Total Books: 1351 - 1368 / 3461
Total Books: 1351 - 1368 / 3461
Active Conceptual Modeling of Learning : Next Generation Learning-Base System Development
This volume contains a collection of the papers presented during the 1st International ACM-L Workshop, which was held on November 8, 2006 during the 25th International Conference on Conceptual Modeling, ER 2006, held November 6–9,2006, in Tucson, Arizona, plus several invited papers.These papers plus the invited papers represent the current thinking in conceptual modeling research, The active model can only be realized through technology integration (e.g., AI, software engineering, information technology,cognitive science, art and sciences, philosophy, etc.)
Action Research in Software Engineering: Theory and Applications
This book addresses action research (AR), one of the main research methodologies used for academia-industry research collaborations. It elaborates on how to find the right research activities and how to distinguish them from non-significant ones. Further, it details how to glean lessons from the research results, no matter whether they are positive or negative. Lastly, it shows how companies can evolve and build talents while expanding their product portfolio.
Accessible access 2003
In that book we tried very hard not to simply list everything that we knew about the product. Instead we tried to act as intelligent filters, presenting only the essential information that you need to get started. Every screen shot has been retaken and every section has been re-checked to ensure, not only that it still works, but also that it is actually still relevant. We have re-written parts where the product has changed and also added some. For example, there is a new section on Object Dependencies and a whole new chapter about Data Access Pages - helping you to put your Access database onto an intranet.
Access Control Systems : Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access control mechanisms that are emerging with the latest Internet programming technologies, and explores all models employed and how they work. The latest role-based access control (RBAC) standard is also highlighted.
Access Control Models and Architectures For IoT and Cyber Physical Systems
Presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS.
Accelerated VB 2008
Visual Basic 2008 offers powerful new features, and Accelerated VB 2008 is the fastest path to mastering them, and the rest of Visual Basic, for both experienced Visual Basic programmers moving to VB 2008 and programmers moving to Visual Basic from another object–oriented language. Many books introduce VB, but very few also explain how to use it optimally with the .NET common language runtime (CLR). This book teaches both core Visual Basic language concepts and how to wisely employ VB idioms and object–oriented design patterns to exploit the power of VB and the CLR.
Accelerated VB 2005
Accelerated VB 2005 provides the fastest path to Visual Basic expertise for anyone already familiar with object-oriented programming. While books introduce VB, very few also explain optimizing its use with the .NET common language runtime (CLR). But this book both teaches core VB language concepts and covers in depth the concepts and techniques for professionally exploiting the power of VB and the CLR.
Accelerated SQL Server 2008
The expert tuition and approach to rapid learning in Accelerated SQL Server 2008, one of the first SQL Server 2008 books available, will enable SQL Server and other database professionals to make the leap to the 2008 release of Microsoft's flagship database management system quickly. Take full advantage of the features of SQL Server 2008, know what tools are available, and quickly realize the power and ease of use that SQL Server 2008 has to offer.
Accelerated GWT : Building Enterprise Google Web Toolkit Applications
Ajax is a web development technique that takes advantage of JavaScript to display and interact dynamically with information embedded into a web page. Its emergence has made it possible to create web applications that closely resemble their desktop–based brethren. With this exciting new ability came several challenges; not only did developers have to learn JavaScript, but they were also forced to use inefficient development processes, not to mention deal with cross–platform and browser difficulties. But with the release of Google Web Toolkit (GWT), Java developers are able to continue using their favorite language to write powerful Ajax applications while using not only the Java language, but also the very same development tools they're already using on a daily basis!
Accelerated C# 2008
Accelerated C# 2008 gives you everything you need to know about C# 2008 in a concentrated 500 pages of must-know information and best practices. C# 2008 offers powerful new features, and Accelerated C# 2008 is the fastest path to mastery, for both experienced C# programmers moving to C# 2008 and programmers moving to C# from another object-oriented language.
Abstraction, refinement and proof for probabilistic systems
Probabilistic techniques are increasingly being employed in computer programs and systems because they can increase efficiency in sequential algorithms, enable otherwise nonfunctional distribution applications, and allow quantification of risk and safety in general. This makes operational models of how they work, and logics for reasoning about them, extremely important. Abstraction, Refinement and Proof for Probabilistic Systems presents a rigorous approach to modeling and reasoning about computer systems that incorporate probability. Its foundations lie in traditional Boolean sequential-program logic—but its extension to numeric rather than merely true-or-false judgments takes it much further, into areas such as randomized algorithms, fault tolerance, and, in distributed systems, almost-certain symmetry breaking. The presentation begins with the familiar "assertional" style of program development and continues with increasing specialization: Part I treats probabilistic program logic, including many examples and case studies; Part II sets out the detailed semantics; and Part III applies the approach to advanced material on temporal calculi and two-player games.
Abstract Computing Machines : A Lambda Calculus Perspective
The book addresses ways and means of organizing computations, highlighting the relationship between algorithms and the basic mechanisms and runtime structures necessary to execute them using machines. It completely abstracts from concrete programming languages and machine architectures, taking instead the lambda calculus as the basic programming and program execution model to design various abstract machines for its correct implementation. The emphasis is on fully normalizing machines based on full-fledged beta-reductions as essential prerequisites for symbolic computations that treat functions and variables truly as first-class objects. Their weakly normalizing counterparts are shown to be functional abstract machines that sacrifice the flavors of full beta-reductions for decidedly simpler runtime structures and improved runtime efficiency. Further downgrading of the lambda calculus leads to classical imperative machines that permit side-effecting operations on the runtime environment.
A Theory of Distributed Objects : Asynchrony - Mobility - Groups - Components
Distributed and communicating objects are becoming ubiquitous. In global, Grid and Peer-to-Peer computing environments, extensive use is made of objects interacting through method calls. So far, no general formalism has been proposed for the foundation of such systems. Caromel and Henrio are the first to define a calculus for distributed objects interacting using asynchronous method calls with generalized futures, i.e., wait-by-necessity -- a must in large-scale systems, providing both high structuring and low coupling, and thus scalability. The authors provide very generic results on expressiveness and determinism, and the potential of their approach is further demonstrated by its capacity to cope with advanced issues such as mobility, groups, and components.
A Programmers Introduction to C#2.0
A Programmer's Introduction to C# 2.0, Third Edition is a critical update to the highly successful second edition. It is written by a member of the original C# language-design team and a C# program manager, so you can be certain this book contains the expertise you're looking for. This third edition covers the elements of C# 2005 that you'll soon embrace. This comprehensive tutorial explains features like generics, iterators, anonymous types, and partial classes. It is sure to be a key resource for all you C# programmers!
A Practical Theory of Reactive Systems : Incremental Modeling of Dynamic Behaviors
Presents a ""practical theory"" of reactive systems, with formal foundations in Temporal Logic of Actions. This book emphasises theoretical understanding of reactive behaviors and using ""horizontal"" modularity to manage their complexity. It illustrates the incremental specification by a number of examples of varying size and complexity
A Platform-Centric Approach to System-on-Chip (SOC) Design
The book proposes a new methodology for realizing platform-centric design of complex systems, and presents a detailed plan for its implementation. The proposed plan allows component vendors, system integrators and product developers to collaborate effectively and efficiently to create complex products within budget and schedule constraints.
A Modular Calculus for the Average Cost of Data Structuring
This volume, with forewords by Greg Bollella and Dana Scott, presents novel programs based on the new advances in this area, including the first randomness-preserving version of Heapsort. Programs are provided, along with derivations of their average-case time, to illustrate the radically different approach to average-case timing. The automated static timing tool applies the Modular Calculus to extract the average-case running time of programs directly from their MOQA code.
A Modern Approach to Intelligent Animation : Theory and Practice
Part of the new series, Advanced Topics in Science and Technology in China, this book discusses concepts, theory, and core technologies of intelligent theory and human animation, including video based human animation, and intelligent technology of motion data management and reusing. It introduces systems developed to demonstrate the technologies of video based animation. Each chapter is independent. Lively pictures and demos will be presented to make the theory and technologies more understandable.
Total Books: 1351 - 1368 / 3461

















