Narrow your search

Library

AP (467)

KDG (467)

VUB (364)

EhB (294)

ULiège (11)

ULB (10)

KU Leuven (9)

Odisee (8)

Thomas More Kempen (8)

Thomas More Mechelen (8)

More...

Resource type

digital (467)

book (375)


Language

English (772)

Dutch (1)


Year
From To Submit

2022 (1)

2013 (2)

2009 (318)

2008 (442)

2005 (2)

More...
Listing 1 - 10 of 773 << page
of 78
>>
Sort by
Concepts in programming languages
Author:
ISBN: 0521780985 1139636790 0511643063 1282389238 9786612389238 0511045913 0511557019 0511804172 0511202539 0511040911 1107129141 9780511040917 9780521780988 9780511804175 051103492X 9780511034923 9780511045912 9780511202537 9781107129146 6612389230 9781282389236 9780511643064 9780511557019 Year: 2003 Publisher: Cambridge Cambridge University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

For undergraduate and beginning graduate students, this textbook explains and examines the central concepts used in modern programming languages, such as functions, types, memory management, and control. The book is unique in its comprehensive presentation and comparison of major object-oriented programming languages. Separate chapters examine the history of objects, Simula and Smalltalk, and the prominent languages C++ and Java. The author presents foundational topics, such as lambda calculus and denotational semantics, in an easy-to-read, informal style, focusing on the main insights provided by these theories. Advanced topics include concurrency, concurrent object-oriented programming, program components, and inter-language interoperability. A chapter on logic programming illustrates the importance of specialized programming methods for certain kinds of problems. This book will give the reader a better understanding of the issues and tradeoffs that arise in programming language design, and a better appreciation of the advantages and pitfalls of the programming languages they use.

Foundations for programming languages.
Author:
ISBN: 0262133210 9780262133210 Year: 1996 Publisher: Cambridge, Mass. MIT Press


Digital
Principles of Security and Trust : Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings
Authors: ---
ISBN: 9783642368301 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.

Theoretical aspects of computer software. International symposium TACS 94, Sendai, Japan, April 94. Proceedings
Authors: ---
ISBN: 0387578870 Year: 1994 Publisher: Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Principles of Security and Trust : Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings
Authors: --- ---
ISBN: 3642368298 3642368301 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.

Keywords

Computer security --- Computer networks --- Data encryption (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- e-Commerce/e-business. --- Management of Computing and Information Systems. --- Information Systems. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing --- Data protection. --- Computer networks. --- Cryptography. --- Electronic commerce. --- Electronic data processing—Management. --- Data and Information Security. --- e-Commerce and e-Business. --- IT Operations. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data

Theoretical aspects of computer software : International Symposium TACS'94 Sendai, Japan, April 19-22, 1994 : proceedings
Authors: --- ---
ISBN: 3540578870 Year: 1994 Publisher: Berlin ; Heidelberg ; New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Sustainable Farm Finance : A Practical Guide for Broadacre Graziers.
Authors: --- ---
Year: 2022 Publisher: Summertown : CSIRO Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Practical suggestions for how to better manage your farm finance, with real-life examples.

Exploring New Frontiers of Theoretical Informatics : IFIP 18th World Computer Congress TC1 3rd International Conference on Theoretical Computer Science (TCS2004) 22–27 August 2004 Toulouse, France
Authors: --- --- ---
ISBN: 1280462280 9786610462285 1402081413 1402081405 Year: 2004 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Exploring New Frontiers of Theoretical Informatics Edited by Jean-Jacques Levy, Ernst W. Mayr, and John C. Mitchell In recent years, IT application scenarios have evolved in very innovative ways. Highly distributed networks have now become a common platform for large-scale distributed programming, high bandwidth communications are inexpensive and widespread, and most of our work tools are equipped with processors enabling us to perform a multitude of tasks. In addition, mobile computing (referring specifically to wireless devices and, more broadly, to dynamically configured systems) has made it possible to exploit interaction in novel ways. To harness the flexibility and power of these rapidly evolving, interactive systems, there is need of radically new foundational ideas and principles; there is need to develop the theoretical foundations required to design these systems and to cope with the many complex issues involved in their construction; and there is need to develop effective principles for building and analyzing such systems. Reflecting the diverse and wide spectrum of topics and interests within the theoretical computer science community, Exploring New Frontiers of Theoretical Informatics is presented in two distinct but interrelated tracks: -Algorithms, Complexity and Models of Computation, -Logic, Semantics, Specification and Verification. Exploring New Frontiers of Theoretical Informatics contains 46 original and significant contributions addressing these foundational questions, as well as four papers by outstanding invited speakers. These papers were presented at the 3rd IFIP International Conference on Theoretical Computer Science (TCS 2004), which was held in conjunction with the 18th World Computer Congress in Toulouse, France in August 2004 and sponsored by the International Federation for Information Processing (IFIP).


Book
Radiofrequency radiation dosimetry handbook
Authors: --- --- ---
Year: 1980 Publisher: Salt Lake City, Utah : Department of Bioengineering, University of Utah,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Listing 1 - 10 of 773 << page
of 78
>>
Sort by