Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: %computational model in applied sciences%22
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
dewey-ones:"500 - Natural sciences & mathematics"
Search alternatives
:
computational model »
computational models
,
computational modeling
,
computational methods
Showing
1
-
20
of
20
Search:
'%computational model in applied sciences%22'
,
query time: 3.97s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Visual
models
for software requirements
by
Beatty, Joy
Published 2012
Microsoft Press
Table of Contents:
“
...Part I: An Introduction to
Models
-- Chapter 1: Introduction to RML -- Chapter 2:
Model
...
”
Call Number:
QA76.76.D47
Read Now
2
Model
-driven engineering for distributed real-time systems : MARTE modeling, model transformations and their usages
by
Babau, Jean-Philippe
Published 2010
Iste
Table of Contents:
“
.... Acknowledgements; 1.7. Bibliography; Chapter 2.
Model
-Based Code Generation; 2.1. Introduction;
2.2
. The
model
...
”
Call Number:
QA76.76.D47
Read Now
3
Model
-based testing essentials : guide to the ISTQB certified model-based tester foundation level
by
Kramer, Anne
,
Legeard, Bruno
Published 2016
John Wiley & Sons Inc.
Table of Contents:
“
... ENTERPRISE IT
MODEL
-BASED TESTING -- ORANGEHRM CASE STUDY; 11.2 MBT FOR PROCESS-SUPPORTING SW -- TOOL...
”
Call Number:
QA76.76.T48
Read Now
4
Patterns of data
modeling
by
Blaha, Michael
Published 2010
CRC Press
Table of Contents:
“
...Chapter 1. Introduction -- 1.1. What is a
Model
? -- 1.2.
Modeling
Notation -- 1.3. What Is a...
”
Call Number:
QA76.9.D32
Read Now
5
Software quality assurance : in large scale and complex software-intensive systems
Published 2016
Morgan Kaufmann
Table of Contents:
“
... An introduction to modern software quality assurance; 2.1 Introduction;
2.2
Requirement Conformance Versus...
”
Call Number:
QA76.76.Q35
Read Now
6
Sams teach yourself ADO.NET in 24 hours
by
Lefebvre, Jason
Published 2002
Sams
Table of Contents:
“
...
22
. Modifying Data in an N-Tier Application...
”
Call Number:
QA76.9.O35
Read Now
7
Hunting security bugs
by
Gallagher, Tom
Published 2006
Microsoft Press
Table of Contents:
“
... Testing; 2.1 Threat
Modeling
;
2.2
How Testers Can Leverage a Threat
Model
; 2.3 Data Flow Diagrams; 2.4...
”
Call Number:
QA76.9.A25
Read Now
8
Joe Celko's complete guide to NoSQL : what every SQL professional needs to know about non-relational databases
by
Celko, Joe
Published 2013
Morgan Kaufmann
Table of Contents:
“
...; Concluding Thoughts; References; Chapter 4: MapReduce
Model
; Introduction; 4.1. Hadoop Distributed File...
”
Call Number:
QA76.9.D32
Read Now
9
Agile Produktmanagement mit Scrum : Erfolgreich als Product Owner arbeiten
by
Pichler, Roman
Published 2014
Dpunkt.verlag
Table of Contents:
“
... Owner;
2.2
Hilfreiche Eigenschaften des Product Owner; 2.2.1 Unternehmer im Unternehmen; 2.2.2...
”
Call Number:
QA76.76.D47 .P384 2014
Read Now
10
Ajax in action
by
Crane, Dave
Published 2006
Manning
Table of Contents:
“
... with Ajax -- 2.1. The key elements of Ajax --
2.2
. Orchestrating the user experience with JavaScript -- 2.3...
”
Call Number:
TK5105.888
Read Now
11
Handbook of constraint programming
by
Rossi, Francesca
Published 2006
Elsevier
Table of Contents:
“
... in Constraint Programming -- (Ian P. Gent, Karen E. Petrie, Jean-Francois Puget) -- Chapter 11.
Modelling
...
”
Call Number:
QA76.612
Read Now
12
Practical numerical C programming : finance, engineering, and physics applications
by
Joyce, Philip
Published 2020
Apress
Table of Contents:
“
... -- Chapter 2: Regression -- 2.1 Capital Asset Pricing
Model
--
2.2
CAPM Illustration -- Chapter 3: PMCC...
”
Call Number:
QA76.73.C15
Read Now
13
Seriously Good Software
by
Faella, Marco
Published 2020
Manning Publications
Table of Contents:
“
... implementation -- 2.1. The code [Reference] --
2.2
. Memory requirements -- 2.3. Time complexity -- 2.4.
Applying
...
”
Read Now
14
Managing software requirements : a use case approach
by
Leffingwell, Dean
Published 2003
Addison-Wesley
Table of Contents:
“
... steps in problem analysis -- 6. Business
modeling
-- 7. Systems engineering of software-intensive...
”
Call Number:
QA76.76.D47
Read Now
15
Cyber threat intelligence
by
Lee, Martin
Published 2023
John Wiley & Sons, Inc.
Table of Contents:
“
... Philosophical Approaches -- 7.3.2 The Josephson
Model
-- 7.3.3 PMI Ethical Decision Making Framework -- 7.4...
”
Call Number:
TK5105.59
Read Now
16
Deep learning with Python
by
Chollet, François
Published 2018
Manning Publications
Table of Contents:
“
... -- Chapter 7. Advanced deep-learning best practices -- 7.1. Going beyond the Sequential
model
: the Keras...
”
Call Number:
QA76.73.P98
Read Now
17
Multicore software development techniques : applications, tips, and tricks
by
Oshana, Rob
Published 2016
Newnes
Table of Contents:
“
... When Necessary; 8.7
Apply
the Proper Lock Granularity and Frequency...
”
Call Number:
QA76.642
Read Now
18
Java Persistence with Spring Data and Hibernate
by
Tudose, Catalin
Published 2023
Manning Publications Co. LLC
Table of Contents:
“
...3.3.1 Annotation-based metadata -- 3.3.2
Applying
constraints to Java objects -- 3.3.3...
”
Call Number:
QA76.64
Read Now
19
Microsoft ADO.NET 4 step by step
by
Patrick, Tim
Published 2010
O'Reilly Media
Table of Contents:
“
... Aggregates --
Applying
Set Operations -- Summary -- Chapter 17. Quick Reference -- 18. Using LINQ to DataSet...
”
Call Number:
QA76.9.D26
Read Now
20
Pro cryptography and cryptanalysis : creating advanced algorithms with C# and .NET
by
Mihailescu, Marius Iulian
,
Nita, Stefania Loredana
Published 2021
Apress
Table of Contents:
“
...: Big Data Cryptography -- Chapter 17: Cloud
Computing
Cryptography -- Part III: Pro Cryptanalysis...
”
Call Number:
QA76.9.D335
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Clear Filter
Classification: 500 - Natural sciences & mathematics
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
500 - Natural sciences & mathematics
620 - Engineering & allied operations
10
331 - Labor economics
5
658 - General management
5
330 - Economics
1
more ...
332 - Financial economics
1
374 - Adult education
1
384 - Communications; telecommunication
1
745 - Decorative arts
1
see all ...
less ...
Language
English
19
German
1
Collection
O'Reilly
20
Author
Ali, Nour
1
Babau, Jean-Philippe
1
Beatty, Joy
1
Bertucci, Paul
1
Blaha, Michael
1
Celko, Joe
1
more ...
Chen, Anthony
1
Chollet, François
1
Crane, Dave
1
Faella, Marco
1
Gallagher, Tom
1
Grundy, John
1
James, Darren
1
Jeffries, Bryan
1
Joyce, Philip
1
Kramer, Anne
1
Landauer, Lawrence
1
Lee, Martin
1
Lefebvre, Jason
1
Leffingwell, Dean
1
Legeard, Bruno
1
Mihailescu, Marius Iulian
1
Mistrík, Ivan
1
Nita, Stefania Loredana
1
Oshana, Rob
1
Pascarello, Eric
1
Patrick, Tim
1
Pichler, Roman
1
Rossi, Francesca
1
Soley, Richard Mark
1
Tudose, Catalin
1
Van Beek, Peter
1
Walsh, Toby
1
Widrig, Don
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&filter%5B%5D=dewey-ones%3A%22500+-+Natural+sciences+%26+mathematics%22&lookfor=%25computational+model+in+applied+sciences%2522&type=AllFields
Send by Email
×
Loading...