This volume contains the proceedings of FMOODS2005, the 7th IFIPWG6. 1 International Conference on Formal Methods for Open ...
Continue readingThis book constitutes the refereed proceedings of the 10th IFIP WG 6.1 International Conference on Formal Methods for Open ...
Continue readingThis thoroughly updated and enhanced second edition of Foundations of 3D Graphics Programming is an innovative shortcut ...
Continue readingThe 12th International Conference on Human-Computer Interaction, HCI Inter- tional 2007, was held in Beijing, P.R. This ...
Continue readingImprovements in System Safety contains the full complement of papers presented at the sixteenth annual Safety-critical Systems ...
Continue readingThis book offers an initial introduction to programming for scientific and computational applications using the Python programming ...
Continue readingThis volume contains the proceedings of the 8th International Conference on Mathematics of ProgramConstruction, MPC 2006,held ...
Continue reading1 Multiagent Engineering: A New Software Construction Paradigm Multiagent systems have a long academic tradition. They have ...
Continue readingWe received 255 paper submissions this year. After an extensive peer review process involving more than 1000 reviews, the ...
Continue readingConstitutes the post-proceedings of the 4th International Workshop on Peer-to-Peer Systems, IPTPS 2005, held at Cornell University, ...
Continue readingThis book, complete with online files and updates, covers a hugely important area of study in computing. It constitutes the ...
Continue readingThis book was written in order to demystify the software factories paradigm by guiding you through a practical case study, ...
Continue readingThis book is special, because for the first time you get an easy-to-follow set of code and design standards that addresses ...
Continue readingExplore C# 10 features and updates in records and record structs, global and implicit using directives, file level namespaces, ...
Continue readingPro Hibernate 3 is the first book to offer complete coverage of the open source lightweight Hibernate 3 and its features. ...
Continue readingInformation security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
Continue readingRequirements Management has proven itself to be an enormous potential for the optimization of development projects throughout ...
Continue readingThe book describes the algorithms involved in recovering UML diagrams from the code and the techniques that can be adopted ...
Continue readingRuntime verification is a recent direction in formal methods research, which is complementary to such well-established formal ...
Continue readingSecurity in E-Learning is organized in three parts. Emphasizes that security is mainly an organizational and management issue. ...
Continue reading