Home | Amazing | Today | Tags | Publishers | Years | Search 
Meta-Algorithmics: Patterns for Robust, Low Cost, High Quality Systems
Meta-Algorithmics: Patterns for Robust, Low Cost, High Quality Systems

The confluence of cloud computing, parallelism and advanced machine intelligence approaches has created a world in which the optimum knowledge system will usually be architected from the combination of two or more knowledge-generating systems. There is a need, then, to provide a reusable, broadly-applicable set of design patterns to empower...

Fabricated: The New World of 3D Printing
Fabricated: The New World of 3D Printing

Fabricated tells the story of 3D printers, humble manufacturing machines that are bursting out of the factory and into homes, businesses, schools, kitchens, hospitals, even the fashion catwalk. The magic happens when you plug a 3D printer into today's mind-boggling digital technologies. Add to that the Internet, tiny, low cost...

Sparse Representations and Compressive Sensing for Imaging and Vision (SpringerBriefs in Electrical and Computer Engineering)
Sparse Representations and Compressive Sensing for Imaging and Vision (SpringerBriefs in Electrical and Computer Engineering)

Compressed sensing or compressive sensing is a new concept in signal processing where one measures a small number of non-adaptive linear combinations of the signal.  These measurements are usually much smaller than the number of samples that define the signal.  From these small numbers of measurements, the signal is then...

Applications of Algebra to Communications, Control, and Signal Processing (SpringerBriefs in Computer Science)
Applications of Algebra to Communications, Control, and Signal Processing (SpringerBriefs in Computer Science)

Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in the fields of error-control codes and cryptography. More recently, broader applications have emerged, requiring quite sophisticated algebra - for example, the Alamouti scheme in MIMO...

Pattern Recognition: An Algorithmic Approach (Undergraduate Topics in Computer Science)
Pattern Recognition: An Algorithmic Approach (Undergraduate Topics in Computer Science)
Our main aim in writing this book is to make the concepts of pattern recognition clear to undergraduate and postgraduate students of the subject. We will not deal with pre-processing of data. Rather, assuming that patterns are represented using some appropriate pre-processing techniques in the form of vectors of numbers, we will...
Multimedia Databases and Image Communication - Proceedings of the Workshop on MDIC 2004 (Software Engineering and Knowledge Engineering)
Multimedia Databases and Image Communication - Proceedings of the Workshop on MDIC 2004 (Software Engineering and Knowledge Engineering)

There is a strong need for advances in the fields of image indexing and retrieval and visual query languages for multimedia databases. Image technology is facing both classical and novel problems for the organization and filtering of increasingly large amounts of pictorial data. Novel kinds of problems, such as indexing and high-level...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III
Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III

The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereed proceedings of the 6th International Symposium on Visual Computing, ISVC 2010, held in Las Vegas, NV, USA, in November/December 2010. The 93 revised full papers and 73 poster papers presented together with 44 full and 6 poster papers of 7 special tracks were...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
Biometrics, Computer Security Systems and Artificial Intelligence Applications
Biometrics, Computer Security Systems and Artificial Intelligence Applications
This book presents the most recent achievements in the field of a very fast developing Computer Science. It is a very fascinating science, which still encompasses a number of uncovered areas of study with urgent problems to be solved. Therefore, thousands of scientists are dealing with it elaborating on more and more practical and efficient...
Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy