Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
3D Game Engine Architecture: Engineering Real-Time Applications with Wild Magic
3D Game Engine Architecture: Engineering Real-Time Applications with Wild Magic
Dave Eberly's 3D Game Engine Design was the first professional guide to the essential concepts and algorithms of real-time 3D engines and quickly became a classic of game development. Dave's new book 3D Game Engine Architecture continues the tradition with a comprehensive look at the software engineering and...
Solar Image Analysis and Visualization
Solar Image Analysis and Visualization
This title collects refereed papers submitted to the Third Solar Image Processing Workshop, (6-8 September, 2006, Trinity College Dublin, Ireland). The workshop brought together researchers in image processing and solar physics to focus on the challenges presented by new ground-based and space-based instrumentation. Topics covered include image...
Handbook of Face Recognition
Handbook of Face Recognition

This highly anticipated new edition provides a comprehensive account of face recognition research and technology, spanning the full range of topics needed for designing operational face recognition systems. After a thorough introductory chapter, each of the following chapters focus on a specific topic, reviewing background information,...

Multimedia Programming with Pure Data
Multimedia Programming with Pure Data

A comprehensive guide for digital artists for creating rich interactive multimedia applications using Pure Data

Overview

  • Carefully organized topics for interactive multimedia professional practice
  • Detailed reference to a large collection of resources in the open source communities to...
USB Design by Example: A Practical Guide to Building I/O Devices
USB Design by Example: A Practical Guide to Building I/O Devices
The Universal Serial Bus (USB) specification is a boon for users in that it makes the process of connecting peripherals to computers effortless, in most cases. As is often the case with user-friendliness, though, the cosmetic ease comes about as a result of behind-the-scenes complexity. USB Design by Example explains what USB means to...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Handbook of Face Recognition
Handbook of Face Recognition

Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...

Windows Phone 7 XNA Cookbook
Windows Phone 7 XNA Cookbook
Windows Phone certainly held the hot spot at the world-class consumer electronics event, the International CES in January 2012. Microsoft CEO Steve Ballmer said, “The past year has really been about the whole push to build what can clearly be the strong third ecosystem in the smartphone market, with a very differentiated...
Magnetic Resonance Imaging: Physical Principles and Applications (Electromagnetism)
Magnetic Resonance Imaging: Physical Principles and Applications (Electromagnetism)

This book is intended as a text/reference for students, researchers, and professors interested in physical and biomedical applications of Magnetic Resonance Imaging (MRI). Both the theoretical and practical aspects of MRI are emphasized. The book begins with a comprehensive discussion of the Nuclear Magnetic Resonance (NMR) phenomenon based...

Filtering, Control and Fault Detection with Randomly Occurring Incomplete Information
Filtering, Control and Fault Detection with Randomly Occurring Incomplete Information

In the context of systems and control, incomplete information refers to a dynamical system in which knowledge about the system states is limited due to the difficulties in modelling complexity in a quantitative way. The well-known types of incomplete information include parameter uncertainties and norm-bounded nonlinearities. Recently, in...

Building a Home Security System with Raspberry Pi
Building a Home Security System with Raspberry Pi

Build your own sophisticated modular home security system using the popular Raspberry Pi board

About This Book

  • This book guides you through building a complete home security system with Raspberry Pi and helps you remotely access it from a mobile device over the Internet
  • It covers the...
Defend I.T. : Security by Example
Defend I.T. : Security by Example

The battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy