|
|
|
|
Special Edition Using Perl 5 for Web ProgrammingBack in 1986, a UNIX programmer by the name of Larry Wall found himself working on a task that involved generating reports from a great many text files, with cross-references. Because he was a UNIX programmer, and because the problem involved manipulating the contents of text files, he started to use awk for the task. But it soon became clear that... | | | | The Engineering of Complex Real-Time Computer Control SystemsThe complexity of current computer control systems arises from the engineering requirement to integrate computers, actuators and sensors for control, signal processing and data networks, visualisation and display with the technology of the application domain. Further, real-time control systems, employing embedded and distributed computing, as... |
|
|
Machine Intelligence 14: Applied Machine IntelligenceThis 14th volume of the classic series on machine intelligence contains papers on complex decision taking, inductive logic programming, applied machine learning, dynamic control, and computational learning theory.
About the Author K. Furukawa is at Keio University, Tokyo. D. Michie is at... | | Replication Techniques in Distributed Systems (Advances in Database Systems)The dream behind interconnecting large numbers of computers has been to have their combined capabilities serve users as one. This distributed computer would compose its resources so as to offer functionality, dependability, and performance, that far exceed those offered by a single isolated computer. This dream has started to be realized, insofar... | | Investigating Computer CrimeInvestigating Computer Crime will prove a welcome addition to any security department's library. -Security Management
Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the... |
|
|
|
Result Page: Previous 9 10 11 12 13 14 15 Next |