• 博客(0)
  • 资源 (15)

空空如也

Studies in Big Data 03

Studies in Big Data 03

2017-03-04

Studies in Big Data 02

Studies in Big Data 02

2017-03-04

Studies in Big Data 01

Studies in Big Data 01

2017-03-04

The SemanticWeb-Semantics and Big Data 10th

The SemanticWeb-Semantics and Big Data 10th

2017-03-04

Windows 7 The Definitive Guide

As you’ve probably noticed, there’s more than enough information about Windows 7 on the Web. There are tutorials, reference sites, discussion groups, and more to help make it easier to use Windows 7. However, the advantage to reading this book instead is that all of the information you need to learn Windows 7 is organized in one place and presented in a straightforward and orderly fashion. This book has everything you need to customize Windows 7, master your digital media, manage your data, and maintain your computer. But wait, there’s more: there are plenty of other Windows 7 books available. Other books introduce and simplify Windows 7, or provide quick starts or step-by-step guides, or promise to teach even dummies how to use Windows 7. In this book, I don’t pretend anyone is a dummy and I don’t just teach you the steps you need to follow; I teach you how features work, why they work the way they work, and how to customize them to meet your needs. You’ll also learn why you may want to use certain features of the operating system and when to use other features to resolve any problems you are having. In addition, this book provides tips, suggestions, and examples of how to optimize your computer for performance, not just appearance. This book won’t just teach you how to configure your computer—it’ll teach you how to squeeze out every last bit of power, and how to make the most out of the features and programs included in Windows 7. It’ll also teach you how to take advantage of the latest features. Also, unlike many other books on the subject, this book doesn’t focus on a specific user level. This isn’t a lightweight beginner book or a book written exclusively for developers or administrators. Regardless of whether you are a beginner, power user, or seasoned professional, many of the concepts in this book will be valuable to you. And you’ll be able to apply them to your computer regardless of which edition of Windows 7 you are using.

2014-05-20

XMPP the Definitive Guide

Getting the Most Out of This Book To get the most out of this book, we do not recommend that you read it cover to cover in one sitting (although you are welcome to do so!). Instead, first explore the sections that interest you or that you need to complete a particular task, perhaps after reading the introductory materials in Part I. You might also consider skimming over the details of each XML example on your first reading so that you get the general idea of each use case and protocol extension. The book is organized as follows: • Part I provides an overview of XMPP. The first chapter talks about XMPP at a high level and introduces you to some ways XMPP is being used to build real-time applications. The second chapter describes the basics of XMPP technologies, including architectural issues, addressing, and communication primitives. Read this section first if you’d like a relatively quick orientation to XMPP technologies. • Part II consists of a series of “developer stories” that illustrate how the tools in the XMPP toolkit can help you solve particular classes of problems. Each chapter in Part II introduces the XMPP concepts and services that you need in a given problem domain, describes how to use those tools, and provides examples showing how specific protocols come into play. Read the chapters here that interest you most. The order doesn’t matter, because we recap concepts where needed, and provide cross-references to more detailed treatments in other chapters. • Part III shows you how to put it all together by walking you through the thought processes and design decisions involved in building an XMPP-based application. Read this part after you have a feel for XMPP from the first two parts, and as you begin to dig into a large project that uses XMPP to construct a business application or real-time service. • Part IV consists of the appendixes, which help you understand the terminology of XMPP; introduce you to the wealth of XMPP servers, clients, and code libraries; and guide you through the large “stack” of XMPP protocol specifications so you can quickly find what you need. Use these appendixes as reference material on an ongoing basis, or as a quick index to the myriad of XMPP resources available on the Internet. xiv |

2014-05-20

Advances in Cryptology - CRYPTO 2010

CRYPTO 2010, the 30th Annual International Cryptology Conference, was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference was held in Santa Barbara, California, during August 15-19, 2010, in conjunction with CHES 2010 (Workshop on Cryptographic Hardware and Embedded Systems). Zulfikar Ramzan served as the General Chair. The conference received 203 submissions. The quality of the submissions was very high, and the selection process was a challenging one. The Program Committee, aided by a 159 external reviewers, reviewed the submissions and after an intensive review period the committee accepted 41 of these submissions. Three submissions were merged into a single paper and two papers were merged into a single talk, yielding a total of 39 papers in the proceedings and 38 presentations at the conference. The revised versions of the 39 papers appearing in the proceedings were not subject to editorial review and the authors bear full responsibility for their contents. The best-paper award was awarded to the paper “Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness” by Craig Gentry. The conference featured two invited presentations. This year we celebrated 25 years from the publication of the ground-breaking work of Shafi Goldwasser, Silvio Micali and Charles Rackoff “The Knowledge Complexity of Interactive Proof-Systems.” We had the privilege of having “GMR” give the first invited talk of the conference. The second invited talk was in a joint session with CHES. The topic was “Is Theoretical Cryptography Any Good in Practice?” and the talk was jointly given by Ivan Damg˚ard and Markus Kuhn. The program also included a Rump Session, chaired by Daniel J. Bernstein and Tanja Lange, featuring short informal talks on new and in-progress results. I am in debt to the many people who contributed to the success of the conference, and I apologize to those I have forgotten. First and foremost I thank the authors who submitted their papers; a conference is only as good as the submissions that it receives. The Program Committee members made a great effort contributing their time, knowledge, expertise and taste and for that I am grateful. I also thank the large number of external reviewers who assisted in the process. (The Program Committee and sub-reviewers are listed in the following pages.) The submission and review process used the software that Shai Halevi designed and I received a lot of help from him in running it.

2014-02-03

Advances in Cryptology - CRYPTO 2013

CRYPTO 2013 the 33rd Annual International Cryptology Conference was held August 18–22 2013 on the campus of the University of California Santa Barbara The event was sponsored by the International Association for Cryptologic Research IACR in cooperation with the UCSB Computer Science Department and the IEEE Computer Society’s Technical Committee on Security and Privacy The program represents the recent significant advances in all areas of cryptology Sixty one papers were included in the program a record number for IACR flagship conferences This two volume proceedings contains the revised versions of all the papers One pair of papers shared a single presentation slot in the program There were also two invited talks On Monday Cindy Cohn from the Electronic Frontier Foundation gave a talk entitled “Crypto Wars Part 2 Have Begun ”On Wednesday Adam Langley from Google spoke about “Why the Web Still Runs on RC4 ” in a joint session with CHES 2013 To accommodate the increase in the number of papers sessions were held throughout Tuesday and Thursday afternoons The rump session took place as usual on Tuesday evening and was chaired by Dan Bernstein and Tanja Lange For the Best Paper Award the Program Committee PC unanimously selected the paper“On the Function Field Sieve and the Impact of Higher Splitting Probabilities”by Faruk Gologlu Robert Granger Gary McGuire and Jens Zumbragel This year we also awarded a Best Young Author Paper Award To be eligible for the award all authors of the paper had to either be full time students or have received their PhDs in 2011 or later The award was given to the paper “Counter Cryptanalysis: Reconstructing Flame’s New Variant Collision Attack” by Marc Stevens Faced with a large number of high quality submissions the PC decided to significantly increase the number of papers in the program from last year’s 48 papers at the price of making the program longer and keeping the paper presentations short 20 minutes per paper including questions and answers Another option that was seriously considered was to move to parallel sessions on some of the days of the conference This would have allowed for somewhat longer paper presentations and an early adjourn on Thursday In the end we opted to retain the single session format with the hope of keeping the community more unified by allowing participants to attend all talks ">CRYPTO 2013 the 33rd Annual International Cryptology Conference was held August 18–22 2013 on the campus of the University of California Santa Barbara The event was sponsored by the International Association for Cryptologic Research IACR in cooperation with the UCSB Computer Science Depart [更多]

2014-02-03

Algebraic Cryptanalysis

Algebraic Cryptanalysis

2013-11-20

Pattern-Oriented Software Architecture,Volume 5, On Patterns and Pattern Languages

Pattern-Oriented Software Architecture,Volume 5, On Patterns and Pattern Languages

2010-07-13

Pattern-Oriented Software Architecture,Volume 3, Patterns For Resource Management

Pattern-Oriented Software Architecture,Volume 3, Patterns For Resource Management

2010-07-13

Pattern-Oriented Software Architecture,Volume 2, Patterns for Concurrent and Networked Objects

Pattern-Oriented Software Architecture,Volume 2, Patterns for Concurrent and Networked Objects

2010-07-13

Pattern-Oriented Software Architecture,Volume 1, A System of Patterns

Pattern-Oriented Software Architecture,Volume 1, A System of Patterns

2010-07-13

Pattern-Oriented Software Architecture,Volume 4

面向模式的软件架构,第四卷,分布式计算相关的模式

2010-07-13

jQuery in Action 2008

Do more with less. Plain and simple, that is the purpose of this book: to help you learn how to do more on your web application pages with less script. Your authors, one a jQuery contributor and evangelist and the other an avid and enthusiastic user, believe that jQuery is the best library available today to help you do just that. This book is aimed at getting you up and running with jQuery quickly and effectively and, hopefully, having some fun along the way. The entire core jQuery API is discussed, and each API method is presented in an easy-to-digest syntax block that describes the parameters and return values of the method. Small examples of using the APIs effectively are included; and, for those big concepts, we provide what we call lab pages. These comprehensive and fun pages are an excellent way for you to see the nuances of the jQuery methods in action without the need to write a slew of code yourself. All example code and lab pages are available for download at http:// www.manning.com/bibeault. We could go on and on with some marketing jargon telling you how great this book is, but you don’t want to waste time reading that, do you? What you really want is to get your arms into the bits and bytes up to your elbows, isn’t it? What’s holding you back? Read on!

2009-09-17

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除