Free Delivery Over $100
11103 books were found.
IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals,... Read More >>
Obsession with computational biology and theoretical approaches is evidenced in articles hailing the arrival of... Read More >>
Constitutes the refereed proceedings of the 13th International Conference on Theory and Applications of Satisfiability... Read More >>
Presents the refereed proceedings of the 10th International Conference on Deontic Logic in Computer Science, DEON... Read More >>
Constitutes the refereed proceedings of the 37th International Colloquium on Automata, Languages and Programming,... Read More >>
Constitutes the proceedings of the First International Conference on Interactive Theorem proving, ITP 2010, held... Read More >>
Constitutes the refereed proceedings of the 22nd International Conference on Computer Aided Verification, CAV 2010,... Read More >>
Constitutes the refereed proceedings of the 6th Conference on Computability in Europe, CiE 2010, held in Ponta Delgada,... Read More >>
Model transformations are the glue that tie modelling activities together. Model transformations have humble beginnings—at... Read More >>
constitutes the refereed proceedings of the 24th European Conference on Object-Oriented Programming, ECOOP 2010,... Read More >>
Constitutes the thoroughly refereed proceedings of the 6th International Conference, QoSA 2010, held in Prague,... Read More >>
This volume contains the papers presented at WoLLIC 2010: 17th Workshop on Logic, Language, Information and Computation... Read More >>
Constitutes the refereed proceedings of the Third International Workshop on the Arithmetic of Finite Fields, WAIFI... Read More >>
Constitutes the proceedings of the 48th International Conference on Objects, Models, Components, Patterns, held... Read More >>
Today, m- ern test systems rely on techniques deeply rooted in formal proof techniques, and testing techniques make... Read More >>
The goal of the International Conference on Software Composition is to advance the state of research on modularity... Read More >>
This unique reference offers a statistical methodology for practitioners and testers of biometric authentication... Read More >>
The importance of having ef cient and effective methods for data mining and kn- ledge discovery (DM&KD), to which... Read More >>
This 1991 volume contains the proceedings of the first international workshop on Logical Frameworks. Read More >>
This thesis covers the theory and practice behind practical evaluation. It explores how programmers write programs... Read More >>
Computing systems are becoming highly complex, harder to understand, and therefore more prone to failure. It is... Read More >>
In the applications part a number of representative examples of really using CA in a broad range of disciplines... Read More >>
Constitutes the proceedings of the 5th International Conference on Hybrid Artificial Intelligent Systems, held in... Read More >>
The 2010 Symposium on Component-Based Software Engineering (CBSE 2010) was the 13th in a series of successful events... Read More >>