This volume contains the proceedings of FMOODS2005, the 7th IFIPWG6. 1 International Conference on Formal Methods for Open ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 10th IFIP WG 6.1 International Conference on Formal Methods for Open ...
اقرأ المزيد
This thoroughly updated and enhanced second edition of Foundations of 3D Graphics Programming is an innovative shortcut ...
اقرأ المزيد
The 12th International Conference on Human-Computer Interaction, HCI Inter- tional 2007, was held in Beijing, P.R. This ...
اقرأ المزيد
Improvements in System Safety contains the full complement of papers presented at the sixteenth annual Safety-critical Systems ...
اقرأ المزيد
This book offers an initial introduction to programming for scientific and computational applications using the Python programming ...
اقرأ المزيد
This volume contains the proceedings of the 8th International Conference on Mathematics of ProgramConstruction, MPC 2006,held ...
اقرأ المزيد
1 Multiagent Engineering: A New Software Construction Paradigm Multiagent systems have a long academic tradition. They have ...
اقرأ المزيد
We received 255 paper submissions this year. After an extensive peer review process involving more than 1000 reviews, the ...
اقرأ المزيد
Constitutes the post-proceedings of the 4th International Workshop on Peer-to-Peer Systems, IPTPS 2005, held at Cornell University, ...
اقرأ المزيد
This book, complete with online files and updates, covers a hugely important area of study in computing. It constitutes the ...
اقرأ المزيد
This book was written in order to demystify the software factories paradigm by guiding you through a practical case study, ...
اقرأ المزيد
This book is special, because for the first time you get an easy-to-follow set of code and design standards that addresses ...
اقرأ المزيد
Explore C# 10 features and updates in records and record structs, global and implicit using directives, file level namespaces, ...
اقرأ المزيد
Pro Hibernate 3 is the first book to offer complete coverage of the open source lightweight Hibernate 3 and its features. ...
اقرأ المزيد
Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
اقرأ المزيد
Requirements Management has proven itself to be an enormous potential for the optimization of development projects throughout ...
اقرأ المزيد
The book describes the algorithms involved in recovering UML diagrams from the code and the techniques that can be adopted ...
اقرأ المزيد
Runtime verification is a recent direction in formal methods research, which is complementary to such well-established formal ...
اقرأ المزيد
Security in E-Learning is organized in three parts. Emphasizes that security is mainly an organizational and management issue. ...
اقرأ المزيد