Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers,...
Advances in Biometrics: Sensors, Algorithms and Systems
Advances in Biometrics: Sensors, Algorithms and Systems

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. From simply logging on to a laptop to crossing the border of a country, biometrics is being called upon to meet the growing challenges of identity management.

With contributions from academia and...

Statistical Methods for Health Sciences, Second Edition
Statistical Methods for Health Sciences, Second Edition
…although the book is apparently intended for non-statisticians, it covers material well beyond an introductory course.
Biometrics, Vol. 56, No. 2, June 2000

Building upon material presented in the first edition, Statistical Methods for Health Sciences, Second Edition continues to address the analytical issues
...
Combinatorial Image Analysis: 12th International Workshop, IWCIA 2008, Buffalo, NY, USA, April 7-9, 2008, Proceedings
Combinatorial Image Analysis: 12th International Workshop, IWCIA 2008, Buffalo, NY, USA, April 7-9, 2008, Proceedings
This volume constitutes the refereed proceedings of the 12th International Workshop on Combinatorial Image Analysis, IWCIA 2008, held in Buffalo, NY, USA, in April 2008.

The 28 revised full papers and 10 revised poster papers presented were carefully reviewed and selected from 117 initial submissions. The papers are organized in topical...

Meta-Algorithmics: Patterns for Robust, Low Cost, High Quality Systems
Meta-Algorithmics: Patterns for Robust, Low Cost, High Quality Systems

The confluence of cloud computing, parallelism and advanced machine intelligence approaches has created a world in which the optimum knowledge system will usually be architected from the combination of two or more knowledge-generating systems. There is a need, then, to provide a reusable, broadly-applicable set of design patterns to empower...

Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
The past decade has seen a rapid growth in the demand for biometric-based authentication solutions for a number of applications. With significant advances in biometric technology and an increase in the number of applications incorporating biometrics, it is essential that we bring together researchers from academia and industry as well as...
Biometrics
Biometrics
Several years ago, several biometric industry analysts, an author of this book included, regularly appeared at annual conferences to speak on the future of biometrics and proclaimed:

“1997 is the Year of Biometrics.”

The following year, the pronouncement became:

“1998 is the Year of
...
Handbook of Face Recognition
Handbook of Face Recognition

Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...

Multimedia Databases and Image Communication - Proceedings of the Workshop on MDIC 2004 (Software Engineering and Knowledge Engineering)
Multimedia Databases and Image Communication - Proceedings of the Workshop on MDIC 2004 (Software Engineering and Knowledge Engineering)

There is a strong need for advances in the fields of image indexing and retrieval and visual query languages for multimedia databases. Image technology is facing both classical and novel problems for the organization and filtering of increasingly large amounts of pictorial data. Novel kinds of problems, such as indexing and high-level...

Advanced CISSP Prep Guide: Exam Q & A
Advanced CISSP Prep Guide: Exam Q & A

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,...

Encyclopedia of Biometrics (Springer Reference)
Encyclopedia of Biometrics (Springer Reference)

The Encyclopedia of Biometrics provides a comprehensive reference to concepts, technologies, issues, and trends in the field of biometrics. The volume covers all important aspects – research, development, and applications, including biometric sensors and devices, methods and algorithms, sample quality, system design and...

unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy