Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Frommer's Moscow and St. Petersburg (Frommer's Complete)
Frommer's Moscow and St. Petersburg (Frommer's Complete)

Russia breathes superlatives: the world’s biggest country; its largest supplier of natural gas and second-largest oil producer; home of the planet’s longest railroads, busiest subway system (Moscow’s), and one of its deepest, biggest, and oldest lakes (Baikal, in Siberia). It even boasts balmy beach resorts (on the Black...

Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

Data-driven iOS Apps for iPad and iPhone with FileMaker Pro, Bento by FileMaker, and FileMaker Go
Data-driven iOS Apps for iPad and iPhone with FileMaker Pro, Bento by FileMaker, and FileMaker Go

Use FileMaker® technologies to create powerful mobile data apps for iPhone®, iPod® touch, and iPad™

 

Apple’s FileMaker technologies make it easy to create powerful, data-driven apps for iPhone, iPod touch, iPad, and any mobile...

Diagrammatic Reasoning in AI
Diagrammatic Reasoning in AI

This book is really the end product of over a decade of work, on and off, on diagrammatic reasoning in artificial intelligence (AI). In developing this book, I drew inspiration from a variety of sources: two experimental studies, the development of two prototype systems, an extensive literature review and analysis in AI,...

GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011
GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011

The fourth edition of the International Conference on Geospatial Semantics (GeoS 2011) was held in Brest, France, during May 12–13, 2011.

Geospatial semantics (GEOS) is an emerging research area in the domain of geographic information science. It aims at exploring strategies, computational methods, and tools to support...

Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Principles and Practice of Pediatric Surgery
Principles and Practice of Pediatric Surgery
In the preface to the text that preceded this edition, we predicted that the pace of change in the clinical practice of pediatric surgery, and in our understanding of the scientific principles that are the basis for that practice, would soon render the text obsolete. That expectation was more predictable than prescient,...
CSS3 Pushing the Limits
CSS3 Pushing the Limits

Push CSS3 and your design skills to the limit—and beyond!

Representing an evolutionary leap forward for CSS, CSS3 is chock-full of new capabilities that dramatically expand the boundaries of what a styling language can do. But many of those new features remain undocumented, making it difficult to learn what they are...

Pulsed Laser Ablation of Solids: Basics, Theory and Applications
Pulsed Laser Ablation of Solids: Basics, Theory and Applications

The book introduces ‘the state of the art' of pulsed laser ablation and its applications. It is based on recent theoretical and experimental studies. The book reaches from the basics to advanced topics of pulsed laser ablation. Theoretical and experimental fundamental phenomena involved in pulsed laser ablation are discussed with...

unlimited object storage image
Result Page: 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy