Home | Amazing | Today | Tags | Publishers | Years | Search 
Unity 3.x Game Development Essentials
Unity 3.x Game Development Essentials

When we began creating Unity, we were just three programmers working on a beautiful little game. There weren't any good game engines that one could license without putting down wads of cash, so we created our own. We eventually decided that we enjoyed the challenge of making great tools even more than making games, and after some soul...

Algorithms and Computation: 20th International Symposium, ISAAC 2009, Honolulu, Hawaii
Algorithms and Computation: 20th International Symposium, ISAAC 2009, Honolulu, Hawaii

The papers in this volume were presented at the 20th Annual International Symposium on Algorithms and Computation, held December 16–18, 2009, in Hawaii, USA. In response to the Call-for-Papers, 279 papers were submitted. Each paper received at least three reviews by either Program Committee members or experts selected by Program...

Facebook Application Development with Graph API Cookbook
Facebook Application Development with Graph API Cookbook

With a user base of nearly 800 million people, Facebook is the number one social networking platform. Applications can be created to interact with this huge user base in various ways both inside and outside Facebook. These applications, if developed effectively and efficiently, offer a free medium for promotion and publicity of a product or...

Introducing HTML5 Game Development
Pro Web Project Management (Expert's Voice in Web Development)
Pro Web Project Management (Expert's Voice in Web Development)

This guide was written for those who will manage or fund technology projects with budgets between $25,000 and $500,000. Our goal is to provide a quick-start guide for professional, smart, competent people who are new to web project management, or who need some guidance on how to manage a web project.

Pro Web Project...

Oracle Database 11gR2 Performance Tuning Cookbook
Oracle Database 11gR2 Performance Tuning Cookbook

People use databases to organize and to manage their data. Oracle Database is the leader in the relational database management systems market, with a broad adoption in many industries. Using the best tool is not enough to be sure that the results of our efforts will be satisfactory—driving the fastest car in a Formula 1...

Internet and Network Economics: 7th International Workshop, WINE 2011, Singapore, December 11-14, 2011
Internet and Network Economics: 7th International Workshop, WINE 2011, Singapore, December 11-14, 2011

This volume contains the papers presented at WINE 2011: 7th Workshop on Internet and Network Economics held during December 11–14, 2011 in Singapore.

Over the past decade, there has been a growing interaction between researchers in theoretical computer science, networking and security, economics, mathematics, sociology,...

Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Innovative Computing Technology: First International Conference, INCT 2011, Tehran, Iran
Innovative Computing Technology: First International Conference, INCT 2011, Tehran, Iran

We are pleased to publish the significant papers accepted in the First International Conference on Innovative Computing Technology (INCT 2011).

The production and the use of newer computing devices and platforms has led to a better understanding of the emerging computing paradigms. For many decades, computing systems have...

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Pattern Recognition: 32nd DAGM Symposium, Darmstadt, Germany, September 22-24, 2010
Pattern Recognition: 32nd DAGM Symposium, Darmstadt, Germany, September 22-24, 2010

On behalf of the organizing committee, we would like to welcome you to Darmstadt and DAGM 2010, the 32nd Annual Symposium of the German Association for Pattern Recognition.

The technical program covered all aspects of pattern recognition and, to name only a few areas, ranged from 3D reconstruction, to object recognition and...

Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011

It was a real pleasure to have taken part in organizing the 10th International Conference on Cryptography and Network Security (CANS 2011). It was held during December 10–12, 2011, at the International Asia Pacific Convention Center in Sanya, on the subtropical island of Hainan (China). CANS 2011 was sponsored by the National...

Result Page: 1983 1982 1981 1980 1979 1978 1977 1976 1975 1974 1973 1972 1971 1970 1969 1968 1967 1966 1965 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy