Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Imaging Beyond the Pinhole Camera (Computational Imaging and Vision)
Imaging Beyond the Pinhole Camera (Computational Imaging and Vision)
The world's first photograph was taken in 1826 using a pinhole camera, known as camera obscura. The camera obscura, the basic projection model of pinhole cameras, was already known in China more than 2500 years ago. Cameras used since this first photograph are basically following the pinhole camera principle. The quality of projected images...
Computer-Aided Design of User Interfaces IV: Proceedings of the Fifth International Conference on Computer-Aided Design of User Interfaces CADUI '2004
Computer-Aided Design of User Interfaces IV: Proceedings of the Fifth International Conference on Computer-Aided Design of User Interfaces CADUI '2004
Computer-Aided Design of User Interfaces IV gathers the latest research of experts, research teams and leading organisations involved in computer-aided design of user interactive applications supported by software, with specific attention for platform-independent user interfaces and context-sensitive or aware applications. This...
Bioinformatics: A Concept-Based Introduction
Bioinformatics: A Concept-Based Introduction
Bioinformatics is an evolving field that is gaining popularity due to genomics, proteomics and other high-throughput biological methods. The function of bioinformatic scientists includes biological data storage, retrieval and in silico analysis of the results from large-scale experiments. This requires a grasp of knowledge mining algorithms, a...
Data Mining for Business Applications
Data Mining for Business Applications
Data Mining for Business Applications presents the state-of-the-art research and development outcomes on methodologies, techniques, approaches and successful applications in the area. The contributions mark a paradigm shift from “data-centered pattern mining” to “domain driven actionable knowledge discovery”...
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Data Mining and Applications in Genomics (Lecture Notes in Electrical Engineering)
Data Mining and Applications in Genomics (Lecture Notes in Electrical Engineering)
Data Mining and Applications in Genomics contains the data mining algorithms and their applications in genomics, with frontier case studies based on the recent and current works at the University of Hong Kong and the Oxford University Computing Laboratory, University of Oxford. It provides a systematic introduction to the use of data...
Interoperability of Enterprise Software and Applications
Interoperability of Enterprise Software and Applications
Interoperability: the ability of a system or a product to work with other systems or products without special effort from the user is a key issue in manufacturing and industrial enterprise generally. It is fundamental to the production of goods and services quickly and at low cost at the same time as maintaining levels of quality and customisation....
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many...

Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing)
Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing)
Probability theory has been the only well-founded theory of uncertainty for a long time. It was viewed either as a powerful tool for modelling random phenomena, or as a rational approach to the notion of degree of belief. During the last thirty years, in areas centered around decision theory, artificial intelligence and information processing,...
Foundations of Empirical Software Engineering: The Legacy of Victor R. Basili
Foundations of Empirical Software Engineering: The Legacy of Victor R. Basili
Although software engineering can trace its beginnings to a NATO conference in 1968, it cannot be said to have become an empirical science until the 1970s with the advent of the work of Prof. Victor Robert Basili of the University of Maryland. In addition to the need to engineer software was the need to understand software. Much like other...
Pattern Recognition and Image Analysis: Third Iberian Conference, IbPRIA 2007, Girona, Spain, June 6-8, 2007, Proceedings, Part I
Pattern Recognition and Image Analysis: Third Iberian Conference, IbPRIA 2007, Girona, Spain, June 6-8, 2007, Proceedings, Part I
The two-volume set LNCS 4477 and 4478 constitutes the refereed proceedings of the Third Iberian Conference on Pattern Recognition and Image Analysis, IbPRIA 2007, held in Girona, Spain in June 2007.

The 48 revised full papers and 108 revised poster papers presented together with 3 invited talks were carefully reviewed and selected from 328...

unlimited object storage image
Result Page: 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy