Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Adobe Flex 4.5 Fundamentals: Training from the Source
Adobe Flex 4.5 Fundamentals: Training from the Source

Macromedia introduced Flex in 2004 so that developers could write web applications for the nearly ubiquitous Flash platform. These applications benefited from the improved design, usability, and portability that Flex made possible, dramatically changing the user experience. These features are a cornerstone of Web 2.0, a new generation...

Moodle for Mobile Learning
Moodle for Mobile Learning

Mobile devices have become ubiquitous, and both smartphones and tablets offer so many new possibilities for learning. Moodle is gradually becoming more mobile-friendly, with the inclusion of a mobile theme in Moodle 2, the availability of responsive third-party themes, and the launch of an official Moodle app. Moodle and mobile are coming...

A Theory of Distributed Objects
A Theory of Distributed Objects

Distributed and communicating objects are becoming ubiquitous. In global, Grid and Peer-to-Peer computing environments, extensive use is made of objects interacting through method calls. So far, no general formalism has been proposed for the foundation of such systems.

Caromel and Henrio are the first to define a calculus for distributed...

Java Closures and Lambda
Java Closures and Lambda
This book is the culmination of many brash years and hard lessons. The story starts all the way back when I migrated from C++ into perl. The perl programming language was amazingly powerful compared to the low-level manipulations and bookkeeping of C++. (The fact that it was “slow” never bothered me – I would rather write...
Advanced Wired and Wireless Networks (Multimedia Systems and Applications)
Advanced Wired and Wireless Networks (Multimedia Systems and Applications)
We live in the era of information revolution triggered by a widespread
availability of Internet and Internet based applications, further enhanced by
an introduction of wireless data networks and extension of cellular networks
beyond traditional mobile telephony through an addition of the mobile
Internet access. The Internet has
...
Computer Networking First-Step
Computer Networking First-Step

Your first step into the world of computer networking

  • No experience required

  • Includes clear and easily understood explanations

  • Makes learning easy

...
Intelligent Environments: Methods, Algorithms and Applications (Advanced Information and Knowledge Processing)
Intelligent Environments: Methods, Algorithms and Applications (Advanced Information and Knowledge Processing)
This innovative book discusses engineering solutions for the automatic understanding of a complex scene via multi-modal arrays of sensors. It focuses on research dealing with robotic platforms that augment an environment. In particular, it considers the study of information fusion methods, the study of algorithms for ontology learning from tabula...
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center

Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud...

OpenCL Programming Guide
OpenCL Programming Guide

Industry pundits love drama. New products don’t build on the status quo to make things better. They “revolutionize” or, better yet, define a “new paradigm.” And, of course, given the way technology evolves, the results rarely are as dramatic as the pundits make it seem.

Over the past decade,...

Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Web Design and Marketing Solutions for Business Websites
Web Design and Marketing Solutions for Business Websites

The Internet encompasses all types of websites, from social media monoliths to individual blogs, from Justin Timberlake fan sites to Fortune 500 businesses. Everyone has a voice, and the medium has become the ultimate level playing field for those seeking to interact with the world through an always-on, instantly available, nearly...

Context-Aware Pervasive Systems: Architectures for a New Breed of Applications
Context-Aware Pervasive Systems: Architectures for a New Breed of Applications

The concept of aware systems is one of the most exciting trends in computing today, fueled by recent developments in pervasive computing. This book introduces a new breed of computer applications that are termed "context-aware pervasive systems" and provides architectural blueprints for building context-aware behavior into...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy