Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Document Processing: Major Directions and Recent Advances (Advances in Pattern Recognition)
Digital Document Processing: Major Directions and Recent Advances (Advances in Pattern Recognition)
In this book, all the major and frontier topics in the field of document analysis are brought together into a single volume creating a unique reference source.

Highlights include:

- Document structure analysis followed by OCR of Japanese, Tibetan and Indian printed scripts.

- Online and offline handwritten text recognition...

Biometrics For Dummies (Computer/Tech)
Biometrics For Dummies (Computer/Tech)
Biometric technology is a HOT topic. The most recent (ISC)2 Global Workforce Survey of over 7,500 security professionals from around the world have cited biometrics as the number one security project for organizations in North America, and the number two security project in the world overall.

Most companies aren’t using any form of
...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Machine Vision : Theory, Algorithms, Practicalities
Machine Vision : Theory, Algorithms, Practicalities
In the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists...
Encyclopedia of Espionage, Intelligence and Security
Encyclopedia of Espionage, Intelligence and Security
In composing The Encyclopedia of Espionage, Intelligence, and Security (EEIS), our goal was to shape a modern encyclopedia offering immediate value to our intended readers by emphasizing matters of espionage, intelligence, and security most frequently in the news.

EEIS is not intended as a classical “spy book,” filled with
...
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
Visual Basic 2008 Recipes: A Problem-Solution Approach
Visual Basic 2008 Recipes: A Problem-Solution Approach
Sometimes you just need to solve a problem and get on with your work. To that end, Visual Basic 2008 Recipes is a compendium of practical solutions for busy VB .NET programmers. Create time for the more interesting aspects of your VB .NET project by solving common problems with the practical solutions and dozens of code examples in this...
End User Computing Challenges and Technologies: Emerging Tools and Applications (Premier Reference Source)
End User Computing Challenges and Technologies: Emerging Tools and Applications (Premier Reference Source)
Advances in information technologies have allowed end users to become a fundamental element in the development and application of computing technology and digital information.

End User Computing Challenges & Technologies: Emerging Tools & Applications examines practical research and case studies on such benchmark topics...

How to Do Everything with Your iPAQ Pocket PC
How to Do Everything with Your iPAQ Pocket PC
Now you can do more with your HP iPAQ Pocket PC than you ever thought possible. Use this step-by-step guide to discover all the essentials about your iPAQ and put it to work with a thorough exploration of its hardware, software, and accessories. Learn how to use your iPAQ as a portable entertainment station for music, movies and games. Find out how...
Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

Unconstrained Face Recognition (International Series on Biometrics)
Unconstrained Face Recognition (International Series on Biometrics)
Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a...
Encyclopedia of Mobile Computing and Commerce
Encyclopedia of Mobile Computing and Commerce
Nowadays, mobile communication, mobile devices, and mobile computing are widely available. Everywhere people are carrying mobile devices, such as mobile phones. The availability of mobile communication networks has made a huge impact to various applications, including commerce. Consequently, there is a strong relationship between mobile computing...
Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy