This volume contains the proceedings of FMOODS2005, the 7th IFIPWG6. 1 International Conference on Formal Methods for Open ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th IFIP WG 6.1 International Conference on Formal Methods for Open ...
اقرأ المزيدThis thoroughly updated and enhanced second edition of Foundations of 3D Graphics Programming is an innovative shortcut ...
اقرأ المزيدThe 12th International Conference on Human-Computer Interaction, HCI Inter- tional 2007, was held in Beijing, P.R. This ...
اقرأ المزيدImprovements in System Safety contains the full complement of papers presented at the sixteenth annual Safety-critical Systems ...
اقرأ المزيدThis book offers an initial introduction to programming for scientific and computational applications using the Python programming ...
اقرأ المزيدThis volume contains the proceedings of the 8th International Conference on Mathematics of ProgramConstruction, MPC 2006,held ...
اقرأ المزيد1 Multiagent Engineering: A New Software Construction Paradigm Multiagent systems have a long academic tradition. They have ...
اقرأ المزيدWe received 255 paper submissions this year. After an extensive peer review process involving more than 1000 reviews, the ...
اقرأ المزيدConstitutes the post-proceedings of the 4th International Workshop on Peer-to-Peer Systems, IPTPS 2005, held at Cornell University, ...
اقرأ المزيدThis book, complete with online files and updates, covers a hugely important area of study in computing. It constitutes the ...
اقرأ المزيدThis book was written in order to demystify the software factories paradigm by guiding you through a practical case study, ...
اقرأ المزيدThis book is special, because for the first time you get an easy-to-follow set of code and design standards that addresses ...
اقرأ المزيدExplore C# 10 features and updates in records and record structs, global and implicit using directives, file level namespaces, ...
اقرأ المزيدPro Hibernate 3 is the first book to offer complete coverage of the open source lightweight Hibernate 3 and its features. ...
اقرأ المزيدInformation security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
اقرأ المزيدRequirements Management has proven itself to be an enormous potential for the optimization of development projects throughout ...
اقرأ المزيدThe book describes the algorithms involved in recovering UML diagrams from the code and the techniques that can be adopted ...
اقرأ المزيدRuntime verification is a recent direction in formal methods research, which is complementary to such well-established formal ...
اقرأ المزيدSecurity in E-Learning is organized in three parts. Emphasizes that security is mainly an organizational and management issue. ...
اقرأ المزيد