Narrow your search

Library

ULB (19)

ULiège (19)

KU Leuven (18)

UCLouvain (5)

UGent (3)

UAntwerpen (2)

VUB (2)

Hogeschool Gent (1)

Hogeschool West-Vlaanderen (1)

IMEC (1)

More...

Resource type

book (24)


Language

English (24)


Year
From To Submit

1999 (24)

Listing 1 - 10 of 24 << page
of 3
>>
Sort by
Learning red hat Linux
Author:
ISBN: 1565926277 Year: 1999 Publisher: Beijing : O'Reilly,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Linux in a nutshell : a desktop quick reference
Author:
ISBN: 1565925858 Year: 1999 Publisher: Cambridge ; Sebastopol, CA : O'Reilly,


Book
Project Scheduling under Limited Resources : Models, Methods, and Applications
Author:
ISBN: 3642586279 Year: 1999 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Approaches to project scheduling under resource constraints are discussed in this book. After an overview of different models, it deals with exact and heuristic scheduling algorithms. The focus is on the development of new algorithms. Computational experiments demonstrate the efficiency of the new heuristics. Finally, it is shown how the models and methods discussed here can be applied to projects in research and development as well as market research.

Fundamentals of X programming : graphical user interfaces and beyond
Author:
ISBN: 0306460653 9786610205080 1280205083 0306469685 Year: 1999 Publisher: New York, New York : Kluwer Academic Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an overview of the X Window System focusing on characteristics that have significant impact on the development of both application programs and widgets. We pay special attention to applications that go beyond graphical user interfaces (GUIs); therefore we discuss issues affecting video games, visualization and imaging programs, and designing widgets with a complex appearance. While the book does not assume previous knowledge of X, it is intended for experienced programmers, especially those who want to write programs that go beyond simple GUIs. X is the dominant window system under Unix, and X servers are available for Microsoft Windows, thus enabling graphics over a network in the PC world. While Java offers an apparently universal graphics library (the abstract window toolkit), the reality is quite different: For high-quality graphics and image display, we must program on the target platform itself (X or one of Microsoft’s APIs) rather than rely on Java peer objects. X is a vast subject, so it is impossible to provide a complete coverage in a few hundred pages. Thus we selected topics that are fundamental to the system, so that the reader who masters them should be able to read the documentation of the numerous libraries and toolkits. Therefore we provide documentation on the most important Xlib and X toolkit functions only.

Lectures on data security : modern cryptology in theory and practice
Authors: ---
ISBN: 3540657576 354048969X Year: 1999 Volume: 1561 Publisher: Berlin ; Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Computer Science --- Engineering & Applied Sciences --- Computer security. --- Cryptography. --- Sécurité informatique --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Operating Systems. --- Computer Communication Networks. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Electronic data processing --- Machine theory --- Algorism --- Algebra --- Arithmetic --- Computer operating systems --- Disk operating systems --- Systems software --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Foundations --- Operating systems --- Computer science—Mathematics. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Operating systems (Computers) --- Informatics --- Science

Interoperating geographic information systems
Authors: --- --- ---
ISBN: 0792384369 1461373638 1461551897 Year: 1999 Volume: [SECS 495] Publisher: Dordrecht : Kluwer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Geographic information systems have developed rapidly in the past decade, and are now a major class of software, with applications that include infrastructure maintenance, resource management, agriculture, Earth science, and planning. But a lack of standards has led to a general inability for one GIS to interoperate with another. It is difficult for one GIS to share data with another, or for people trained on one system to adapt easily to the commands and user interface of another. Failure to interoperate is a problem at many levels, ranging from the purely technical to the semantic and the institutional. Interoperating Geographic Information Systems is about efforts to improve the ability of GISs to interoperate, and has been assembled through a collaboration between academic researchers and the software vendor community under the auspices of the US National Center for Geographic Information and Analysis and the Open GIS Consortium Inc. It includes chapters on the basic principles and the various conceptual frameworks that the research community has developed to think about the problem. Other chapters review a wide range of applications and the experiences of the authors in trying to achieve interoperability at a practical level. Interoperability opens enormous potential for new ways of using GIS and new mechanisms for exchanging data, and these are covered in chapters on information marketplaces, with special reference to geographic information. Institutional arrangements are also likely to be profoundly affected by the trend towards interoperable systems, and nowhere is the impact of interoperability more likely to cause fundamental change than in education, as educators address the needs of a new generation of GIS users with access to a new generation of tools. The book concludes with a series of chapters on education and institutional change. Interoperating Geographic Information Systems is suitable as a secondary text for graduate level courses in computer science, geography, spatial databases, and interoperability and as a reference for researchers and practitioners in industry, commerce and government.

Computer safety, reliability and security : 18th international conference, safecomp'99, toulouse, france, september 27-29, 1999, proceedings
Authors: --- --- --- ---
ISBN: 3540664882 9783540664888 3540482490 Year: 1999 Volume: 1698 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The European Commission emphasizes, in its Fifth Research Framework, the “. . . emerging generic dependability requirements in the information society, stemming both from the ubiquity and volume of embedded and networked systems and services as well as from the global and complex nature of large scale information and communication infrastructures, from citizens, administrations and business in terms of technologies, tools, systems, applications and services". The series of Conference on Computer Safety, Reliability, and Security (Safecomp) contributes to satisfy these requirements by reviewing the state of the art, experiences, and new trends in the relevant scientific and industrial areas. Safecomp is intended to be a platform for technology transfer among academia, industry, and research institutions, providing the opportunity for exchange of ideas, opinions, and visions among experts. This year Safecomp celebrates the 20th anniversary, its first Conference having been organized in Stuttgart by EWICS (European Workshop on Industrial Computer Systems) in 1979, and we hope these Proceedings will contribute to the celebration by supporting Safecomp aims. The Proceedings include the 25 papers that have been presented orally at the Conference and the full version of the 14 papers that have been presented as posters, all of which were selected from 76 submissions. Papers almost uniformly take up Safecomp topics, dealing with the issues of Safety Assessment and Human Factors, Verification and Validation, Design for Safety, Formal Methods, and Security.

Listing 1 - 10 of 24 << page
of 3
>>
Sort by