|
|
| | Enterprise Architecture at Work: Modelling, Communication and AnalysisMany stakeholders within and outside the company can be identified, ranging from top-level management to software engineers. Each stakeholder requires specific information presented in an accessible way, to deal with the impact of such wide-ranging developments. To predict the effects of such developments and modifications of an... | | |
|
Fundamentals of Computer Organization and DesignThis advanced textbook provides a comprehensive survey of hardware and software architectural principles and methods of computer systems organization and design. It covers both CISC and RISC processors in detail, presenting Pentium, PowerPC, MIPS, SPARC and Itanium. In addition, assembly language programming for both CISC (Pentium) and RISC... | | | | |
|
| | Automata, Languages and Programming: 31st International Colloquium, ICALP 2004, Turku, Finland, July 12-16, 2004, ProceedingsThis book constitutes the refereed proceedings of the 31st International Colloquium on Automata, Languages and Programming, ICALP 2004, held in Turku, Finland, in July 2004.
The 97 revised full papers presented together with abstracts of 6 invited talks were carefully reviewed and selected from 379 submissions. The papers address all current... | | |
|
Parsing Techniques: A Practical Guide (Monographs in Computer Science)Parsing, also referred to as syntax analysis, has been and continues to be an essential part of computer science and linguistics. Today, parsing techniques are also implemented in a number of other disciplines, including but not limited to, document preparation and conversion, typesetting chemical formulae, and chromosome recognition.
This... | | | | Economics of Identity Theft: Avoidance, Causes and Possible CuresToday, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information.... |
|
Result Page: 415 414 413 412 411 410 409 408 407 406 405 404 403 402 401 400 399 398 397 |