Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Emergent Web Intelligence: Advanced Information Retrieval
Emergent Web Intelligence: Advanced Information Retrieval
As the Web continues to grow and evolve, more and more data are becoming available. Particularly, multimedia and XML-based data are produced regularly and in increasing way in our daily digital activities, and their retrieval and access must be explored and studied in this emergent web-based era. This book provides reviews of...
Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series)
Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series)
Many people do not realise that mathematics provides the foundation for the devices we use to handle information in the modern world. Most of those who do know probably think that the parts of mathematics involved are quite ‘classical’, such as Fourier analysis and differential equations. In fact, a great deal of...
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)

The authors survey a recent technique in computer vision called Interactive Co-segmentation, which is the task of simultaneously extracting common foreground objects from multiple related images. They survey several of the algorithms, present underlying common ideas, and give an overview of applications of object co-segmentation.

We
...
Handbook of Data Intensive Computing
Handbook of Data Intensive Computing
This handbook is carefully edited book – contributors are worldwide experts in the field of data intensive computing and their applications. The scope of the book includes leading edge data intensive computing architectures and systems, innovative storage, virtualization, and parallel processing technologies applied in...
Computer Science: The Hardware, Software and Heart of It
Computer Science: The Hardware, Software and Heart of It

Computer Science: The Hardware, Software and Heart of It focuses on the deeper aspects of the two recognized subdivisions of Computer Science, Software and Hardware. These subdivisions are shown to be closely interrelated as a result of the stored-program concept. Computer Science: The Hardware, Software and Heart of It includes certain...

Introduction to Video and Image Processing: Building Real Systems and Applications
Introduction to Video and Image Processing: Building Real Systems and Applications
One of the first times I ever encountered video and image processing was in a semester project at my fourth year of studying. The aim of the project was to design a system that automatically located the center and size of mushrooms in an image. Given this information a robot should pick the mushrooms. I was intrigued by the...
Image Registration: Principles, Tools and Methods (Advances in Computer Vision and Pattern Recognition)
Image Registration: Principles, Tools and Methods (Advances in Computer Vision and Pattern Recognition)
Image registration is the process of finding correspondence between all points in two images of a scene. This correspondence is required in stereo depth perception, 3-D scene reconstruction, object detection and recognition, change detection, image fusion, object tracking and motion analysis. Analysis of two or more images of a...
Guide to Web Development with Java: Understanding Website Creation
Guide to Web Development with Java: Understanding Website Creation
I have been teaching web development for 14 years. I started with Perl. I can still remember the behemoth programs that contained all the logic and HTML. I remember using a text editor to write the program. Debugging consisted of a lot of print statements. It was a fun time, full of exploration, but I do not miss them.

...
Software and Systems Traceability
Software and Systems Traceability
Software engineering is a pessimistic discipline. The glass is always half empty rather than half full. Not surprising really, we are hardened to the grind of improving quality, painstakingly testing and, never quite, eliminating bugs. Critical review is of the essence. We know there is “no silver bullet”.

...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Fundamentals of Speaker Recognition
Fundamentals of Speaker Recognition
When I was being interviewed at the handwriting recognition group of IBM T.J. Watson Research Center in December of 1990, one of the interviewers asked me why, being a mechanical engineer, I was applying for a position in that group. Well, he was an electrical engineer and somehow was under the impression that handwriting...
Mathematical Problems in Image Processing
Mathematical Problems in Image Processing
It is surprising when we realize just how much we are surrounded by images. Images allow us not only to perform complex tasks on a daily basis, but also to communicate, transmit information, represent and understand the world around us. Just think, for instance about digital television, medical imagery, video-surveillance, etc....
unlimited object storage image
Result Page: 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy