Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Information Systems and Technologies: International Conferences WEBIST 2005 and WEBIST 2006, Revised Selected Papers
Web Information Systems and Technologies: International Conferences WEBIST 2005 and WEBIST 2006, Revised Selected Papers
This book contains the best papers from the first two instances of the International Conference on Web Information Systems and Technologies (WEBIST 2005 and 2006), organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) in collaboration with the OMG (Object Management Group), held in Miami (USA)...
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002, held in Redwood Shores, California, USA in August 2002.

The 41 revised full papers presented together with two invited contributions were carefully selected from 101 submissions during two...

Formal Verification of Object-Oriented Software: International Conference, FoVeOOS 2010
Formal Verification of Object-Oriented Software: International Conference, FoVeOOS 2010

Formal software verification has outgrown the area of academic case studies, and industry is showing serious interest. The logical next goal is the verification of industrial software products. Most programming languages used in industrial practice are object-oriented, e.g., Java, C++, or C#. The International Conference on Formal...

Give Them Lala
Give Them Lala
USA TODAY BESTSELLER

The Vanderpump Rules breakout star and provocateur brings her signature sharp wit to the page with this collection of humorous and brutally honest essays exploring her rocky road to fame, sobriety, and beyond.

What does “Give them Lala”
...
Computing Information Technology: The Human Side
Computing Information Technology: The Human Side
From the senior management to the clerical and support group levels, this study addresses the possible pitfalls and triumphs of implementing information technology (IT) into organizations in terms of organizational strategies, structures, and communication methods. Issues of human-computer interaction, ethics, privacy, and security are raised to...
Big Book of Windows Hacks
Big Book of Windows Hacks
Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB...
Information Technology Policy and the Digital Divide: Lessons for Developing Countries
Information Technology Policy and the Digital Divide: Lessons for Developing Countries
The proliferation of new information technologies throughout the world has raised some important questions for policymakers as to how developing countries can benefit from their diffusion. This important volume compares the advantages and disadvantages of the IT revolution through detailed studies of a variety of developed and developing nations...
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
Widely adopted by service providers to enable IP telephony, instant messaging, and other data services, SIP is the signaling protocol of choice for advanced multimedia communications signaling. Compiled by noted engineering experts Syed Ahson and Mohammad Ilyas, SIP Handbook: Services, Technologies, and Security of Session Initiation...
Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop
Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop

Interest in and needs for provenance are growing as data proliferate. Data are increasing in a wide array of application areas, including scientific workflow systems, logical reasoning systems, text extraction, social media, and linked data. As data volumes expand and as applications become more hybrid and distributed in nature, there is...

The Power of Real-Time Social Media Marketing: How to Attract and Retain Customers and Grow the Bottom Line in the Globally Connected World
The Power of Real-Time Social Media Marketing: How to Attract and Retain Customers and Grow the Bottom Line in the Globally Connected World

Today's Hottest Trends for On-the-Spot Marketing!

"A must read for media and marketers.”
—Alan Cohen, CEO, OMD USA

"What do fish tacos, data storage, and disaster relief all have in common? Each has harnessed the power of marketing that amplifies via the real-time social web....

Robust Systems Theory and Applications (Adaptive and Learning Systems for Signal Processing, Communications and Control Series)
Robust Systems Theory and Applications (Adaptive and Learning Systems for Signal Processing, Communications and Control Series)
A complete, up-to-date textbook on an increasingly important subject

Robust Systems Theory and Applications covers both the techniques used in linear robust control analysis/synthesis and in robust (control-oriented) identification. The main analysis and design methods are complemented by elaborated examples and a group of worked-out...

User Modeling, Adaptation and Personalization: 19th International Conference, UMAP 2011, Girona, Spain
User Modeling, Adaptation and Personalization: 19th International Conference, UMAP 2011, Girona, Spain
The 19th International Conference on User Modeling, Adaptation and Personalization (UMAP 2011) took place in Girona, Spain, during July 11–15, 2011. It was the third annual conference under the UMAP title, which resulted from the merger in 2009 of the successful biannual User Modeling (UM) and Adaptive Hypermedia (AH)...
unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy