Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Testing with Junit
Testing with Junit

Master high quality software development driven by unit tests

About This Book

  • Design and implement robust system components by means of the de facto unit testing standard in Java
  • Reduce defect rate and maintenance effort, plus simultaneously increase code quality and development pace
  • ...
Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods
Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods
This book discusses large margin and kernel methods for speech and speaker recognition

Speech and Speaker Recognition: Large Margin and Kernel Methods is a collation of research in the recent advances in large margin and kernel methods, as applied to the field of speech and speaker recognition. It presents...

Image Processing: Principles and Applications
Image Processing: Principles and Applications
Image processing—from basics to advanced applications

Learn how to master image processing and compression with this outstanding state-of-the-art reference. From fundamentals to sophisticated applications, Image Processing: Principles and Applications covers multiple topics and provides a fresh perspective on future directions and...

Verilog and SystemVerilog Gotchas: 101 Common Coding Errors and How to Avoid Them
Verilog and SystemVerilog Gotchas: 101 Common Coding Errors and How to Avoid Them

This book will help engineers write better Verilog/SystemVerilog design and verification code as well as deliver digital designs to market more quickly. It shows over 100 common coding mistakes that can be made with the Verilog and SystemVerilog languages. Each example explains in detail the symptoms of the error, the languages rules that...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

A Distributed Pi-Calculus
A Distributed Pi-Calculus
Distributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behavior are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behavior of mobile agents in a distributed world. It is based on an existing formal language, the...
Programming Logics: Essays in Memory of Harald Ganzinger (Lecture Notes in Computer Science)
Programming Logics: Essays in Memory of Harald Ganzinger (Lecture Notes in Computer Science)

This Festschrift volume, published in memory of Harald Ganzinger, contains 17 papers from colleagues all over the world and covers all the fields to which Harald Ganzinger dedicated his work during his academic career. The volume begins with a complete account of Harald Ganzinger's work and then turns its focus to the research of his...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)
Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)

Concurrent processes can exhibit extremely complicated behavior, and neither informal reasoning nor testing is reliable enough to establish their correctness. In this thesis, we develop a new technique for the verification of parallel programs. The technique is stated in terms of axioms and inference rules, and it is used to prove...

Governance, Risk, and Compliance Handbook for Oracle Applications
Governance, Risk, and Compliance Handbook for Oracle Applications
  • Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
  • Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
  • ...
Multi-Core Embedded Systems (Embedded Multi-Core Systems)
Multi-Core Embedded Systems (Embedded Multi-Core Systems)

This book is authored to address many challenging topics related to the multi-core embedded systems research area, starting with multi-core architectures and interconnects, embedded design methodologies for multi-core systems, to mapping of applications, programming paradigms and models of computation on multi-core embedded systems.

...

Concurrency: State Models and Java Programs
Concurrency: State Models and Java Programs
‘I love this book! It is beautifully written and the combined FSP/Java approach to model-based development is leading-edge.  The supporting materials, including the LTSA software and the lecture slides, are superb.’ (Scott Smolka, SUNY at Stony Brook)

This book provides a systematic and practical approach to...

Result Page: 26 25 24 23 22 21 20 19 18 17 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy