Home | Amazing | Today | Tags | Publishers | Years | Search 
PC Magazine - 1 August 2008
PC Magazine - 1 August 2008
First Looks
ABBYY FineReader Professional 9.0
Adobe Dreamweaver CS4 beta
Alienware Area-51 m15x
ASUS EeePC 900
Cerise Quad-Core Workstation
Gateway DX442XP
HP Color LaserJet CM1312nfi MFP
Kodak EasyShare M1033
LaCie Little Big Disk Quadra
Lenovo ThinkCentre M57p eco
Lenovo ThinkVision L190x...
From Grids To Service and Pervasive Computing
From Grids To Service and Pervasive Computing
Grids are a crucial enabling technology for scientific and industrial development. Peer-to-peer computing, grid, distributed storage technologies, emerging web service technologies, and other types of networked distributed computing have provided new paradigms exploiting distributed resources. Grids are revolutionizing computing as profoundly as...
Visual Data Mining: Theory, Techniques and Tools for Visual Analytics (Lecture Notes in Computer Science)
Visual Data Mining: Theory, Techniques and Tools for Visual Analytics (Lecture Notes in Computer Science)
The importance of visual data mining, as a strong sub-discipline of data mining, had already been recognized in the beginning of the decade. In 2005 a panel of renowned individuals met to address the shortcomings and drawbacks of the current state of visual information processing. The need for a systematic and methodological development of visual...
The Developer's Guide to Debugging
The Developer's Guide to Debugging

Software has bugs. Period.

That's true, unfortunately. Even the good old "hello, world" program, known to virtually every C and C++ programmer in the world, can be considered to be buggy. Developing software means having to deal with defects; old ones, new ones, ones you created yourself, and those that others brought to life....

CONCUR 2008 - Concurrency Theory: 19th International Conference, CONCUR 2008, Toronto, Canada, August 19-22, 2008, Proceedings
CONCUR 2008 - Concurrency Theory: 19th International Conference, CONCUR 2008, Toronto, Canada, August 19-22, 2008, Proceedings
This book constitutes the refereed proceedings of the 19th International Conference on Concurrency Theory, CONCUR 2008, held in Toronto, Canada, August 19-22, 2008.

The 33 revised full papers presented together with 2 tool papers were carefully reviewed and selected from 120 submissions. The topics include model checking, process calculi,...

Artificial Immune Systems: 7th International Conference, ICARIS 2008, Phuket, Thailand, August 10-13, 2008, Proceedings
Artificial Immune Systems: 7th International Conference, ICARIS 2008, Phuket, Thailand, August 10-13, 2008, Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Artificial Immune Systems, ICARIS 2008, held in Phuket, Thailand, in August 2008.

The 40 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on computational immunology, applied...

Hybrid Learning and Education: First International Conference, ICHL 2008 Hong Kong, China, August 13-15, 2008 Proceedings
Hybrid Learning and Education: First International Conference, ICHL 2008 Hong Kong, China, August 13-15, 2008 Proceedings
The First International Conference on Hybrid Learning was organized by City University of Hong Kong, Caritas Francis Hsu College and Caritas Bianchi College of Careers in August 2008. ICHL2008 was an innovative and consolidative experience for Hong Kong tertiary higher education. The conference aims to unify the traditional classroom face-to-face...
Secure Transaction Protocol Analysis: Models and Applications (Lecture Note in Computer Science)
Secure Transaction Protocol Analysis: Models and Applications (Lecture Note in Computer Science)
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to...
Understanding Forensic Digital Imaging
Understanding Forensic Digital Imaging
The science of digital imaging can be divided into two separate branches: the techniques that explain how to use and create digital images, and the technical knowledge that is necessary to design cameras, computers, and software. The expert witness should be a skilled practitioner in the techniques and have enough understanding of the technical...
Applied E-Learning and E-Teaching in Higher Education
Applied E-Learning and E-Teaching in Higher Education
Over the past decade, computer-enhanced learning has increased in demand due to developments in technological aids such as multimedia presentation and the internet. In this age of technology, it is imperative for teachers to consider the importance of technological integration in the classroom.

Applied E-Learning and E-Teaching in...

The Art of Game Design: A book of lenses
The Art of Game Design: A book of lenses

Anyone can master the fundamentals of game design no technological expertise is necessary. The Art of Game Design: A Book of Lenses shows that the same basic principles of psychology that work for board games, card games and athletic games also are the keys to making top-quality videogames. Good game design happens when you view your...

Engineering Documentation Control Handbook, 3rd Edition
Engineering Documentation Control Handbook, 3rd Edition
The wide acceptance of this book has been very gratifying. This work seems to have taken on a life of its own. The publisher wrote: “Your book over the last year has resulted in the most ‘Buy This Book’ links of our entire catalog … It is very well received by the ‘Googleites.’ ” Sales have exceeded 10,000...
Result Page: Previous 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy