Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ethical and Social Issues in the Information Age (Texts in Computer Science)
Ethical and Social Issues in the Information Age (Texts in Computer Science)
As I wrote in my second edition preface, since the publication of the second edition in 2003, there have been tremendous changes in the fields of computer science and information sciences. During this period, we have become more dependent on computer and telecommunication technology than ever before. As we, individually and as nations, become more...
Semantics with Applications: An Appetizer (Undergraduate Topics in Computer Science)
Semantics with Applications: An Appetizer (Undergraduate Topics in Computer Science)
Semantics will have an important role to play in the future development of software systems and domain specific languages, and there is a real need for an introductory book that presents the fundamental ideas behind these approaches; stresses their relationship by formulating and proving the relevant theorems; and illustrates the applications of...
Design, Automation, and Test in Europe: The Most Influential Papers of 10 Years DATE
Design, Automation, and Test in Europe: The Most Influential Papers of 10 Years DATE
The Design, Automation and Test in Europe (DATE) conference celebrated in 2007 its tenth anniversary. As a tribute to the chip and system-level design and design technology community, this book presents a compilation of the three most influential papers of each year. This provides an excellent historical overview of the evolution of a domain that...
A Generative Theory of Shape (Lecture Notes in Computer Science, 2145)
A Generative Theory of Shape (Lecture Notes in Computer Science, 2145)
From the reviews:

"This book is intended for a general scientifically interested audience . The author develops a generative theory of shape along two principles fundamental to intelligence maximization of transfer and maximization of recoverability. He proceeds by using an algebraically flavoured approach characterizing features as...

Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class...

Automatic Program Development: A Tribute to Robert Paige
Automatic Program Development: A Tribute to Robert Paige
Automatic Program Development is a tribute to Robert Paige (1947-1999), our accomplished and respected colleague, and moreover our good friend, whose untimely passing was a loss to our academic and research community. We have collected the revised, updated versions of the papers published in his honor in the Higher-Order and Symbolic Computation...
Human Motion: Understanding, Modelling, Capture, and Animation (Computational Imaging and Vision)
Human Motion: Understanding, Modelling, Capture, and Animation (Computational Imaging and Vision)
The study of human motion dates back more than 2000 years. With the event of information technology, new areas have been added to this field. Research using computer vision and computer graphics contributes to a transformation of biomechanics into a discipline that now applies computing technology throughout; on the other hand, computer vision and...
Handbook of Spatial Logics
Handbook of Spatial Logics
Space, with its manifold layers of structure, has been an inexhaustible source of intellectual fascination since Antiquity. The science that began with the empirical discoveries of the Egyptian ‘rope-stretchers’, and that has inspired many of the greatest developments in mathematics over the centuries, now comprises such topics as...
Human Factors and Voice Interactive Systems (Signals and Communication Technology)
Human Factors and Voice Interactive Systems (Signals and Communication Technology)
Human Factors and Voice Interactive Systems, Second Edition provides in-depth information on current topics of major interest to speech application developers,  and updates material from chapters that appeared in the previous edition.

The first nine chapters of the book cover issues related to interactive voice response systems,...

Handbook of Biometrics
Handbook of Biometrics
Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of...
Spatial Cognition V: Reasoning, Action, Interaction (Lecture Notes in Computer Science)
Spatial Cognition V: Reasoning, Action, Interaction (Lecture Notes in Computer Science)
This is the fifth volume in a series of book publications featuring basic interdisciplinary research in spatial cognition. The study of spatial cognition is the study of knowledge about spatial properties of objects and events in the world. Spatial properties include location, size, distance, direction, separation and connection, shape, pattern,...
Information Access through Search Engines and Digital Libraries (The Information Retrieval Series)
Information Access through Search Engines and Digital Libraries (The Information Retrieval Series)
The Information Management Systems group at the University of Padua, led by Maristella Agosti, has been a major contributor to information retrieval (IR) and digital libraries for nearly twenty years. This group has gained an excellent reputation in the IR community and has produced some of the best-known IR researchers, whose work spans a broad...
Result Page: 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy