"Dr. Shubu Mukherjee's book is a welcome surprise: books by architecture leaders in major companies are few and far between. Written from the viewpoint of a working engineer, the book describes sources of soft errors and solutions involving device, logic, and architecture design to reduce the effects of soft errors." - Max Baron,...
Image registration is the process of finding correspondence between all points in
two images of a scene. This correspondence is required in stereo depth perception,
3-D scene reconstruction, object detection and recognition, change detection, image
fusion, object tracking and motion analysis. Analysis of two or more images of a...
We've all sneaked the odd five minutes here or there playing the latest Flash game that someone sent round the office, but creating those games is trickier than it looks. The aim of Foundation Game Design with Flash is to take you, even if you've minimal multimedia or programming experience, through a series of step-by-step examples and detailed...
Computer vision is the science and technology of making machines that see.
It is concerned with the theory, design and implementation of algorithms that
can automatically process visual data to recognize objects, track and recover
their shape and spatial layout.
The International Computer Vision Summer School - ICVSS was...
A self-contained approach to DSP techniques and applications in radar imaging
The processing of radar images, in general, consists of three major fields: Digital Signal Processing (DSP); antenna and radar operation; and algorithms used to process the radar images. This book brings together material from these different areas to allow readers to...
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an...
The lower cost and increased flexibility and availability of computer networks means that they are rapidly replacing centralized 'mainframes'. The implementation of networked systems and the control of applications running in them require, however, the design of new techniques and methods: collectively known as distributed algorithms....
Object tracking is a broad and important fi eld in computer science, addressing
the most different applications in the educational, entertainment, industrial,
and manufacturing areas. Since the early days of computer vision, the state of
the art of visual object tracking has evolved greatly, along with the available
imaging devices...
The chapters in this volume were presented at the July–August 2006 NATO
Advanced Study Institute on Imaging for Detection and Identification. The
conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious
Tuscany region of northern Italy. For the eighth time we gathered at this
idyllic spot to explore and...
Pass the CISSP and ISSEP exams with this new edition of the bestselling prep guide!
The U.S. government has mandated that all contractors–nearly all current CISSPs, and those yet to be certified as CISSPs–attain the security engineering subject certification Information Systems Security Engineering Professional (ISSEP). The ISSEP...