Total Books: 973 - 990 / 3461
Total Books: 973 - 990 / 3461
Java Methods for Financial Engineering : Applications in Finance and Investment
This book is structured around the main theories and models used by practitioners to engineer finance and investment tools. The methods developed and implemented in the text are organized as chapters which cover the core areas.
Java Illuminated ; 5th ed.
Provides learners with an interactive, user-friendly approach to learning the Java programming language. Comprehensive but accessible, the text takes a progressive approach to object-oriented programming, allowing students to build on established skills to develop new and increasingly complex classes. Java Illuminated follows an activity-based active learning approach that ensures student engagement and interest.
Java Design Patterns : A Hands-On Experience with Real-World Examples
Covers classical design patterns with the latest editions of Java and Eclipse Includes implementation of the Java design patterns in real-world applications Each chapter has a Q&A section to help you understand the pros and cons of each design pattern
Java Challenges 100+ : Proven Tasks that Will Prepare You for Anything
Expand your knowledge of Java with this entertaining learning guide, which features 100+ exercises and programming challenges. Java Challenges will prepare you for your next exam or job interview, and covers many practical topics, such as strings, arrays, data structures, recursion, and date and time. The APIs and other material included in this book are Java 17 compatible. You will: Improve your Java knowledge by solving enjoyable but challenging programming puzzles / Solve mathematical problems, recursions, strings, arrays and more / Manage data processing and data structures like lists, sets, maps / Handle advanced recursion as well as binary trees, sorting and searching / Gamify key fundamentals for fun and easier reinforcement
Java 6 Platform Revealed
New editions of the platform don't happen that frequently, but when they do, there is a lot to learn about quickly. If you want to come up to speed on the feature set as quickly as possible, Java 6 Platform Revealed will place you well ahead of the pack. You'll find 10 chapters of how to use the JSR implementations and library improvements that are now a part of Mustang. You'll learn about the scripting features of AWT and Swing, like splash screens, system tray access, and table sorting and filtering and lots more. What you won't find in Java 6 Platform Revealed is a "getting started with Java" tutorial. Come prepared with a good working knowledge of Java 5 platform for best results.
Java 17 Recipes : A Problem-Solution Approach
Quickly find solutions to dozens of common programming problems encountered while building Java applications, with recipes presented in the popular problem-solution format. Look up the programming problem that you want to resolve. Read the solution. Apply the solution directly in your own code. Problem solved! covers of some of the newest features, APIs, and more such as pattern matching for switch, Restore Always-Strict-Floating-Point-Semantics, enhanced pseudo-random number generators, the vector API, sealed classes, and enhancements in the use of String. Source code for all recipes is available in a dedicated GitHub repository. This must-have reference belongs in your library. You will learn : Look up solutions to everyday problems involving Java SE 17 LTS and other recent releases / Develop Java SE applications using the latest in Java SE technology / Incorporate Java major features introduced in versions 17, 16, and 15 into your code
Java 17 for Absolute Beginners : Learn the Fundamentals of Java Programming
It teaches Java development in language anyone can understand, giving you the best possible start.
Iterating Infusion : Clearer Views of Objects, Classes, and Systems
Iterating Infusion presents comprehensive tools for you to best manage and work with object orientation. These include simplified fundamental concepts, popular language comparisons, advanced designing strategies, a broad usage progression, thorough design notations (interaction algebra), and data-oriented (fundamentally-OO) languages. The title, Iterating Infusion, alludes to the fact that any system has multiple, coexisting functional levels and that new levels—both lower and higher—are continually added to the same functional area. The practical effect is to bring processes into focus, always clarifying the vague. The extreme form of this is when separate but compatible technologies are brought together to create advancements; these can be baby-steps or great leaps, with varying amounts of effort. In more general terms, the same thing in a different context can take on much more power. And actually, this phenomenon is at the heart of object-oriented software.
Iterated Function Systems for Real-Time Image Synthesis
Natural phenomena can be visually described with fractal-geometry methods, where iterative procedures rather than equations are used to model objects. With the development of better modelling algorithms, the efficiency of rendering, the realism of computer-generated scenes and the interactivity of visual stimuli are reaching astonishing levels. Iterated Function Systems for Real-Time Image Synthesis gives an explanation of iterated function systems and how to use them in generation of complex objects.
Issues in Multi-Agent Systems : The AgentCities.ES Experience
The purpose of this book is to present current status of this technology by looking at its application in different domains, such as electronic markets, e-tourism, ambience intelligence, and complex system analysis.It starts by discussing software engineering issues for the development of multi-agent systems, how much it costs to build a multi-agent system, and which methods and tools are currently available. Next chapters present some of the most relevant aspects that are considered for the development of multi-agent systems.
ISSE 2006 — Securing Electronic Busines Processes : Highlights of the Information Security Solutions Europe 2006 Conference
Presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.
Computational analysis and deep learning for medical care : Principles, methods, and applications
Focuses on the sophisticated methods for improving dye extraction and dyeing properties which will minimize the use of bioresource products. This book also brings out the innovative ways of wet chemical processing to alleviate the environmental impacts arising from this sector.
Computation Engineering : Applied Automata Theory and Logic
This book covers automata in depth, providing good intuitions along the way, and culminating with applications that are used every day in the field. In this respect, it is a departure from the conventional textbooks on complexity and computability, although these 'tradtional' aspects remain well represented.
Computation and the humanities : Towards an oral history of digital humanities
This book addresses the application of computing to cultural heritage and the discipline of Digital Humanities that formed around it. Digital Humanities research is transforming how the Human record can be transmitted, shaped, understood, questioned and imagined and it has been ongoing for more than 70 years. However, we have no comprehensive histories of its research trajectory or its disciplinary development. The authors make a first contribution towards remedying this by uncovering, documenting, and analysing a number of the social, intellectual and creative processes that helped to shape this research from the 1950s until the present day.
Computable Models of the Law : Languages, Dialogues, Games, Ontologies
This book originate from a workshop held at the European University Institute of Florence, Italy, in December 2006. The workshop was devoted to the discussion of the different ways of understanding and explaining contemporary law, for the purpose of building computable models of it -- especially models enabling the development of computer applications for the legal domain.
Comprehensive mathematics for computer scientists 2 : Calculus and ODEs, splines, probability, fourier and wavelet theory, fractals and neural networks, categories and lambda calculus
This second volume of a comprehensive tour through mathematical core subjects for computer scientists completes the ?rst volume in two - gards: Part III ?rst adds topology, di?erential, and integral calculus to the t- ics of sets, graphs, algebra, formal logic, machines, and linear geometry, of volume 1. With this spectrum of fundamentals in mathematical e- cation, young professionals should be able to successfully attack more involved subjects, which may be relevant to the computational sciences. In a second regard, the end of part III and part IV add a selection of more advanced topics. In view of the overwhelming variety of mathematical approaches in the computational sciences, any selection, even the most empirical, requires a methodological justi?cation. Our primary criterion has been the search for harmonization and optimization of thematic - versity and logical coherence. This is why we have, for instance, bundled such seemingly distant subjects as recursive constructions, ordinary d- ferential equations, and fractals under the unifying perspective of c- traction theory.
Component-Based Software Testing with UML
Component-based software development regards software construction in terms of conventional engineering disciplines where the assembly of systems from readily-available prefabricated parts is the norm. Because both component-based systems themselves and the stakeholders in component-based development projects are different from traditional software systems, component-based testing also needs to deviate from traditional software testing approaches. Gross first describes the specific challenges related to component-based testing like the lack of internal knowledge of a component or the usage of a component in diverse contexts. He argues that only built-in contract testing, a test organization for component-based applications founded on building test artifacts directly into components, can prevent catastrophic failures like the one that caused the now famous ARIANE 5 crash in 1996. This book is the first comprehensive treatment of the intricacies of testing component-based software systems. With its strong modeling background, it appeals to researchers and graduate students specializing in component-based software engineering. Professionals architecting and developing component-based systems will profit from the UML-based methodology and the implementation hints based on the XUnit and JUnit frameworks.
Component-Based Software Development for Embedded Systems : An Overview of Current Research Trends
Embedded systems are ubiquitous. They appear in cell phones, microwave ovens, refrigerators, consumer electronics, cars, and jets. Some of these embedded s- tems are safety- or security-critical such as in medical equipment, nuclear plants, and X-by-wire control systems in naval, ground and aerospace transportation - hicles. With the continuing shift from hardware to software, embedded systems are increasingly dominated by embedded software. Embedded software is complex. Its engineering inherently involves a mul- disciplinary interplay with the physics of the embedding system or environment. Embedded software also comes in ever larger quantity and diversity. The next generation of premium automobiles will carry around one gigabyte of binary code. The proposed US DDX submarine is e?ectively a ?oating embedded so- ware system, comprising 30 billion lines of code written in over 100 programming languages. Embedded software is expensive. Cost estimates are quoted at around US$15– 30 per line (from commencement to shipping). In the defense realm, costs can range up to $100, while for highly critical applications, such as the Space Shuttle, the cost per line approximates $1,000. In view of the exponential increase in complexity, the projected costs of future embedded software are staggering.
Total Books: 973 - 990 / 3461

















