 |
|
 Model-based Visual Tracking: The OpenTL Framework
Object tracking is a broad and important fi eld in computer science, addressing
the most different applications in the educational, entertainment, industrial,
and manufacturing areas. Since the early days of computer vision, the state of
the art of visual object tracking has evolved greatly, along with the available
imaging devices... |  |  Wireless Communications (Wiley - IEEE)
"Professor Andreas F. Molisch, renowned researcher and educator, has put together the comprehensive book, Wireless Communications. The second edition, which includes a wealth of new material on important topics, ensures the role of the text as the key resource for every student, researcher, and practitioner in the... |  |  Apple Pro Training Series: Aperture 3
Welcome to the official Apple Pro Training course for Aperture, the
powerful photo editing and management software from Apple. This
book includes a variety of real-world photography projects, which are
used as clear examples of the way Aperture works, from import and
organization to image editing and output.
Whether... |
|
 |  |  Supercharged JavaScript Graphics: with HTML5 canvas, jQuery, and More
With HTML5 and improved web browser support, JavaScript has become the tool of choice for creating high-performance web graphics. This faced-paced book shows you how to use JavaScript, jQuery, DHTML, and HTML5's Canvas element to create rich web applications for computers and mobile devices.
By following real-world... |  |  Disaster Recovery (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
 Guide to Tactical Perimeter Defense
This course is the official courseware for the Security Certified Program SC0-451
certification exam. The Tactical Perimeter Defense course is designed to provide
network administrators and certification candidates with hands-on tasks on the
most fundamental perimeter security technologies. The network perimeter is often
the first... |  |  Network Safety: Network5 Safety Certification
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Representations and Techniques for 3D Object Recognition & Scene Interpretation
3D scene understanding and object recognition are among the grandest challenges in computer
vision. A wide variety of techniques and goals, such as structure from motion, optical flow, stereo,
edge detection, and segmentation, could be viewed as subtasks within scene understanding and
recognition. Many of these applicable methods are... |
|
|
| Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 |