Home | Amazing | Today | Tags | Publishers | Years | Search 
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Solaris: System Administration Guide: No.7
Solaris: System Administration Guide: No.7
Covers a broad range of Solaris system administration topics such as managing user accounts and groups; managing server and client support; shutting down and booting a system; managing removable media (CDs, diskettes, and PCMCIA cards); managing software (packages and patches); managing disks and devices; managing file systems, backing up and...
Rationale-Based Software Engineering
Rationale-Based Software Engineering
Many decisions are required throughout the software development process. These decisions, and to some extent the decision-making process itself, can best be documented as the rationale for the system, which will reveal not only what was done during development but the reasons behind the choices made and alternatives considered and rejected. This...
Visual Data Mining: Theory, Techniques and Tools for Visual Analytics (Lecture Notes in Computer Science)
Visual Data Mining: Theory, Techniques and Tools for Visual Analytics (Lecture Notes in Computer Science)
The importance of visual data mining, as a strong sub-discipline of data mining, had already been recognized in the beginning of the decade. In 2005 a panel of renowned individuals met to address the shortcomings and drawbacks of the current state of visual information processing. The need for a systematic and methodological development of visual...
Traffic Grooming for Optical Networks: Foundations, Techniques and Frontiers (Optical Networks)
Traffic Grooming for Optical Networks: Foundations, Techniques and Frontiers (Optical Networks)
Traffic grooming is the name given to a family of optical network design problems that has attracted significant attention from both academia and industry in the last decade or so. The huge bandwidth of fiber optical networking is much larger than the typical bandwidth demands experienced by network service providers. This mismatch creates a need...
The Developer's Guide to Debugging
The Developer's Guide to Debugging

Software has bugs. Period.

That's true, unfortunately. Even the good old "hello, world" program, known to virtually every C and C++ programmer in the world, can be considered to be buggy. Developing software means having to deal with defects; old ones, new ones, ones you created yourself, and those that others brought to life....

Software Process Improvement: 13th European Conference, EuroSpi 2006, Joensuu, Finland, October 11-13, 2006, Proceedings
Software Process Improvement: 13th European Conference, EuroSpi 2006, Joensuu, Finland, October 11-13, 2006, Proceedings
This book constitutes the refereed proceeding of the 13th European Software Process Improvement Conference, EuroSPI 2006, held in Joensuu, Finland in October 2006.

The 18 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on SPI (Software Process Improvement)...

Realization Theory and Design of Digital Images (Lecture Notes in Control and Information Sciences)
Realization Theory and Design of Digital Images (Lecture Notes in Control and Information Sciences)
This monograph deals with the description and design of digital images. Regarding digital images as special input/output relations in our previous book with LNCIS series, the description problem of digital images is transformed into the realization problem of digital images. From the data in digital images, mathematical models will be constructed....
Virtual Reality: Second International Conference, ICVR 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings
Virtual Reality: Second International Conference, ICVR 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings
This book constitutes the refereed proceedings of the Second International Conference on Virtual Reality, ICVR 2007, held in Beijing, China in July 2007 in the framework of the 12th International Conference on Human-Computer Interaction, HCII 2007 with 8 other thematically similar conferences.

The 81 revised papers presented were carefully...

The Disappearing Computer: Interaction Design, System Infrastructures and Applications for Smart Environments
The Disappearing Computer: Interaction Design, System Infrastructures and Applications for Smart Environments
“The-computer-as-we-know-it” will have no role in our future everyday lives. This is the position taken in this book which elaborates how it will be replaced by a new generation of technologies, moving computing off the desktop and ultimately integrating it with real world objects and everyday environments. Computing becomes thus an...
IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

Reflections on the Teaching of Programming: Methods and Implementations (Lecture Notes in Computer Science)
Reflections on the Teaching of Programming: Methods and Implementations (Lecture Notes in Computer Science)
This state-of-the-art survey, reflecting on the teaching of programming, has been written by a group of primarily Scandinavian researchers and educators with special interest and experience in the subject of programming. The 14 chapters - contributed by 24 authors - present practical experience gathered in the process of teaching programming and...
Result Page: 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 382 381 380 379 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy