Sunday, December 6, 2009

Spinning the Semantic Web or Comprehensive Functional Verification

Spinning the Semantic Web: Bringing the World Wide Web to Its Full Potential

Author: Dieter Fensel

As the World Wide Web continues to expand, it becomes increasingly difficult for users to obtain information efficiently. Because most search engines read format languages such as HTML or SGML, search results reflect formatting tags more than actual page content, which is expressed in natural language. Spinning the Semantic Web describes an exciting new type of hierarchy and standardization that will replace the current "web of links" with a "web of meaning." Using a flexible set of languages and tools, the Semantic Web will make all available information -- display elements, metadata, services, images, and especially content -- accessible. The result will be an immense repository of information accessible for a wide range of new applications.

This first handbook for the Semantic Web covers, among other topics, software agents that can negotiate and collect information, markup languages that can tag many more types of information in a document, and knowledge systems that enable machines to read Web pages and determine their reliability. The truly interdisciplinary Semantic Web combines aspects of artificial intelligence, markup languages, natural language processing, information retrieval, knowledge representation, intelligent agents, and databases.



Table of Contents:
Foreword
1Introduction1
2SHOE : a blueprint for the Semantic Web29
3DAML-ONT : an ontology language for the Semantic Web65
4Ontologies and schema languages on the Web95
5UPML : the language and tool support for making the Semantic Web alive141
6Ontologies come of age171
7Sesame : an architecture for storing and querying RDF data and schema information197
8Enabling task-centered knowledge support through semantic markup223
9Knowledge mobility : semantics for the Web as a white knight for knowledge-based systems253
10Complex relationships for the Semantic Web279
11SEmantic portAL - the SEAL approach317
12Semantic gadgets : ubiquitous computing meets the Semantic Web363
13Static and dynamic semantics of the Web377
14Semantic annotation for Web content adpatation403
15Task-achieving agents on the World Wide Web431

Go to: Annapurna or Newcomers Handbook for Moving to and Living in Los Angeles

Comprehensive Functional Verification: The Complete Industry Cycle

Author: Bruce Wil

One of the biggest challenges in chip and system design is determining whether the hardware works correctly. That is the job of functional verification engineers and they are the audience for this comprehensive text from three top industry professionals.

As designs increase in complexity, so has the value of verification engineers within the hardware design team. In fact, the need for skilled verification engineers has grown dramatically--functional verification now consumes between 40 and 70% of a project's labor, and about half its cost. Currently there are very few books on verification for engineers, and none that cover the subject as comprehensively as this text.

A key strength of this book is that it describes the entire verification cycle and details each stage. The organization of the book follows the cycle, demonstrating how functional verification engages all aspects of the overall design effort and how individual cycle stages relate to the larger design process. Throughout the text, the authors leverage their 35 plus years experience in functional verification, providing examples and case studies, and focusing on the skills, methods, and tools needed to complete each verification task. Additionally, the major vendors (Mentor Graphics, Cadence Design Systems, Verisity, and Synopsys) have implemented key examples from the text and made these available on line, so that the reader can test out the methods described in the text.

* Comprehensive overview of the complete verification cycle
* Combines industry experience with a strong emphasis on functional verification fundamentals
* Includes industry examples and real-world case studies



Saturday, December 5, 2009

Object Oriented Data Structures Using Java or Advanced PHP Programming

Object-Oriented Data Structures Using Java

Author: Nell B Dal

Data Structures in Java is a continuation of Nell Dale's best-selling Introduction to Java and Software Design text. Data Structures is designed for students who have already taken one semester of computer science and are able to take a problem of medium complexity, write an algorithm to solve the problem, code the algorithm in a programming language, and demonstrate the correctness of their solution. The focus is on teaching computer science principles with chapter concepts being reinforced by case studies. The object-oriented concepts of encapsulation, inheritance, and polymorphism are covered, while the book remains centered on abstract data types.

Booknews

Written to present the algorithmic, programming, and structuring techniques of traditional data structures courses in an object- oriented context, this text presents the familiar topics, but with an emphasis on defining structures using Java interfaces and encapsulating them as Java classes. Chapters cover software engineering, data design and implementation, unsorted and sorted lists, stacks and queues, linked structures, programming with recursion, and sorting and searching algorithms. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
1Software Engineering1
2Data Design and Implementation69
3ADTs Unsorted List and Sorted List139
4ADTs Stack and Queue249
5Linked Structures341
6Lists Plus405
7Programming with Recursion475
8Binary Search Trees529
9Priority Queues, Heaps, and Graphs611
10Sorting and Searching Algorithms673
App. AJava Reserved Words749
App. BOperator Precedence750
App. CPrimitive Data Types751
App. DASCII Subset of Unicode752
Answers to Selected Exercises753
Index793

See also: Whole Foods or Perfect Party Planner

Advanced PHP Programming

Author: George Schlossnagl

Over the past three years PHP has evolved from being a niche language used to add dynamic functionality to small sites to a powerful tool making strong inroads into large-scale, business-critical Web systems.

The rapid maturation of PHP has created a skeptical population of users from more traditional "enterprise" languages who question the readiness and ability of PHP to scale, as well as a large population of PHP developers without formal computer science backgrounds who have learned through the hands-on experimentation while developing small and midsize applications in PHP.

While there are many books on learning PHP and developing small applications with it, there is a serious lack of information on "scaling" PHP for large-scale, business-critical systems. Schlossnagle's Advanced PHP Programming fills that void, demonstrating that PHP is ready for enterprise Web applications by showing the reader how to develop PHP-based applications for maximum performance, stability, and extensibility.

Slashdot.org
George Schlossnagle has written a great book on PHP programming which ought to generate some enthusiasm. But it's not just about PHP5: the book includes great information on everything from coding style to high-level problem-solving. I met George through a friend of mine who works for the Developers Library, and I'm glad to have finally gotten a look at his book. ... Definitely recommended.



Thursday, December 3, 2009

Multivariate Public Key Cryptosystems or Introduction to Computational Physics

Multivariate Public Key Cryptosystems

Author: Jintai Ding

Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find it a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students. Written more from a computational perspective, the authors provide the necessary mathematical theory behind MPKC; students with some previous exposure to abstract algebra will be well-prepared to read and understand the material.



Table of Contents:
1Overview1
2Matsumoto-Imai cryptosystems11
3Oil-vinegar signature schemes63
4Hidden field equations99
5Internal perturbation113
6Triangular schemes137
7Direct attacks191
8Future research233

Go to: Onions and Other Vegetable Alliums or Piece of Cake

Introduction to Computational Physics

Author: Tao Pang

Thoroughly updated and revised for its second edition, this advanced textbook provides an introduction to the basic methods of computational physics, and an overview of recent progress in several areas of scientific computing. Tao Pang presents many step-by-step examples, including program listings in JavaTM, of practical numerical methods from modern physics and related areas. Now including many more exercises, the volume can be used as a textbook for either undergraduate or first-year graduate courses on computational physics or scientific computation. It will also be a useful reference for anyone involved in computational research.



Wednesday, December 2, 2009

Legal Guide to Web and Software Development or IBM DB2 Version 9 New Features

Legal Guide to Web and Software Development

Author: Stephen Fishman

Protect your rights, and your hard work!

The laws covering website and software development are complex and confusing, but if you don't untangle them, it could cost you thousands of dollars in attorneys' fees and lawsuits.

Fortunately, Legal Guide to Web & Software Development decodes this complex area of the law, thoroughly and in reader-friendly English. It also provides contracts, agreements and legal forms on CD-ROM, with step-by-step instructions for filling them out, so you can protect your software and website without paying a lawyer's ransom.

Use Legal Guide to Web & Software Development to learn:

• what kind of legal protection you need
• the strengths and limitations of each type of protection
• how to avoid infringement
• which provisions you need when drafting an agreement
• how to obtain permission to use other people's materials

You'll find complete, step-by-step instructions to draft:

• employment agreements
• contractor and consultant agreements
• development agreements
• license agreements

The 5th edition of Legal Guide to Web & Software Development is completely update to provide the latest case law and statutory revisions.

Entrepreneur

Covers every imaginable detail important to such a rapidly growing and intangible medium.

What People Are Saying

Jeff Duntemann
"This book passes my own personal test for legal guides -- that it be easily readable for people who detest lawyers -- and passes it with higher marks than any other legal guide I've come across."--(Jeff Duntemann, Editor, PC Techniques Magazine)


John Dvorak
"An amazing book! A must for anyone in the software business... Answers nearly every legal question you can imagine and some you would have never thought of Highest recommendation!"--(John Dvorak, PC Magazine)




Read also Pajama Day or Skippyjon Jones Lost in Spice

IBM DB2 Version 9 New Features

Author: Paul Zikopolous

Get up to speed quickly on the new features in IBM DB2 9

In this book, the IBM expert authors provide you with comprehensive technical details and real-world business uses for all of the exciting new features in the current release of DB2 9. You’ll learn about the capabilities found in pureXML™ as well as administrative enhancements in areas such as self management, high availability, and security. Also covered are features for the developer from a Ruby on Rails toolkit to the Developer Workbench and enhanced .NET developer support.

Paul C. Zikopoulos, BA, MBA, is on the IBM Database Competitive Technology team. He is the coauthor of DB2:The Complete Reference.

George Baklarz, B Math, M Sc, is a senior manager in the DB2 Worldwide Pre-sales Support Group.

Leon Katsnelson works in the IBM Toronto Lab where he manages a team of IBM DB2 UDB product managers.

Chris Eaton is the senior product manager for DB2 Universal Database.

 



Table of Contents:
Letters from Executives     xvii
Acknowledgments     xx
Introduction     xxiii
XML in the DB2 Hybrid Storage Engine
What Is XML?     3
Components of on XML Document     5
Parsing and Serialization     6
Well-Formed and Valid XML     7
XML Schema Definition Documents and DTDs     8
Namespaces: Your Guide to Element Naming Collisions     11
Helping a Namespace: A Universal Resource Identifier     12
Default Namespaces     13
XPath Expressions     13
Examples of Navigating XML with an XPath Expression     13
Defining How Your XML Looks     15
Wrap Up     16
When Do I Use pureXML?     17
Why XML?     18
Typical Use Cases for XML     19
Why XML in a Relational Database?     20
pureXML Solves Your Data Problems     21
XML and Relational Rules of Thumb     23
Our Rule of Thumb for When to Use an XML Model     23
Our Rule of Thumb for When to Use a Relational Model     24
Traditional Methods for Storing XML     24
Why the Large Object Approach Doesn't Work     25
Why Shredding XML to Relational Doesn'tWork     26
Wrap Up     29
pureXML: The DB2 9 XML Database     31
XML in DB2 9 in a Nutshell     32
DB2 9 and Your XML Data     33
Wrap Up     52
Tuning XML Performance     53
XML Performance Topics for Database Administrators     54
Optimizing XML Data Storage     54
Measuring XML Performance Using Snapshot Monitor     56
Indexing Strategies for XML Performance     57
Collecting Statistics for XML Data and Indexes     59
Bulk Loading of XML Data     59
XML Performance Topics for Database Programmers     60
Adjusting the Structure of XML Documents to Improve Performance     60
To Validate or Not to Validate: That Is the Question     61
Better Performing XPath Expressions     63
Use Predicates to Filter Your XML Data     64
Use Parameter Markers     66
Minimize Code Page Conversions     67
Wrap Up     68
Autonomics and Manageability
Up and Running Enhancements     71
New Preconfigured Features in DB2 9     72
Automatic Selection of Default I/O Prefetchers and Page Cleaners     72
Configuration Advisor      73
Self Tuning Memory Manager     73
Statistics Collection     74
Table and Index Reorganization     75
Automatic Storage     75
Copying Database Schemas     75
Installation Enhancements in DB2 9     76
Multiple DB2 Versions and Releases on a Server     76
Installation and Maintenance Features for Windows     77
New DB2 Client Packaging     77
New Standalone ODBC Driver     78
Wrap Up     79
The Self Tuning Memory Manager     81
The DB2 Memory Model 101     83
Operating System Memory Management and STMM     84
How Memory Was Tuned in Earlier DB2 Versions     85
DB2 Memory Tuning in DB2 7     85
DB2 Memory Tuning in DB2 8     85
The STMM in DB2 9     87
How STMM Works     87
Using STMM in DB29     96
Turn On STMM     96
Define the Amount of Memory Allocated to DB2     97
Configure Each Heap Supported by STMM     98
STMM Enablement and Configurotion Parameters     100
Disabling STMM     101
DB2 9 Memory Model Changes in Support of STMM     101
Getting STMM Details      102
Reaping the Benefits of STMM     102
Hitting a Home Run: Best Environments for STMM     102
Hitting a Double: Next Best Environments for STMM     104
How Well Does STMM Work?     104
The Dropped Index Test     105
The Two Databases Same Server Test     106
The Poorly Tuned Buffer Pool Test     107
Wrap Up     108
Automatic Storage     109
Table Space and Container Basics     110
Automatic Storage Table Spaces in 8.2.2     111
Automatic Storage Databases in 8.2.2     111
Database Partitioning Feature Support in DB2 9     112
Storage Paths and Expressions     113
Adding Storage Paths in DPF     114
Adding a Database Partition     115
Automatic Growth in DPF     115
Backup and Restore Considerations     116
Monitoring Space Utilization     117
Wrap Up     118
Other Autonomic and Manageability Enhancements     119
