Dave Eberly's 3D Game Engine Design was the first professional guide to the essential concepts and algorithms of real-time 3D engines and quickly became a classic of game development. Dave's new book 3D Game Engine Architecture continues the tradition with a comprehensive look at the software engineering and...
This title collects refereed papers submitted to the Third Solar Image Processing Workshop, (6-8 September, 2006, Trinity College Dublin, Ireland). The workshop brought together researchers in image processing and solar physics to focus on the challenges presented by new ground-based and space-based instrumentation. Topics covered include image...
This highly anticipated new edition provides a comprehensive account of face recognition research and technology, spanning the full range of topics needed for designing operational face recognition systems. After a thorough introductory chapter, each of the following chapters focus on a specific topic, reviewing background information,...
The Universal Serial Bus (USB) specification is a boon for users in that it makes the process of connecting peripherals to computers effortless, in most cases. As is often the case with user-friendliness, though, the cosmetic ease comes about as a result of behind-the-scenes complexity. USB Design by Example explains what USB means to...
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...
Windows Phone certainly held the hot spot at the world-class consumer electronics event,
the International CES in January 2012. Microsoft CEO Steve Ballmer said, “The past year has
really been about the whole push to build what can clearly be the strong third ecosystem in
the smartphone market, with a very differentiated...
This book is intended as a text/reference for students, researchers, and professors interested in physical and biomedical applications of Magnetic Resonance Imaging (MRI). Both the theoretical and practical aspects of MRI are emphasized. The book begins with a comprehensive discussion of the Nuclear Magnetic Resonance (NMR) phenomenon based...
In the context of systems and control, incomplete information refers to a dynamical system in which knowledge about the system states is limited due to the difficulties in modelling complexity in a quantitative way. The well-known types of incomplete information include parameter uncertainties and norm-bounded nonlinearities. Recently, in...
Build your own sophisticated modular home security system using the popular Raspberry Pi board
About This Book
This book guides you through building a complete home security system with Raspberry Pi and helps you remotely access it from a mobile device over the Internet
The battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to...