Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Visual Perception and Robotic Manipulation: 3D Object Recognition, Tracking and Hand-Eye Coordination
Visual Perception and Robotic Manipulation: 3D Object Recognition, Tracking and Hand-Eye Coordination
As autonomous robots expand into the service domain, new solutions to the challenge of operating in domestic environments must be developed. Widespread adoption of service robots demands high robustness to environmental change and operational wear, and minimal reliance on application specific knowledge. As such, rich sensing modalities such as...
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis

Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves...

Robotic Mapping and Exploration (Springer Tracts in Advanced Robotics)
Robotic Mapping and Exploration (Springer Tracts in Advanced Robotics)
"Robotic Mapping and Exploration" is an important contribution in the area of simultaneous localization and mapping  (SLAM) for autonomous robots, which has been receiving a great deal of attention by the research community in the latest few years. The contents are focused on the autonomous mapping learning problem. Solutions...
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms (Princeton Series in Applied Mathematics)
Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms (Princeton Series in Applied Mathematics)
This book covers its subject very thoroughly. The framework the authors have established is very elegant and, if it catches on, this book could be the primary reference for this approach. I don't know of any other book that covers this set of topics.
(Richard M. Murray, California Institute of Technology )

This...

Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

Hadoop: The Definitive Guide
Hadoop: The Definitive Guide

Discover how Apache Hadoop can unleash the power of your data. This comprehensive resource shows you how to build and maintain reliable, scalable, distributed systems with the Hadoop framework -- an open source implementation of MapReduce, the algorithm on which Google built its empire. Programmers will find details for analyzing...

Handbook of Power System Engineering
Handbook of Power System Engineering

Maintaining the reliable and efficient generation, transmission and distribution of electrical power is of the utmost importance in a world where electricity is the inevitable means of energy acquisition, transportation, and utilization, and the principle mode of communicating media. Our modern society is entirely dependent on electricity, so...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication
Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication

A mixture of theory, experiments, and simulations that provide qualitative and quantitative insights into the technology

The important new technology of wireless sensor and actuator networks provides radically new communication and networking paradigms with many new applications. Wireless Sensor and Actuator Networks...

Industrial Power Engineering Handbook (Newnes Power Engineering Series)
Industrial Power Engineering Handbook (Newnes Power Engineering Series)
Never before has so much ground been covered in a single volume reference source. This five-part work is sure to be of great value to students, technicians and practicing engineers as well as equipment designers and manufacturers, and should become their one-stop shop for all information needs in this subject area.

This book will be of
...
Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy