Home | Amazing | Today | Tags | Publishers | Years | Search 
Conceptual Modeling of Information Systems
Conceptual Modeling of Information Systems
When designing an information system, conceptual modeling is the activity that elicits and describes the general knowledge the system needs to know. This description, called the conceptual schema, is necessary in order to develop an information system. Recently, many researchers and professionals share a vision in which the conceptual schema...
Effective IT Service Management: To ITIL and Beyond!
Effective IT Service Management: To ITIL and Beyond!
IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, every IT project and system would deteriorate over time until failure. ITIL is the recognized best-practice standard for ITSM, and has been around since the late 1980s, with ITIL version 3 published just recently. However, many...
Introduction to Reconfigurable Computing: Architectures, algorithms and applications
Introduction to Reconfigurable Computing: Architectures, algorithms and applications
The book by Christophe Bobda, however, has also been written for people with a software background, substantially reducing the educational leap by bridging the gap. His book has the potential to become a best-seller and to stimulate the urgently needed transformation of the software developer populations mind set, by playing a similar role as known...
Software Measurement: Establish - Extract - Evaluate - Execute
Software Measurement: Establish - Extract - Evaluate - Execute
Our world and our society are shaped and increasingly governed by software. We might accept it or not, but it is happening at this point and will continue further on. It is difficult to imagine our world without software. There would be no running water, food supplies, business or transportation would disrupt immediately, diseases would spread, and...
Finite Model Theory and Its Applications (Texts in Theoretical Computer Science. An EATCS Series)
Finite Model Theory and Its Applications (Texts in Theoretical Computer Science. An EATCS Series)
This book gives a comprehensive overview of central themes of finite model theory expressive power, descriptive complexity, and zero-one laws together with selected applications relating to database theory and artificial intelligence, especially constraint databases and constraint satisfaction problems. The final chapter provides a concise modern...
Model-Driven Architecture in Practice: A Software Production Environment Based on Conceptual Modeling
Model-Driven Architecture in Practice: A Software Production Environment Based on Conceptual Modeling
Formal specification languages, object-oriented methods, CASE tools, component-based software production, agent-oriented, aspect-oriented ... During the last two decades many techniques have been proposed from both research and industry in order to generate a correct software product from a higher-level system specification. Nevertheless, the many...
Secure Data Management in Decentralized Systems (Advances in Information Security)
Secure Data Management in Decentralized Systems (Advances in Information Security)
The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business...
Neural Networks Theory
Neural Networks Theory
"Neural Networks Theory is a major contribution to the neural networks literature. It is a treasure trove that should be mined by the thousands of researchers and practitioners worldwide who have not previously had access to the fruits of Soviet and Russian neural network research. Dr. Galushkin is to be congratulated and thanked for his...
Forensic Computing (Practitioner)
Forensic Computing (Practitioner)
Throughout this book you will find that we have consistently referred to the term “Forensic Computing” for what is often elsewhere called “Computer Forensics”. In the UK, however,when we first started up, the name “Computer Forensics” had been registered to a commercial company that was operating in this field...
Essential RenderMan®
Essential RenderMan®
When I wrote Essential RenderMan fast in 2002 it didn’t seem that I was writing about a moving target. The RenderMan API is a standard, and hence doesn’t change radically from release to release. However, once you start writing things down they seem to change far more quickly than you expect.

No sooner had the book gone to
...
Distributed Services with OpenAFS: for Enterprise and Education
Distributed Services with OpenAFS: for Enterprise and Education
This book shows in detail how to build enterprise-level secure,redundant, and highly scalable services from scratch on top of theopen source Linux operating system, suitable for small companies aswell as big universities. The core architecture presented is based onKerberos, LDAP, AFS, and Samba. It is shown how to integrate web,message related,...
Multimedia Retrieval (Data-Centric Systems and Applications)
Multimedia Retrieval (Data-Centric Systems and Applications)
Retrieval of multimedia data is different from retrieval of structured data. A key problem in multimedia databases is search, and the proposed solutions to the problem of multimedia information retrieval span a rather wide spectrum of topics outside the traditional database area, ranging from information retrieval and humancomputer interaction to...
Result Page: 429 428 427 426 425 424 423 422 421 420 419 418 417 416 415 414 413 412 411 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy