|
|
|
|
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected PapersThis book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.
The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.
The papers dealt with subjects like virtual business alliances,... | | Human Ear Recognition by Computer (Advances in Pattern Recognition)
Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative... | | Frommer's Moscow and St. Petersburg (Frommer's Complete)
Russia breathes superlatives: the world’s biggest country; its largest supplier of natural gas and second-largest oil producer; home of the planet’s longest railroads, busiest subway system (Moscow’s), and one of its deepest, biggest, and oldest lakes (Baikal, in Siberia). It even boasts balmy beach resorts (on the Black... |
|
|
GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011
The fourth edition of the International Conference on Geospatial Semantics
(GeoS 2011) was held in Brest, France, during May 12–13, 2011.
Geospatial semantics (GEOS) is an emerging research area in the domain of
geographic information science. It aims at exploring strategies, computational
methods, and tools to support... | | Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these... | | Metasploit Penetration Testing Cookbook
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes... |
|
Principles and Practice of Pediatric Surgery
In the preface to the text that preceded this edition, we predicted that the pace of change in the clinical practice of pediatric surgery, and in our understanding of the scientific principles that are the basis for that practice, would soon render the text obsolete. That expectation was more predictable than prescient, ... | | CSS3 Pushing the Limits
Push CSS3 and your design skills to the limit—and beyond!
Representing an evolutionary leap forward for CSS, CSS3 is chock-full of new capabilities that dramatically expand the boundaries of what a styling language can do. But many of those new features remain undocumented, making it difficult to learn what they are... | | Pulsed Laser Ablation of Solids: Basics, Theory and Applications
The book introduces ‘the state of the art' of pulsed laser ablation and its applications. It is based on recent theoretical and experimental studies. The book reaches from the basics to advanced topics of pulsed laser ablation. Theoretical and experimental fundamental phenomena involved in pulsed laser ablation are discussed with... |
|
|
Result Page: 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 |