Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Computer Vision and Applications, Volume 1
Handbook of Computer Vision and Applications, Volume 1
This handbook o ers a fresh approach to computer vision. The whole vision process from image formation to measuring, recognition, or reacting is regarded as an integral process. Computer vision is understood as the host of techniques to acquire, process, analyze, and understand complex higher-dimensional data from our environment...
Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Multimedia Data Mining and Knowledge Discovery
Multimedia Data Mining and Knowledge Discovery
Multimedia information is ubiquitous and essential in many applications, and repositories of multimedia are numerous and extremely large. Consequently, researchers and professionals need new techniques and tools for extracting the hidden, useful knowledge embedded within multimedia collections, thereby helping them discover relationships between...
Frommer's Portugal (Frommer's Complete)
Frommer's Portugal (Frommer's Complete)

Centuries ago, Portugal was a pioneer of worldwide exploration. Until recently, however, it was never as successful in attracting visitors to its own shores. Outside of greater Lisbon, the Algarve, and the island of Madeira, Portugal remained unknown and undiscovered by the mainstream visitor for many decades.

Today’s...

International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))
International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))

The book includes high-quality research papers presented at the International Conference on Innovative Computing and Communication (ICICC 2018), which was held at the Guru Nanak Institute of Management (GNIM), Delhi, India on 5–6 May 2018. Introducing the innovative works of scientists, professors, research scholars, students...

Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
Meta-Learning in Computational Intelligence (Studies in Computational Intelligence)
Meta-Learning in Computational Intelligence (Studies in Computational Intelligence)

In the early days of pattern recognition and statistical data analysis life was rather simple: datasets were relatively small, collected from well-designed experiments, analyzed using a few methods that had good theoretical background. Explosive growth of the use of computers led to the creation of huge amounts of data of all kinds,...

Acid Christ: Ken Kesey, LSD and the Politics of Ecstasy
Acid Christ: Ken Kesey, LSD and the Politics of Ecstasy

From the literary wonder boy to the countercultural guru whose cross-country bus trip inspired The Electric Kool-Aid Acid Test, this candid biography chronicles the life and times of cultural icon Ken Kesey from the 1960s through the 1980s. Presenting an incisive...

Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

Making Sense of Data: Designing Effective Visualizations
Making Sense of Data: Designing Effective Visualizations

You have a mound of data sitting in front of you and a suite of computation tools at your disposal. And yet, you’re stumped as to how to turn that data into insight. Which part of that data actually matters, and where is this insight hidden?

If you’re a data scientist who struggles to navigate the murky space...

Ergodic Dynamics: From Basic Theory to Applications (Graduate Texts in Mathematics, 289)
Ergodic Dynamics: From Basic Theory to Applications (Graduate Texts in Mathematics, 289)

This textbook provides a broad introduction to the fields of dynamical systems and ergodic theory. Motivated by examples throughout, the author offers readers an approachable entry-point to the dynamics of ergodic systems. Modern and classical applications complement the theory on topics ranging from financial fraud to...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

unlimited object storage image
Result Page: 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy