Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Vision : Theory, Algorithms, Practicalities
Machine Vision : Theory, Algorithms, Practicalities
In the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists...
Multicast Sockets: Practical Guide for Programmers (The Practical Guides)
Multicast Sockets: Practical Guide for Programmers (The Practical Guides)

Multicast Sockets: Practical Guide for Programmers is a hands-on, application-centric approach to multicasting (as opposed to a network-centric one) that is filled with examples, ideas, and experimentation. Each example builds on the last to introduce multicast concepts, frameworks, and APIs in an engaging manner that does not burden...

Introduction to Data Compression, Third Edition (Morgan Kaufmann Series in Multimedia Information and Systems)
Introduction to Data Compression, Third Edition (Morgan Kaufmann Series in Multimedia Information and Systems)

The second edition of Introduction to Data Compression builds on the features that made the first the logical choice-for practitioners who need a comprehensive guide to compression for all types of multimedia and instructors who want to equip their students with solid foundations in these increasingly important and diverse...

Innovation Happens Elsewhere: Open Source as Business Strategy
Innovation Happens Elsewhere: Open Source as Business Strategy
It's a plain fact: regardless of how smart, creative, and innovative your organization is, there are more smart, creative, and innovative people outside your organization than inside. Open source offers the possibility of bringing more innovation into your business by building a creative community that reaches beyond the barriers of the business....
Java Web Services Architecture (The Morgan Kaufmann Series in Data Management Systems)
Java Web Services Architecture (The Morgan Kaufmann Series in Data Management Systems)
Written by industry thought leaders, Java Web Services Architecture is a no-nonsense guide to web services technologies including SOAP, WSDL, UDDI and the JAX APIs. This book is the trusted advisor to systems architects and provides an unbiased look at many of the practical considerations for implementing web services including authorization,...
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Networks on Chips: Technology and Tools (Systems on Silicon)
Networks on Chips: Technology and Tools (Systems on Silicon)
The exponentially increasing complexity and heterogeneity of future SoCs forces the designer to abandon traditional bus -based structures and to implement innovative networks-on-chip. This book, written by two leading researchers, is the first of its kind. It is a must on the bookshelf of anybody having an interest in SoC design Heinrich Meyr,...
Usability Engineering (Interactive Technologies)
Usability Engineering (Interactive Technologies)
The purpose of Jakob Nielsen's Usability Engineering is to help nontechnical people improve the systems so that

they are not only error-free but also easier and more pleasant to use, and more efficient. It is a book that ...shows us
how to change the world and does so admirably....One of this book's strengths is that it
...

Paradigms of Artificial Intelligence Programming: Case Studies in Common Lisp
Paradigms of Artificial Intelligence Programming: Case Studies in Common Lisp

Paradigms of AI Programming is the first text to teach advanced Common Lisp techniques in the context of building major AI systems. By reconstructing authentic, complex AI programs using state-of-the-art Common Lisp, the book teaches students and professionals how to build and debug robust practical programs, while demonstrating...

The Art of Multiprocessor Programming
The Art of Multiprocessor Programming
The first text and reference on this sea change in the computer industry

This book is the first comprehensive presentation of the principles and tools available for programming multiprocessor machines. It is of immediate use to programmers working with the new architectures. For example, the next generation of computer game
...
TCP/IP Sockets in Java, Second Edition: Practical Guide for Programmers (The Practical Guides)
TCP/IP Sockets in Java, Second Edition: Practical Guide for Programmers (The Practical Guides)
Most Internet applications use sockets to implement network communication protocols. TCP/IP Sockets in Java: Practical Guide for Programmers, with its focused, tutorial-based coverage, helps you master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Later chapters teach you to implement...
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy