Informatyka
- siatka
- lista
"The book is great! It's clear and easy to read, with loads of examples that showed my students what to do." -- Larry Snyder, Emeritus Professor, University of Washington, Department of Computer Science and Engineering "Having the TouchDevelop book available made our events so much easier. Students could figure things out for themselves with help from the book." -- Jennifer Marsman, Microsoft Principal Developer Evangelist Mobile devices such as smartphones ...
|
CONCUR 2013 -- Concurrency Theory
24th International Conference, CONCUR 2013, Buenos Aires, Argentina, August 27-30, 2013, Proceedings
216,10 zł
This book constitutes the thoroughly refereed proceedings of the 24th International Conference on Concurrency Theory, CONCUR 2013, held in Buenos Aires, Argentina, August 27-30, 2013. The 34 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 115 submissions. The papers are organized in topics such as process semantics and modal transition systems, VAS and pushdown systems, Pi calculus and interaction nets, linearizability and verification of concurrent programs, verification of infinite models, model measure ...
|
Knowledge Discovery, Knowledge Engineering and Knowledge Management
4th International Joint Conference, IC3K 2012, Barcelona, Spain, October 4-7, 2012. Revised Selected Papers
217,60 zł
This book constitutes the thoroughly refereed proceedings of the 4th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K, held in Barcelona, Spain, in October 2012. The 29 best papers were carefully reviewed and selected from 347 submissions. The papers are organized in topical sections on knowledge discovery and information retrieval; knowledge engineering and ontology development; knowledge management and information sharing. |
The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle. Even if a user hides his personal data from some users and shares with others, privacy settings of OSNs may be bypassed, thus leading to various privacy harms such as identity theft, stalking, or discrimination. Therefore, users need to be assisted in understanding the privacy risks of their OSN profiles as well as managing their privacy settings ...
|
Computational Learning Theory
4th European Conference, EuroCOLT'99 Nordkirchen, Germany, March 29-31, 1999 Proceedings
219,90 zł
This volume contains papers presented at the Fourth European Conference on ComputationalLearningTheory,whichwasheldatNordkirchenCastle,inNo- kirchen, NRW, Germany, from March 29 to 31, 1999. This conference is the
fourth in a series of bi-annual conferences established in 1993. TheEuroCOLTconferencesarefocusedontheanalysisoflearningalgorithms and the theory of machine learning, and bring together researchers from a wide variety of
related elds. Some of the issues and topics that are addressed include ...
|
Computer Science Logic
5th Workshop, CSL '91, Berne, Switzerland, October 7-11, 1991. Proceedings
218,10 zł
This volume presents the proceedings of the workshop CSL '91 (Computer Science Logic) held at the University of Berne, Switzerland, October 7-11, 1991. This was the fifth in a series of annual workshops on
computer sciencelogic (the first four are recorded in LNCS volumes 329, 385, 440, and 533). The volume contains 33 invited and selected papers on a variety of logical topics in computer science, including
abstract datatypes, bounded theories, complexity results, cut elimination ...
|
Neural Network Methods.- to Soft Computing for Knowledge Discovery and Data Mining.- Neural Networks For Data Mining.- Improved SOM Labeling Methodology for Data Mining Applications.- Evolutionary Methods.- A Review of evolutionary Algorithms for Data Mining.- Genetic Clustering for Data Mining.- Discovering New Rule Induction Algorithms with Grammar-based Genetic Programming.- evolutionary Design of Code-matrices for Multiclass Problems.- Fuzzy Logic Methods.- The Role of Fuzzy Sets in Data Mining.- Support Vector Machines and Fuzzy Systems.- KDD in Marketing ...
|
Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager’s powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targets ...
|
Turbo Pascal ist seit langem die Standardsprache fUr die Programmierung von Mikrocomputern. Durch die Versionen 5,.0 und 5.5 ist Turbo Pascal ein profes sionelles Entwicklungswerkzeug geworden. Z.B. gehOren zu den
neuen Fea tures die Uberschreitung der 64 KB-Grenze, die strenge Modularisierung durch die Unit-Struktur, die UnterstUtzung der IEEE-Gleitpunktzahlenformate und die 8087 Emulation, das wiederaufgenommene Overlay-Konzept, der
eingebaute Quellcode-Debbuger sowie die neuen Moglichkeiten ...
|
Microsoft Dynamics CRM API Development for Online and On-Premise Environments
Covering On-Premise and Online Solutions
222,90 zł
Microsoft Dynamics CRM has a robust API that includes web services and an extensive SDK. As you develop CRM Plugins and custom integrations, you will find that there are many complexities and challenges associated with successfully interacting with this API. In order to ensure that you have all of the tools necessary to achieve success with CRM development, Microsoft Dynamics CRM 2011 API Development presents the essential aspects of API development including plugin development and registration. In addition to Plugins, you will ...
|