Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 1 (Lecture Notes in Networks and Systems)
Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 1 (Lecture Notes in Networks and Systems)

This book presents a remarkable collection of chapters that cover a wide range of topics in the areas of information and communication technologies and their real-world applications. It gathers the Proceedings of the Future of Information and Communication Conference 2019 (FICC 2019), held in San Francisco, USA from March 14 to 15,...

The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
What do Einstein's theory of relativity, string theory, and lots of other mind-bending—and space-bending—revelations of modern physics have in common? None of them could have been discovered until scientists and mathematicians recognized an uncomfortable truth—that there was a reason the world's greatest mathematical minds had...
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011

Over the last few decades, energy minimization methods have become an established paradigm to resolve a variety of challenges in the fields of computer vision and pattern recognition. While traditional approaches to computer vision were often based on a heuristic sequence of processing steps and merely allowed a very limited...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)
Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)

Humans receive the great majority of information about their environment through sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key component for building artificial systems that can perceive and understand their environment. Computer vision is likely to change society in many ways; for example, it...

The Crucible of Consciousness: An Integrated Theory of Mind and Brain
The Crucible of Consciousness: An Integrated Theory of Mind and Brain
There are lots of books on consciousness being published these days, and I end up skimming most of them and reading a few of them. Reading somebody else’s take on the whole set of issues is often frustrating and depressing: they just don’t get it. Other times it is tantalizing; they start on the right foot, in other words, where I...
Mobile Commerce Applications
Mobile Commerce Applications
Today, various m-commerce applications are increasingly enhancing enterprises' abilities to offer mobile services that are easily accessed by a mobile device anytime and anywhere. With the unique advantages of emerging mobile communications and wireless technologies, m-commerce applications are generally used to fulfill some tasks that are not...
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011

This volume of Springer Lecture Notes in Computer Sciences (LNCS) constitutes the final publication of the EU COST 2101 Action “Biometrics for Identity Documents and Smart Cards,” which has been successfully running during the years 2006-2010. One of the many valuable outputs of this initiative is the realization of a new...

Tissue and Organ Regeneration in Adults
Tissue and Organ Regeneration in Adults

Tissue engineering is the first discipline of bioengineering which explicitly integrates molecular biology with physics and chemistry. It emphasizes research in the synthesis of new tissues and organs in vivo and in vitro. The treatment is uniform and deliberately directed toward the different backgrounds of students from the physical and...

Blind Image Deconvolution: Theory and Applications
Blind Image Deconvolution: Theory and Applications
Blind image deconvolution is constantly receiving increasing attention from the academic as well the industrial world due to both its theoretical and practical implications. The field of blind image deconvolution has several applications in different areas such as image restoration, microscopy, medical imaging, biological imaging, remote sensing,...
Web Geek's Guide to the Android-Enabled Phone
Web Geek's Guide to the Android-Enabled Phone
We live in a time when everything in our lives has to do double duty. Cars serve not only as cars but also as traveling offices, and dinner dates become business meetings or event-planning sessions. So it’s no surprise that our devices must also do more than just be a phone, an MP3 player, or a GPS unit. If a device can be all of those, so...
unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy