|
|
|
|
|
| | Introduction to GUI with SwingModern operating systems such as Microsoft’s Windows, Apple’s MacOS, and the different Unix-based versions such as Linux or Solaris use a graphical interface to communicate with the user. The communication consists of information displayed by programs and actions and commands issued by the user. This book is an introduction to graphic... | | Conceptual Spaces: The Geometry of Thought"This is a fearless book that casts a wide net around key issues in cognitive science. It offers the kind of coherent, unified view that the field badly needs." - Steven Sloman, Associate Professor, Cognitive and Linguistic Sciences, Brown University"
Within cognitive science, two approaches currently dominate... |
|
|
Elementary Computability, Formal Languages, and Automata
This book is an introduction to theoretical computer science emphasizing two interrelated areas: the theory of computability {how to tell whether problems are algorithmically solvable) and the theory of formal languages (how to design and use special languages, as for algorithms). Automata {idealized computer devices) are used as precise... | | Embedded Software Development with eCos
In 1997. there were over 100 commercially supported embedded operating systems, none of which had more than a minority share of the overall embedded OS market, not to mention countless thousands of others developed for specific projects (cell phones, radar arrays, networking equipment, etc.) that had no application developer base beyond that... | | Design of Hashing Algorithms (Lecture Notes in Computer Science)
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the... |
|
|
Result Page: 434 433 432 431 430 429 428 427 426 425 424 423 422 421 420 419 418 417 416 |