Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
Handbook of Discrete and Computational Geometry, Second Edition (Discrete Mathematics and Its Applications)
Handbook of Discrete and Computational Geometry, Second Edition (Discrete Mathematics and Its Applications)

While high-quality books and journals in this field continue to proliferate, none has yet come close to matching the Handbook of Discrete and Computational Geometry, which in its first edition, quickly became the definitive reference work in its field. But with the rapid growth of the discipline and the many advances made over the past seven...

Computer Vision in Advanced Control Systems-5: Advanced Decisions in Technical and Medical Applications (Intelligent Systems Reference Library)
Computer Vision in Advanced Control Systems-5: Advanced Decisions in Technical and Medical Applications (Intelligent Systems Reference Library)
The research book is a continuation of our previous books which are focused on the recent advances in computer vision methodologies and technical solutions using conventional and intelligent paradigms.

• Computer Vision in Control Systems—1, Mathematical Theory, ISRL Series, Volume 73, Springer-Verlag, 2015
...
Computational Linguistics and Intelligent Text Processing: 12th International Conference, CICLing 2011
Computational Linguistics and Intelligent Text Processing: 12th International Conference, CICLing 2011

CICLing 2011 was the 12th Annual Conference on Intelligent Text Processing and Computational Linguistics. The CICLing conferences provide a wide-scope forum for the discussion of the art and craft of natural language processing research as well as the best practices in its applications.

This set of two books contains four invited...

SDL Game Development: (Black & White)
SDL Game Development: (Black & White)

BLACK & WHITE EDITION

If you're good with C++ and object oriented programming, this book utilizes your skills to create 2D games using the Simple DirectMedia Layer API. Practical tutorials include the development of two wickedly good games.

Overview

  • Create 2D reusable games using...
Diagnostic Bacteriology Protocols (Methods in Molecular Biology)
Diagnostic Bacteriology Protocols (Methods in Molecular Biology)

The field of bacterial diagnostics has seen unprecedented advances in recent years. The increased need for accurate detection and identification of bacteria in human, animal, food, and environmental samples has fueled the development of new techniques. The field has seen extensive research aided by the information from bacterial genome...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Assessing the Accuracy of Remotely Sensed Data: Principles and Practices, Second Edition (Mapping Science)
Assessing the Accuracy of Remotely Sensed Data: Principles and Practices, Second Edition (Mapping Science)
The field of assessing the accuracy of maps derived from remotely sensed data has continued to develop and mature since the first edition of this book was published in 1999. The original eight chapters have been expanded to eleven. Of most significance is a new chapter that covers positional accuracy. The accuracy of any spatial data set is a...
Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Hyperspectral Data Processing: Algorithm Design and Analysis
Hyperspectral Data Processing: Algorithm Design and Analysis

Hyperspectral Data Processing: Algorithm Design and Analysis is a culmination of the research conducted in the Remote Sensing Signal and Image Processing Laboratory (RSSIPL) at the University of Maryland, Baltimore County. Specifically, it treats hyperspectral image processing and hyperspectral signal processing as separate subjects in...

Discovery Science: 7th International Conference, DS 2004, Padova, Italy, October 2-5, 2004. Proceedings (Lecture Notes in Computer Science)
Discovery Science: 7th International Conference, DS 2004, Padova, Italy, October 2-5, 2004. Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed proceedings of the 7th International Conference on Discovery Science, DS 2004, held in Padova, Italy in October 2004.

The 20 revised long papers and the 19 revised regular papers presented were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on pattern mining,...

Wireless Network Security (Signals and Communication Technology)
Wireless Network Security (Signals and Communication Technology)
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the...
unlimited object storage image
Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy