Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Engineering and Development

Buy

Software engineering is one of the most knowledge intensive jobs. Thus, having a good knowledge management (KM) strategy in these organisations is very important. This book examines software processes from a knowledge perspective flow, in order to identify the particular knowledge needs of such processes to then be in a better position for proposing systems or strategies to address those needs. Its possible benefits are illustrated through the results of a study in a software maintenance process within a small software organisation. Furthermore, software product line architecture is regarded as one of the crucial piece of entity in software product lines. The authors of this book discuss the state of the art of software product line engineering from the perspectives of business, architecture, process and organisation. In recent years, domain-specific languages have been proposed for modelling applications on a high level of abstraction. Although the usage of domain-specific languages offers clear advantages, their design is a highly complex task. This book presents a pragmatic way for designing and using domain-specific languages. Other chapters in this book examine the development of numerical methodologies for inverse determination of material constitutive model parameters, discuss some of the reasons for the irrelevancy of software engineering to the robotic community, review the evolution of robotic software over time, and propose the use of Ant Colony Optimisation, a kind of metaheuristic algorithm, to find general property violations in concurrent systems using a explicit state model checker.

(HTML tags aren't allowed.)

Mathematica Cookbook
Mathematica Cookbook

Mathematica Cookbook helps you master the application's core principles by walking you through real-world problems. Ideal for browsing, this book includes recipes for working with numerics, data structures, algebraic equations, calculus, and statistics. You'll also venture into exotic territory with recipes for data...

.NET Windows Forms in a Nutshell
.NET Windows Forms in a Nutshell

This book is intended for C# and Visual Basic .NET developers who are writing Windows Forms applications. If you are moving from previous Windows GUI technologies such as Visual Basic 6.0 or MFC, or from those of other platforms such as Swing, or even if you are new to writing Windows applications, the tutorial section provides a complete...

High Impact Speeches: How to Create & Deliver Words That Move Minds
High Impact Speeches: How to Create & Deliver Words That Move Minds

Sooner or later, we all find ourselves in front of an audience with nothing more to rely on than the power of our words. To lead today is to be a great persuader. We need the ability to mobilise ideas, appeal to values and inspire action. To find the right words, and the memorable words, to carry an audience and change things.In the business...


Complete Guide to Digital Project Management: From Pre-Sales to Post-Production
Complete Guide to Digital Project Management: From Pre-Sales to Post-Production
Get a 360-degree view of digital project management. Learn proven best practices from case studies and real-world scenarios. A variety of project management tools, templates, models, and frameworks are covered.

This book provides an in-depth view of digital project management from initiation to execution to monitoring and
...
Enterprise Information Systems VI
Enterprise Information Systems VI
This book contains the best papers of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004), held in Porto (Portugal) and organized by INSTICC (Institute for Systems and Technologies of Information, Communication and Control) in collaboration with PORTUCALENSE UNIVERSITY, who hosted the event.

Following the
...
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy