Home | Amazing | Today | Tags | Publishers | Years | Search 
The Design of Approximation Algorithms
The Design of Approximation Algorithms

Discrete optimization problems are everywhere, from traditional operations research planning problems, such as scheduling, facility location, and network design; to computer science problems in databases; to advertising issues in viral marketing. Yet most such problems are NP-hard. Thus unless P = NP, there are no efficient algorithms to find...

An Introduction to Search Engines and Web Navigation
An Introduction to Search Engines and Web Navigation

This book is a second edition, updated and expanded to explain the technologies that help us find information on the web.  Search engines and web navigation tools have become ubiquitous in our day to day use of the web as an information source, a tool for commercial transactions and a social computing tool. Moreover, through the...

MCITP Self-Paced Training Kit (Exam 70-686): Windows 7 Desktop Administrator
MCITP Self-Paced Training Kit (Exam 70-686): Windows 7 Desktop Administrator

Announcing an all-new SELF-PACED TRAINING KIT designed to help maximize your performance on 70-686, the required exam for the MCITP: Windows 7, Desktop Administrator certification. This 2-in-1 kit includes the official Microsoft® study guide, plus practice tests on CD to help you assess your skills. It comes packed with the tools...

Musical Performance: A Comprehensive Approach: Theory, Analytical Tools, and Case Studies
Musical Performance: A Comprehensive Approach: Theory, Analytical Tools, and Case Studies

This book is a first sketch of what the overall field of performance could look like as a modern scientific field but not its stylistically differentiated practice, pedagogy, and history. Musical performance is the most complex field of music. It comprises the study of a composition’s expression in terms of...

Wireless and Mobile Networks Security
Wireless and Mobile Networks Security

This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This...

MySQL for Python
MySQL for Python

Python is a dynamic programming language, which is completely enterprise ready, owing largely to the variety of support modules that are available to extend its capabilities. In order to build productive and feature-rich Python applications, we need to use MySQL for Python, a module that provides database support to our applications. Although...

Computational Geometry: An Introduction Through Randomized Algorithms
Computational Geometry: An Introduction Through Randomized Algorithms

This introduction to computational geometry is designed for beginners. It emphasizes simple randomized methods, developing basic principles with the help of planar applications, beginning with deterministic algorithms and shifting to randomized algorithms as the problems become more complex. It also explores higher dimensional advanced...

Software Pipelines and SOA: Releasing the Power of Multi-Core Processing
Software Pipelines and SOA: Releasing the Power of Multi-Core Processing

Build Breakthrough Performance into Any SOA or Advanced Computing Application

To meet unprecedented demand, IT organizations must improve application performance by an order of magnitude. Improving performance is even more crucial in SOA environments, which demand far more computing power than older architectures.
...

App Savvy: Turning Ideas into iPad and iPhone Apps Customers Really Want
App Savvy: Turning Ideas into iPad and iPhone Apps Customers Really Want
How can you make your iPhone or iPad app stand out in the highly competitive App Store? While many books simply explore the technical aspects of iPhone and iPad app design and development, App Savvy focuses on the business, product, and marketing elements critical to pursuing, completing, and selling...
Oracle Embedded Programming and Application Development
Oracle Embedded Programming and Application Development

Focusing on tried and true best practice techniques in cross-technology based Oracle embedded programming, this book provides authoritative guidance for improving your code compilation and execution. Geared towards IT professionals developing Oracle-based Web-enabled applications in PL/SQL, Java, C, C++, .NET, Perl, and PHP, it covers...

Compiler Design: Virtual Machines
Compiler Design: Virtual Machines

While compilers for high-level programming languages are large complex software systems, they have particular characteristics that differentiate them from other software systems. Their functionality is almost completely well-defined – ideally there exist complete precise descriptions of the source and target languages, while additional...

Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

Result Page: 910 909 908 907 906 905 904 903 902 901 900 899 898 897 896 895 894 893 892 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy