Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011

Over the last few decades, energy minimization methods have become an established paradigm to resolve a variety of challenges in the fields of computer vision and pattern recognition. While traditional approaches to computer vision were often based on a heuristic sequence of processing steps and merely allowed a very limited...

Fundamentals of Logic Design (with Companion CD-ROM)
Fundamentals of Logic Design (with Companion CD-ROM)

After studying this text, you should be able to apply switching theory to the solution of logic design problems.This means that you will learn both the basic theory of switching circuits and how to apply it. After a brief introduction, you will study Boolean algebra, which is the basic mathematical tool needed to analyze and synthesize...

The Web Collection Revealed Premium Edition: Adobe Dreamweaver CS5, Flash CS5 and Photoshop CS5
The Web Collection Revealed Premium Edition: Adobe Dreamweaver CS5, Flash CS5 and Photoshop CS5

Welcome to Th e Web Collection Premium Edition: Adobe Dreamweaver CS5, Flash CS5, and Photoshop CS5—Revealed. Th is book off ers creative projects, concise instructions, and coverage of basic Dreamweaver, Flash, Photoshop, and Creative Suite integration skills, helping you to create polished, professional-looking websites,...

Modern Business Process Automation: YAWL and its Support Environment
Modern Business Process Automation: YAWL and its Support Environment
The held of Business Process Management (BPM) is marred by a seemingly end- less sequence of (proposed) industry standards. Contrary to other fields (e.g.. civil or electronic engineering), these standards are not the result of a v\ idelj supported consolidation of well-understood and well-established concepts and practices. In the...
Pro JavaScript for Web Apps
Pro JavaScript for Web Apps
Client-side web app development has always been the poor cousin to server-side coding. This started because browsers and the devices they run on have been less capable than enterprise-class servers. To provide any kind of serious web app functionality, the server had to do all of the heavy lifting for the browsers, which was pretty...
Methods and Procedures for Building Sustainable Farming Systems: Application in the European Context
Methods and Procedures for Building Sustainable Farming Systems: Application in the European Context

Showing how the method of sustainability assessment plays a key role in choosing the best agricultural productive mode, this book guides the reader through the process of selecting, from among the various approaches for building farming systems, the method of decision-making that will result in the most appropriate outcome, given the context....

More iPhone Development with Swift: Exploring the iOS SDK
More iPhone Development with Swift: Exploring the iOS SDK

Interested in iPhone and iPad apps development? Want to learn more? Whether you are a relative newcomer to iPhone and iPad or iOS development or an old hand looking to expand your horizons, we have the perfect Swift-flavored book for you. (Source code has been updated to reflect Xcode 6.3.2 and Swift 1.2!)

The...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Automatic Design of Decision-Tree Induction Algorithms (SpringerBriefs in Computer Science)
Automatic Design of Decision-Tree Induction Algorithms (SpringerBriefs in Computer Science)

Presents a detailed study of the major design components that constitute a top-down decision-tree induction algorithm, including aspects such as split criteria, stopping criteria, pruning and the approaches for dealing with missing values. Whereas the strategy still employed nowadays is to use a 'generic' decision-tree induction...

MRI of the Liver: A Practical Guide
MRI of the Liver: A Practical Guide

With 2300 radiological images dispersed throughout the text, this source provides an expansive armamentarium of case studies and examples showcasing both common and uncommon liver pathologies. Serving as an unparalleled how-to source for the investigation of liver disease by MRI, this guide demonstrates key MRI techniques currently utilized...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

unlimited object storage image
Result Page: 618 617 616 615 614 613 612 611 610 609 608 607 606 605 604 603 602 601 600 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy