RSA and Its Variants
Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its... |
|
| Result Page: 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 |