Autonomic Enhancements     120
Automatic Defaults for Page Cleaners and Prefetchers     120
Automatic Defaults for Table Space Characteristics     121
Autonomics by Default      122
Enhancements to Monitoring and Database Health     125
New and Updated Monitor UDFs and Views     125
SQL Access to Notification Logs     128
Manageability Enhancements     130
Copy and Drop Schema     131
In-Place Alter Table Operations     133
Database Administration Through SQL     134
Get Error Messages in SQL PL via SQLERRM     134
Storage Paths for Creating a Database in Windows     135
MQTs Considered by the Optimizer but Not Chosen     136
Wrap Up     138
Application Development
Rational Data Architect     141
Data Modeling     144
Putting Theory into Practice     145
Wrap Up     148
DB2 and the .NET Developer     151
.NET and the Database Programmer     152
The DB2 and .NET Stack     154
DB2 Implementation of AD0.NET     155
Implementing DB2 CLR Procedures     159
DB2 and Microsoft Visual Studio     160
Versions     161
Server Explorer and IBM Explorer     162
Organizing and Managing Assets     168
DB2 and .NET in the Palm of Your Hand     170
Wrap Up     170
DB2 and the Java Developer     171
Evolving with Java     172
JDBC, SQU, and Drivers that Implement Them     173
Driver Types     174
Stronger, More Functional Java     175
Development Tools     176
Java Meets XML     181
Wrap Up     183
DB2 and the Scripting Languages Developer     185
DB2 on Rails     186
Ruby, a Gem of a Language     186
The Rails Framework for Web Applications     188
Getting Started with DB2 on Rails     192
Perl     200
PHP     203
Wrap Up     205
DB2 and the XML Developer     207
Getting Ready to Store XML     209
XML and All That CRUD     211
Creating Data     211
Retrieving Data with SQL and XQuery     213
Updating and Deleting Data     215
Self-Describing XML     217
The Other Way to Store XML Data     218
The Other Way to Produce XML Data     221
Wrap Up     221
The DB2 Developer Workbenth     223
The Eclipse Platform     224
About the DB2 Development Center     224
A Tour of the Developer Workbench Views and Features     225
The Database Explorer View     226
The Data Project Explorer View     232
SQL Development     233
Routine Development     235
SQLJ Support     239
Comparison Utility     242
XML Development     243
Teaming Support     249
Visual Explain Facility     249
Wrap Up     249
Other Application Development Topics     251
Toad: It's Not Just for Oracle Anymore     252
Other Enhancements for Application Developers     254
Deploying Your Applications     256
Wrap Up     259
Security Enhancements
Label-Based Access Control     263
Security Levels     264
LBAC Overview     266
What LBAC Does Not Prevent     267
SECADM Authority     268
Defining Security Label Components     269
Security Labels     269
Defining Security Policies     270
Set Label Comparisons     271
Array Label Comparisons     272
Tree-Label Comparisons     273
Defining a Security Policy     274
Defining Security Labels     275
Creating Protected Tables     276
Column Security     277
Row Security     278
Row and Column Security     278
Table Security     279
Granting Security Labels to Users     280
LBAC Exemptions     280
Bringing It All Together: Using Protected Tables     283
Inserting with Protected Rows     283
Selecting from Tables with Protected Rows     286
Inserting with Protected Columns     288
Selecting from Tables with Protected Columns     289
Removing or Modifying LBAC Definitions     291
Modifying Security Definitions     292
Referential Integrity and Constraint Checking     292
Referential Integrity     292
Check Constraints     292
Primary and Unique Key Constraints     293
Wrap Up     293
Additiond Security Enhancements     295
SECADM Authority     296
LDAP Security Plug-in     297
LDAP Plug-in Availability     297
Implementing LDAP     298
Transfer Ownership     298
SETSESSIONUSER Privilege     299
RESTRICT on Database Create      300
Wrap Up     302
Sharp Enhancements
Table Partitioning     305
Table Partitioning: What Is It and Why Use It?     306
Creating a Range-Partitioned Table     309
Defining Ranges     310
Partition Elimination     311
Inserts and Updates     311
Open-Ended Ranges     312
Special Values     312
Inclusive and Exclusive Bounds     313
Implicit Bounds     314
Naming Partitions     314
Handling NULL Values     315
Computing Ranges: Short Syntax     316
Open-Ended Ranges with Computed Ranges     317
Partitioning on Multiple Columns     318
Storage Mapping of Range-Partitioned Tables     318
New Operations for Roll-Out and Roll-In     321
Adding Partitions to an Existing Table     321
Set Integrity Processing     323
Data Availability During Attach and Set Integrity Processing     324
Deleting Partitions from on Existing Table     325
Data Availability During Attach and Set Integrity Processing     327
Asynchronous Index Cleanup ofter DETACH     328
Additional Considerations for Range Partitioning      329
Migration from a UNION ALL View     329
Using MDC with Table Partitioning     330
Compression and Table Partitioning     331
Wrap Up     332
Larger Table Space Support     333
Table Spaces     334
Original Row Identifier Format     334
DB2 9 Row Idenfifiers     336
Creating Large Table Spaces     337
Migrating to Large Table Spaces     341
Considerations for Using Table Spaces     345
Indexes     346
Allow Reverse Scans     346
Considerations for Using Large Indexes     347
Wrap Up     347
Row Compression     349
Row Compression Basics     351
How Compression Works     351
Compressing Tables     352
How Best to Create Compressed Tables     354
Statistical Information on Compressed Tables     355
Estimating Storage Sovings from Compression     355
Dictionary Storage and Size     357
Adding Data to a Compressed Table     357
Using Compression with Table Partitioning     358
Using Compression with the Database Partitioning Feature     358
Compression Restrictions      359
Rules of Thumb for Compressed Tables     360
Wrap Up     360
Storage Savings     361
Performance Benefits     361
High-Availability Enhancements     363
Minimizing Unplanned Outages     364
Connection Timeout     364
Rebuild Partial Database     367
Redirected Restore Scripting     369
Engine Trap Data Collection     374
Server Hang Data Collection     375
Catch Errors and Gather Problem Determination Data     376
Change Point in Time for Recover     377
Rollforward Output Shows UTC or Local Time     378
Minimizing Planned Outages     380
In Place Alter Table     380
Retrieve List of Files for Comprehensive Backup     383
ADMIN_CMD for Wore Commond/Utility Processing     385
Wrap Up     388
Additional SHARP Enhancements     389
Internet Protocol Version 6     390
Operating System Support     391
Migration Support     393
Statistical Views     394
Enabling Statistical Views     395
Statistical View Example     395
MQT Enhancements      397
MQT Design     398
MQT Performance Enhancements     400
MQT Maintenance     401
MQT and NULL Columns     401
Large Page Size on AIX     401
Fast Communication Manager     402
SAP Optimization Enhancements     402
SAP Optimizotion     402
Automatic AVG_APPLS     403
Limiting Query Temp Space     403
Wrap Up     404
Index     405

Tuesday, December 1, 2009

Condemned or Office 2003 Bible

Condemned: Criminal Origins: Prima Official Game Guide

Author: Prima Temp Authors

Condemned: Criminal Origins - PRIMA Official Game Guide will reveal the complete game experience for the player. With info on all weapons and comparisons of their efficacy, locations of every Achievement, and all forensic tools detailed the customer will learn all they need to survive the game. Plus enemy info and strategies, and how to unlock each of the four endings will be included.



Office 2003 Bible

Author: Allen Wyatt

Targets how to effectively and efficiently use data, text, and graphics from one Office application in another Office application.



• Features less emphasis on macros and programming and more focus on enhancements.

• Improved content and topical selection compared to previous editions.




Table of Contents:
Preface
Pt. IGetting Started
Pt. IIUsing Word
Pt. IIIUsing Excel
Pt. IVUsing Outlook
Pt. VUsing PowerPoint
Pt. VIUsing Access
Pt. VIIOffice and the Web
Pt. VIIICollaborating in Office
Pt. IXCustomizing and Automating Office
App. A: Describes the content of the accompanying CD-ROM
App. B: "Optimizing Your Office Installation," provides a few tips on using Office Setup