This volume contains the proceedings of FMOODS2005, the 7th IFIPWG6. 1 International Conference on Formal Methods for Open ...
WeiterlesenThis book constitutes the refereed proceedings of the 10th IFIP WG 6.1 International Conference on Formal Methods for Open ...
WeiterlesenThis thoroughly updated and enhanced second edition of Foundations of 3D Graphics Programming is an innovative shortcut ...
WeiterlesenThe 12th International Conference on Human-Computer Interaction, HCI Inter- tional 2007, was held in Beijing, P.R. This ...
WeiterlesenImprovements in System Safety contains the full complement of papers presented at the sixteenth annual Safety-critical Systems ...
WeiterlesenThis book offers an initial introduction to programming for scientific and computational applications using the Python programming ...
WeiterlesenThis volume contains the proceedings of the 8th International Conference on Mathematics of ProgramConstruction, MPC 2006,held ...
Weiterlesen1 Multiagent Engineering: A New Software Construction Paradigm Multiagent systems have a long academic tradition. They have ...
WeiterlesenWe received 255 paper submissions this year. After an extensive peer review process involving more than 1000 reviews, the ...
WeiterlesenConstitutes the post-proceedings of the 4th International Workshop on Peer-to-Peer Systems, IPTPS 2005, held at Cornell University, ...
WeiterlesenThis book, complete with online files and updates, covers a hugely important area of study in computing. It constitutes the ...
WeiterlesenThis book was written in order to demystify the software factories paradigm by guiding you through a practical case study, ...
WeiterlesenThis book is special, because for the first time you get an easy-to-follow set of code and design standards that addresses ...
WeiterlesenExplore C# 10 features and updates in records and record structs, global and implicit using directives, file level namespaces, ...
WeiterlesenPro Hibernate 3 is the first book to offer complete coverage of the open source lightweight Hibernate 3 and its features. ...
WeiterlesenInformation security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
WeiterlesenRequirements Management has proven itself to be an enormous potential for the optimization of development projects throughout ...
WeiterlesenThe book describes the algorithms involved in recovering UML diagrams from the code and the techniques that can be adopted ...
WeiterlesenRuntime verification is a recent direction in formal methods research, which is complementary to such well-established formal ...
WeiterlesenSecurity in E-Learning is organized in three parts. Emphasizes that security is mainly an organizational and management issue. ...
Weiterlesen