Home | Amazing | Today | Tags | Publishers | Years | Search 
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Visual Basic 2008 Recipes: A Problem-Solution Approach
Visual Basic 2008 Recipes: A Problem-Solution Approach
Sometimes you just need to solve a problem and get on with your work. To that end, Visual Basic 2008 Recipes is a compendium of practical solutions for busy VB .NET programmers. Create time for the more interesting aspects of your VB .NET project by solving common problems with the practical solutions and dozens of code examples in this...
End User Computing Challenges and Technologies: Emerging Tools and Applications (Premier Reference Source)
End User Computing Challenges and Technologies: Emerging Tools and Applications (Premier Reference Source)
Advances in information technologies have allowed end users to become a fundamental element in the development and application of computing technology and digital information.

End User Computing Challenges & Technologies: Emerging Tools & Applications examines practical research and case studies on such benchmark topics...

How to Do Everything with Your iPAQ Pocket PC
How to Do Everything with Your iPAQ Pocket PC
Now you can do more with your HP iPAQ Pocket PC than you ever thought possible. Use this step-by-step guide to discover all the essentials about your iPAQ and put it to work with a thorough exploration of its hardware, software, and accessories. Learn how to use your iPAQ as a portable entertainment station for music, movies and games. Find out how...
Digital Document Processing: Major Directions and Recent Advances (Advances in Pattern Recognition)
Digital Document Processing: Major Directions and Recent Advances (Advances in Pattern Recognition)
In this book, all the major and frontier topics in the field of document analysis are brought together into a single volume creating a unique reference source.

Highlights include:

- Document structure analysis followed by OCR of Japanese, Tibetan and Indian printed scripts.

- Online and offline handwritten text recognition...

The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
Analyzing Receiver Operating Characteristic Curves With SAS (Sas Press Series)
Analyzing Receiver Operating Characteristic Curves With SAS (Sas Press Series)
As a diagnostic decision-making tool, receiver operating characteristic (ROC) curves provide a comprehensive and visually attractive way to summarize the accuracy of predictions. They are extensively used in medical diagnosis and increasingly in fields such as data mining, credit scoring, weather forecasting, and psychometry. In this example-driven...
System Software Reliability (Springer Series in Reliability Engineering)
System Software Reliability (Springer Series in Reliability Engineering)
Computer software reliability has never been more important. Today, computers are employed in areas as diverse as air traffic control, nuclear reactors, aircraft, real-time military, industrial process control, security system control, biometric scan-systems, automotive, mechanical and safety control, and hospital patient monitoring systems. Many...
Encyclopedia of Mobile Computing and Commerce
Encyclopedia of Mobile Computing and Commerce
Nowadays, mobile communication, mobile devices, and mobile computing are widely available. Everywhere people are carrying mobile devices, such as mobile phones. The availability of mobile communication networks has made a huge impact to various applications, including commerce. Consequently, there is a strong relationship between mobile computing...
Unconstrained Face Recognition (International Series on Biometrics)
Unconstrained Face Recognition (International Series on Biometrics)
Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a...
Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

Image Processing: Principles and Applications
Image Processing: Principles and Applications
Image processing—from basics to advanced applications

Learn how to master image processing and compression with this outstanding state-of-the-art reference. From fundamentals to sophisticated applications, Image Processing: Principles and Applications covers multiple topics and provides a fresh perspective on future directions and...

Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy