Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Color Image Processing: Methods and Applications
Color Image Processing: Methods and Applications
Over the last two decades, we have witnessed an explosive growth in both the diversity of techniques and the range of applications of image processing. However, the area of color image processing is still sporadically covered, despite having become commonplace, with consumers choosing the convenience of color imaging over traditional grayscale...
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Consumption of media has grown rapidly in the previous decade due to advances in digital technology. In recent years, the wireless industry has seen explosive growth in device capability. Everincreasing computing power, memory, and high-end graphic functionalities have accelerated the development of new and exciting wireless services. Personal...
Process Algebra for Parallel and Distributed Processing (Chapman & Hall / Crc Computational Science)
Process Algebra for Parallel and Distributed Processing (Chapman & Hall / Crc Computational Science)
Despite the importance of applications of process algebras for the success of the field, [related publications] concentrate strongly on the theoretical achievements. This shortcoming is compensated for in a splendid way by this book, which brings together the state of the art in research on applications of process algebras.
—From the
...
Inside Photoshop CS
Inside Photoshop CS
Gary Bouton has made Inside Photoshop CS a perennial best-seller due to the loyalty of his audience. A lot of people simply love the way Gary explains what Photoshop is all about. In this revised edition, Gary truly puts the outsider "inside", demystifying such intangibles as pixels, color wheel, resolution, line...
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Research and Advanced Technology for Digital Libraries: 8th European Conference, ECDL 2004, Bath, UK, September 12-17, 2004, Proceedings
Research and Advanced Technology for Digital Libraries: 8th European Conference, ECDL 2004, Bath, UK, September 12-17, 2004, Proceedings
We are delighted lo present the ECDL 2004 Conference proceedings from the 8th European Conference on Research and Advanced Technology for Digital Li- braries at the University of Bath. Bath, UK. This followed an impressive and geographically dispersed series of locations for previous events: Pisa (1997). ller- aklion (1998),...
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software

An Integrated Technology for Delivering Better Software—Cheaper and Faster!

 

This book presents an integrated technology, Design for Trustworthy Software (DFTS), to address software quality issues upstream such that the goal of software...

Building Service Provider Networks
Building Service Provider Networks
Learn how to gain the edge of providing the most reliable service-level guarantees to customers

Network and service provider engineers are often faced with the difficult challenge of meeting a less-than-logical service need of a customer–– and at the most reasonable price. In this book, Howard Berkowitz shows network and service...

Software Engineering Handbook
Software Engineering Handbook
The Software Engineering Handbook is written for software developers; unlike many other texts, it is written to be used in developers everyday work. Care has been taken to reference outside sources consulted for the text, easily leading readers to more detailed information when needed. This book is recommended for libraries that serve IT...
Be #1 on Google:  52 Fast and Easy Search Engine Optimization Tools to Drive Customers to Your Web Site
Be #1 on Google: 52 Fast and Easy Search Engine Optimization Tools to Drive Customers to Your Web Site
There’s having a Web site and there’s having a Web site that works. It’s all very well to have a flashy intro, a fully integrated shopping basket, and lots of features and functionality that can wow the audience on every single page. But what if they can’t find you? What if you’re not visible on the search engines and...
ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

unlimited object storage image
Result Page: 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy