 |
|
 Meta-Algorithmics: Patterns for Robust, Low Cost, High Quality Systems
The confluence of cloud computing, parallelism and advanced machine intelligence approaches has created a world in which the optimum knowledge system will usually be architected from the combination of two or more knowledge-generating systems. There is a need, then, to provide a reusable, broadly-applicable set of design patterns to empower... |  |  Fabricated: The New World of 3D Printing
Fabricated tells the story of 3D printers, humble manufacturing machines that are bursting out of the factory and into homes, businesses, schools, kitchens, hospitals, even the fashion catwalk. The magic happens when you plug a 3D printer into today's mind-boggling digital technologies. Add to that the Internet, tiny, low cost... |  |  |
|
|
 Guide to Tactical Perimeter Defense
This course is the official courseware for the Security Certified Program SC0-451
certification exam. The Tactical Perimeter Defense course is designed to provide
network administrators and certification candidates with hands-on tasks on the
most fundamental perimeter security technologies. The network perimeter is often
the first... |  |  Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III
The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereed proceedings of the 6th International Symposium on Visual Computing, ISVC 2010, held in Las Vegas, NV, USA, in November/December 2010. The 93 revised full papers and 73 poster papers presented together with 44 full and 6 poster papers of 7 special tracks were... |  |  Biometric Recognition: Challenges and Opportunities
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric... |
|
 |  |  |  |  Biometrics, Computer Security Systems and Artificial Intelligence ApplicationsThis book presents the most recent achievements in the field of a very fast developing Computer Science. It is a very fascinating science, which still encompasses a number of uncovered areas of study with urgent problems to be solved. Therefore, thousands of scientists are dealing with it elaborating on more and more practical and efficient... |
|
Result Page: 8 7 6 5 4 3 2 1 |