Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Retrieval for Music and Motion
Information Retrieval for Music and Motion
A general scenario that has attracted a lot of attention for multimedia information retrieval is based on the query-by-example paradigm: retrieve all documents from a database containing parts or aspects similar to a given data fragment. However, multimedia objects, even though they are similar from a structural or semantic viewpoint, often reveal...
Computational Geometry: Algorithms and Applications
Computational Geometry: Algorithms and Applications
This well-accepted introduction to computational geometry is a textbook for high-level undergraduate and low-level graduate courses. The focus is on algorithms and hence the book is well suited for students in computer science and engineering. Motivation is provided from the application areas: all solutions and techniques from computational...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Management of Hazardous Substances in the Environment
Management of Hazardous Substances in the Environment
Selected papers presented at Envirotech Vienna 1989, First International ISEP Congress, Vienna, Austria, on 20-22 February 1989.

There has been growing international concern in recent years about the urgent environmental problems associated with hazardous substances and their management. Discussion has focussed on three main areas:...
Professional Cooking, Trade Version
Professional Cooking, Trade Version
—From the Foreword by André Cointreau President and CEO, Le Cordon Bleu

If you're serious about cooking, you'll want to join the hundreds of thousands of chefs who have used Wayne Gisslen's Professional Cooking to learn the basics of their craft. With more information and step-by-step photographs than ever before, the Sixth Edition...

Information Security Governance (Wiley Series in Systems Engineering and Management)
Information Security Governance (Wiley Series in Systems Engineering and Management)
This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the...
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
The People CMM: A Framework for Human Capital Management (2nd Edition)
The People CMM: A Framework for Human Capital Management (2nd Edition)

Organizations are now competing in two markets, one for their products and services and one for the talent required to produce or perform them. Success in the former is determined by success in the latter. The ability to compete is directly related to the ability to attract, develop, motivate, organize, and retain the...

Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences
Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences

Computer and Information Sciences is a unique and comprehensive review of advanced technology and research in the field of Information Technology. It provides an up to date snapshot of research in Europe and the Far East (Hong Kong, Japan and China) in the most active areas of information technology, including Computer Vision, Data...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Starling Game Development Essentials
Starling Game Development Essentials

Develop and deploy isometric turn-based games using Starling

Overview

  • Create a cross-platform Starling Isometric game
  • Add enemy AI and multiplayer capability
  • Explore the complete source code for the Web and cross-platform game develpment

In...

unlimited object storage image
Result Page: 448 447 446 445 444 443 442 441 440 439 438 437 436 435 434 433 432 431 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy