Home | Amazing | Today | Tags | Publishers | Years | Search 
Database Design and Relational Theory: Normal Forms and All That Jazz
Database Design and Relational Theory: Normal Forms and All That Jazz
This book began life as a comparatively short chapter in a book called Database in Depth: Relational Theory for Practitioners (O’Reilly, 2005). That book was superseded by SQL and Relational Theory: How to Write Accurate SQL Code (O’Reilly, 2009), where the design material, since it was somewhat tangential to...
Discrete Mathematics for Computer Scientists
Discrete Mathematics for Computer Scientists

Many colleges and universities offer a course in discrete mathematics. Students taking these courses are from many disciplines, one of the largest being computer science. As a part of the Mathematics Across the Curriculum project at Dartmouth, supported by the National Science Foundation,1 we proposed to create a discrete mathematics...

Tools and Algorithms for the Construction and Analysis of Systems: 17th International Conference
Tools and Algorithms for the Construction and Analysis of Systems: 17th International Conference

This volume contains the proceedings of the 17th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2011). TACAS 2011 took place in Saarbr¨ucken, Germany, March 28–31, 2011, as part of the 14th European Joint Conferences on Theory and Practice of Software (ETAPS 2011), whose...

Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011

FASE (Fundamental Approaches to Software Engineering) is concerned with the foundations on which software engineering is built. Its focus is on novel techniques and the way in which they contribute to making software engineering a more mature and soundly based discipline. This year, we particularly encouraged contributions that combine the...

Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland
Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland

ICALP 2011, the 38th edition of the International Colloquium on Automata, Languages and Programming, was held in Z¨urich, Switzerland, during July 4–8, 2011. ICALP is a series of annual conferences of the European Association for Theoretical Computer Science (EATCS) which first took place in 1972. This year, the ICALP...

Automated Deduction in Geometry: 8th International Workshop, ADG 2010, Munich, Germany
Automated Deduction in Geometry: 8th International Workshop, ADG 2010, Munich, Germany

From July 22 to July 24, 2010, the Technische Universit¨at M¨unchen, Germany, hosted the eighth edition of the now well-established ADG workshop dedicated to Automatic Deduction in Geometry. From the first edition, which was held in Toulouse in 1996, to ADG 2010, a slow mutation has taken place. The workshop that was formerly...

Rewriting Logic and Its Applications: 8th International Workshop, WRLA 2010
Rewriting Logic and Its Applications: 8th International Workshop, WRLA 2010
Rewriting is a form of inference, and one that interacts in several ways with other forms of inference such as decision procedures and proof search. We discuss a range of issues at the intersection of rewriting and inference. How can other inference procedures be combined with rewriting? Can rewriting be used to describe...
Computer Science: The Hardware, Software and Heart of It
Computer Science: The Hardware, Software and Heart of It

Computer Science: The Hardware, Software and Heart of It focuses on the deeper aspects of the two recognized subdivisions of Computer Science, Software and Hardware. These subdivisions are shown to be closely interrelated as a result of the stored-program concept. Computer Science: The Hardware, Software and Heart of It includes certain...

Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis

As a programmer working for Logica UK in London in the mid-1980’s, I became a passionate advocate of formal methods. Extrapolating from small successes with VDM and JSP, I was sure that widespread use of formal methods would bring an end to the software crisis.

One approach especially intrigued me. John Guttag and Jim
...

Seven Databases in Seven Weeks: A Guide to Modern Databases and the NoSQL Movement
Seven Databases in Seven Weeks: A Guide to Modern Databases and the NoSQL Movement
It has been said that data is the new oil. If this is so, then databases are the fields, the refineries, the drills, and the pumps. Data is stored in databases, and if you’re interested in tapping into it, then coming to grips with the modern equipment is a great start.

Databases are
...
Real Analysis
Real Analysis

This book is written by award-winning author, Frank Morgan. It offers a simple and sophisticated point of view, reflecting Morgan's insightful teaching, lecturing, and writing style. Intended for undergraduates studying real analysis, this book builds the theory behind calculus directly from the basic concepts of real numbers, limits, and...

Result Page: 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy