Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nonnegative Matrix and Tensor Factorizations: Applications to Exploratory Multi-way Data Analysis and Blind Source Separation
Nonnegative Matrix and Tensor Factorizations: Applications to Exploratory Multi-way Data Analysis and Blind Source Separation
This book provides a broad survey of models and efficient algorithms for Nonnegative Matrix Factorization (NMF). This includes NMF’s various extensions and modifications, especially Nonnegative Tensor Factorizations (NTF) and Nonnegative Tucker Decompositions (NTD). NMF/NTF and their extensions are increasingly used as tools in signal and...
Siege: Trump Under Fire
Siege: Trump Under Fire

Michael Wolff, author of the bombshell bestseller Fire and Fury, once again takes us inside the Trump presidency to reveal a White House under siege.

Just one year into Donald Trump’s term as president, Michael Wolff told the electrifying story of a White House consumed by controversy, chaos, and...

Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 1 (Lecture Notes in Networks and Systems)
Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 1 (Lecture Notes in Networks and Systems)

This book presents a remarkable collection of chapters that cover a wide range of topics in the areas of information and communication technologies and their real-world applications. It gathers the Proceedings of the Future of Information and Communication Conference 2019 (FICC 2019), held in San Francisco, USA from March 14 to 15,...

The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
What do Einstein's theory of relativity, string theory, and lots of other mind-bending—and space-bending—revelations of modern physics have in common? None of them could have been discovered until scientists and mathematicians recognized an uncomfortable truth—that there was a reason the world's greatest mathematical minds had...
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011

Over the last few decades, energy minimization methods have become an established paradigm to resolve a variety of challenges in the fields of computer vision and pattern recognition. While traditional approaches to computer vision were often based on a heuristic sequence of processing steps and merely allowed a very limited...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)
Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)

Humans receive the great majority of information about their environment through sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key component for building artificial systems that can perceive and understand their environment. Computer vision is likely to change society in many ways; for example, it...

The Crucible of Consciousness: An Integrated Theory of Mind and Brain
The Crucible of Consciousness: An Integrated Theory of Mind and Brain
There are lots of books on consciousness being published these days, and I end up skimming most of them and reading a few of them. Reading somebody else’s take on the whole set of issues is often frustrating and depressing: they just don’t get it. Other times it is tantalizing; they start on the right foot, in other words, where I...
Mobile Commerce Applications
Mobile Commerce Applications
Today, various m-commerce applications are increasingly enhancing enterprises' abilities to offer mobile services that are easily accessed by a mobile device anytime and anywhere. With the unique advantages of emerging mobile communications and wireless technologies, m-commerce applications are generally used to fulfill some tasks that are not...
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011

This volume of Springer Lecture Notes in Computer Sciences (LNCS) constitutes the final publication of the EU COST 2101 Action “Biometrics for Identity Documents and Smart Cards,” which has been successfully running during the years 2006-2010. One of the many valuable outputs of this initiative is the realization of a new...

Tissue and Organ Regeneration in Adults
Tissue and Organ Regeneration in Adults

Tissue engineering is the first discipline of bioengineering which explicitly integrates molecular biology with physics and chemistry. It emphasizes research in the synthesis of new tissues and organs in vivo and in vitro. The treatment is uniform and deliberately directed toward the different backgrounds of students from the physical and...

Result Page: 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy