Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developments in Speech Synthesis
Developments in Speech Synthesis
Contemporary speech synthesis is perceived as inadequate for general adoption for user interaction, largely because it rests on an inadequate model of human speech production and perception. This book reviews the underlying model, brings out areas of inadequacy and suggests how improvements might be made. It is argued that a greater understanding...
ASIC and FPGA Verification : A Guide to Component Modeling (The Morgan Kaufmann Series in Systems on Silicon)
ASIC and FPGA Verification : A Guide to Component Modeling (The Morgan Kaufmann Series in Systems on Silicon)
Today it is still very difficult to verify board or larger system designs through simulation or any other technique. This important book addresses the largest ingredient needed to make simulation possiblethe availability of integrated circuit component models. Addressed inside is how to use VITAL extensions and other conventions with VHDL to...
Coding Places: Software Practice in a South American City (Acting with Technology)
Coding Places: Software Practice in a South American City (Acting with Technology)

Software development would seem to be a quintessential example of today's Internet-enabled "knowledge work"--a global profession not bound by the constraints of geography. In Coding Places, Yuri Takhteyev looks at the work of software developers who inhabit two contexts: a geographical area--in this case, greater Rio de...

Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project

Projects--especially complex ones--are inherently risky. Between time constraints, technical challenges, and resource issues, things can easily go wrong--making the identification of potential risks an essential component of every project manager's job. Fully updated and consistent with the Risk Management Professional (RMP) certification...

Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
Virtual Crowds: Methods, Simulation, and Control (Synthesis Lectures on Computer Graphics and Animation)
Virtual Crowds: Methods, Simulation, and Control (Synthesis Lectures on Computer Graphics and Animation)
There are many applications of computer animation and simulation where it is necessary to model virtual crowds of autonomous agents. Some of these applications include site planning, education, entertainment, training, and human factors analysis for building evacuation. Other applications include simulations of scenarios where masses of people...
Algorithm-Architecture Matching for Signal and Image Processing
Algorithm-Architecture Matching for Signal and Image Processing

Advances in signal and image processing together with increasing computing power are bringing mobile technology closer to applications in a variety of domains like automotive, health, telecommunication, multimedia, entertainment and many others. The development of these leading applications, involving a large diversity of algorithms...

Fuzzy Stochastic Multiobjective Programming (International Series in Operations Research & Management Science)
Fuzzy Stochastic Multiobjective Programming (International Series in Operations Research & Management Science)

Although studies on multiobjective mathematical programming under uncertainty have been accumulated and several books on multiobjective mathematical programming under uncertainty have been published (e.g., Stancu-Minasian (1984); Slowinski and Teghem (1990); Sakawa (1993); Lai and Hwang (1994); Sakawa (2000)), there seems to be no book which...

Online Storage Systems and Transportation Problems with Applications: Optimization Models and Mathematical Solutions
Online Storage Systems and Transportation Problems with Applications: Optimization Models and Mathematical Solutions
This book covers the analysis and development of online algorithms
involving exact optimization and heuristic techniques, and their application
to solve two real life problems.

The first problem is concerned with a complex technical system: a
special carousel based high-speed storage system - Rotastore. It is shown...
Handbook of Cosmetic Science and Technology, Third Edition
Handbook of Cosmetic Science and Technology, Third Edition

Thanks to the contribution of leading experts in cosmetology, the first editions of the Handbook were successful and received excellent reviews. The editors appreciate the excellent author contributions.

The first edition, published in 2001, reviewed the multiple facets of the cosmetic field including the physiology of...

Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
In everyday life, we often come in contact with compressed signals: when using mobile telephones, mp3 players, digital cameras, or DVD players. The signals in each of these applications, telephone-band speech, high fidelity audio signal, and still or video images are not only sampled and quantized to put them into a form suitable for...
Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems
Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems

When creating real-time and embedded (RTE) systems, there is no room for error. The nature of the final product demands that systems be powerful, efficient, and highly reliable. The constraints of processor and memory resources add to this challenge. Sophisticated developers rely on design patterns—proven solutions to...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy