Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
What do Einstein's theory of relativity, string theory, and lots of other mind-bending—and space-bending—revelations of modern physics have in common? None of them could have been discovered until scientists and mathematicians recognized an uncomfortable truth—that there was a reason the world's greatest mathematical minds had...
Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Unsupervised Signal Processing: Channel Equalization and Source Separation
Unsupervised Signal Processing: Channel Equalization and Source Separation

Unsupervised Signal Processing: Channel Equalization and Source Separation provides a unified, systematic, and synthetic presentation of the theory of unsupervised signal processing. Always maintaining the focus on a signal processing-oriented approach, this book describes how the subject has evolved and assumed a wider scope...

Mathematical Methods and Algorithms for Signal Processing
Mathematical Methods and Algorithms for Signal Processing

Mathematical Methods and Algorithms for Signal Processing tackles the challenge of providing readers and practitioners with the broad tools of mathematics employed in modern signal processing. Building from an assumed background in signals and stochastic processes, the book provides a solid foundation in analysis, linear...

Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011

Over the last few decades, energy minimization methods have become an established paradigm to resolve a variety of challenges in the fields of computer vision and pattern recognition. While traditional approaches to computer vision were often based on a heuristic sequence of processing steps and merely allowed a very limited...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)
Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)

Humans receive the great majority of information about their environment through sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key component for building artificial systems that can perceive and understand their environment. Computer vision is likely to change society in many ways; for example, it...

The Crucible of Consciousness: An Integrated Theory of Mind and Brain
The Crucible of Consciousness: An Integrated Theory of Mind and Brain
There are lots of books on consciousness being published these days, and I end up skimming most of them and reading a few of them. Reading somebody else’s take on the whole set of issues is often frustrating and depressing: they just don’t get it. Other times it is tantalizing; they start on the right foot, in other words, where I...
Mobile Commerce Applications
Mobile Commerce Applications
Today, various m-commerce applications are increasingly enhancing enterprises' abilities to offer mobile services that are easily accessed by a mobile device anytime and anywhere. With the unique advantages of emerging mobile communications and wireless technologies, m-commerce applications are generally used to fulfill some tasks that are not...
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011

This volume of Springer Lecture Notes in Computer Sciences (LNCS) constitutes the final publication of the EU COST 2101 Action “Biometrics for Identity Documents and Smart Cards,” which has been successfully running during the years 2006-2010. One of the many valuable outputs of this initiative is the realization of a new...

Tissue and Organ Regeneration in Adults
Tissue and Organ Regeneration in Adults

Tissue engineering is the first discipline of bioengineering which explicitly integrates molecular biology with physics and chemistry. It emphasizes research in the synthesis of new tissues and organs in vivo and in vitro. The treatment is uniform and deliberately directed toward the different backgrounds of students from the physical and...

Result Page: 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy