Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Mongoid
Learning Mongoid

If you know MongoDB and Ruby, then Mongoid is a very handy tool to have at your disposal. Quickly learn to build Rails applications with the helpful code samples and instructions in this book.

Overview

  • A step-by-step guide that explains how to use Mongoid through lots of examples and code
  • ...
Aliasing in Object-Oriented Programming: Types, Analysis and Verification (Lecture Notes in Computer Science)
Aliasing in Object-Oriented Programming: Types, Analysis and Verification (Lecture Notes in Computer Science)

This book presents a survey of the state-of-the-art on techniques for dealing with aliasing in object-oriented programming. It marks the 20th anniversary of the paper The Geneva Convention On The Treatment of Object Aliasing by John Hogg, Doug Lea, Alan Wills, Dennis de Champeaux and Richard Holt. The 22 revised papers were carefully reviewed...

Nuclear Signaling Pathways and Targeting Transcription in Cancer (Cancer Drug Discovery and Development)
Nuclear Signaling Pathways and Targeting Transcription in Cancer (Cancer Drug Discovery and Development)

At the moment, there is no dedicated book to summarize the roles, the significance, and potential therapeutic targeting of transcriptional factors from the perspective of signaling cascade, and thus, directly impacting the functionality of transcriptional factors in cancer. In addition, this book will offer a comprehensive basic and clinical...

Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)
Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)

Address Errors before Users Find Them
Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book
...

GPU Pro 4: Advanced Rendering Techniques
GPU Pro 4: Advanced Rendering Techniques

GPU Pro4: Advanced Rendering Techniques presents ready-to-use ideas and procedures that can help solve many of your day-to-day graphics programming challenges. Focusing on interactive media and games, the book covers up-to-date methods for producing real-time graphics.

Section editors Wolfgang Engel,...

Vision Based Systemsfor UAV Applications (Studies in Computational Intelligence)
Vision Based Systemsfor UAV Applications (Studies in Computational Intelligence)

This monograph is motivated by a significant number of vision based algorithms for Unmanned Aerial Vehicles (UAV) that were developed during research and development projects. Vision information is utilized in various applications like visual surveillance, aim systems, recognition systems, collision-avoidance systems and navigation. This book...

Instant Ember.js Application Development How-to
Instant Ember.js Application Development How-to

Ember.js is a frontend web development framework that organizes your JavaScript into clean, reusable code. With its powerful tools and concepts at your disposal you can create large scale web applications that rival native applications.

No matter how big your application gets, Ember.js makes your code manageable.

...

Fundamentals of Parameterized Complexity (Texts in Computer Science)
Fundamentals of Parameterized Complexity (Texts in Computer Science)

This comprehensive and self-contained textbook presents an accessible overview of the state of the art of multivariate algorithmics and complexity. Increasingly, multivariate algorithmics is having significant practical impact in many application domains, with even more developments on the horizon. The text describes how the multivariate...

Modeling Volcanic Processes: The Physics and Mathematics of Volcanism
Modeling Volcanic Processes: The Physics and Mathematics of Volcanism

Understanding the physical behavior of volcanoes is key to mitigating the hazards active volcanoes pose to the ever-increasing populations living nearby. The processes involved in volcanic eruptions are driven by a series of interlinked physical phenomena, and to fully understand these, volcanologists must employ various physics...

Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Time-Dependent Problems and Difference Methods
Time-Dependent Problems and Difference Methods

Praise for the First Edition

". . . fills a considerable gap in the numerical analysis literature by providing a self-contained treatment . . . this is an important work written in a clear style . . . warmly recommended to any graduate student or researcher in the field of the numerical solution of partial...

Wireless Communications: Algorithmic Techniques
Wireless Communications: Algorithmic Techniques

This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems,...

Result Page: Previous 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy