Home | Amazing | Today | Tags | Publishers | Years | Search 
Patterns for Performance and Operability: Building and Testing Enterprise Software
Patterns for Performance and Operability: Building and Testing Enterprise Software
Structured to follow the software life cycle, Patterns for Performance and Operability provides advice and examples-based instructions at every phase. You can read it from start to finish or go directly to those chapters that interest you the most. Whatever approach you choose, you will learn:

How to:

·...

Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes of mobility data. This is a scenario of great opportunities and risks: on one side, mining this data can produce useful knowledge, supporting sustainable mobility and...
High Performance Computing in Science and Engineering 2007
High Performance Computing in Science and Engineering 2007
This book presents the state-of-the-art in simulation on supercomputers. Leading researchers present results achieved on systems of the Stuttgart High Performance Computing Center (HLRS) for the year 2007. The reports cover all fields of computational science and engineering, ranging from CFD and computational physics and chemistry to computer...
The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition
The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition
Todays embedded devices and sensor networks are becoming more and more sophisticated, requiring more efficient and highly flexible compilers. Engineers are discovering that many of the compilers in use today are ill-suited to meet the demands of more advanced computer architectures.

Updated to include the latest techniques, The
...
Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003
Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003
SAC 2003 was the tenth in a series of annual workshops on Selected Areas in Cryptography. This marked the third time that the workshop had been held at Carleton University in Ottawa with previous workshops being held there in 1995 and 1997. The intent of the SAC workshops is to provide a relaxed atmosphere in which researchers in cryptography can...
Fundamental Approaches to Software Engineering
Fundamental Approaches to Software Engineering
This book constitutes the refereed proceedings of the 7th International Conference on Fundamental Approaches to Software Engineering, FASE 2004, held in Barcelona, Spain, in March/April 2004.

The 22 revised full papers and 4 tool presentation papers presented together with an invited paper and the abstract of another invited talk were carefully...

Trust Management: Second International Conference, iTrust 2004, Oxford, UK
Trust Management: Second International Conference, iTrust 2004, Oxford, UK
This book constitutes the refereed proceedings of the Second International Conference on Trust Management, iTrust 2004, held in Oxford, UK, in March/April 2004.

The 21 revised full papers and 6 revised short papers presented together with 3 invited contributions were carefully reviewed and selected from 48 submissions. Besides technical topics...

Programming Languages and Systems: 13th European Symposium on Programming, ESOP 2004
Programming Languages and Systems: 13th European Symposium on Programming, ESOP 2004
This book constitutes the refereed proceedings of the 13th European Symposium on Programming, ESOP 2004, held in Barcelona, Spain, in March/April 2004.

The 27 revised full papers presented together with the abstract of an invited talk were carefully reviewed and selected from a total of 118 submissions. The papers deal with a broad variety of...

Atlas of Mammography
Atlas of Mammography
Featuring over 1,500 mammographic images, this atlas is a comprehensive guide to interpreting mammograms. It presents the full spectrum of manifestations of breast diseases, as well as cases involving the postsurgical and augmented breast. Chapters are organized according to the pattern seen on the mammogram to develop readers' pattern recognition...
High-Dose Cancer Therapy: Pharmacology, Hematopoietins, Stem Cells
High-Dose Cancer Therapy: Pharmacology, Hematopoietins, Stem Cells
...a new edition of a comprehensive reference with 28 of the 50 chapters either completely updated or rewritten by new authors...reflects the fact that this treatment modality is now the standard of care for a variety of cancers.

Univ. of Nebraska, Omaha. Reference on the basic and clinical science of dose-intensive cancer
...
Rubyisms in Rails, Digital Shortcut
Rubyisms in Rails, Digital Shortcut

This is not a programming guide. Yes, there is code, but this digital shortcut is not about coding. Rather, this is really a short about design, about philosophy, and about appreciating beauty. This short looks at the way in which the grace of Ruby informs the design of Rails.

This is a surprisingly...

Digital Privacy: Theory, Technologies, and Practices
Digital Privacy: Theory, Technologies, and Practices
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy:...
Result Page: 816 815 814 813 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy