Home | Amazing | Today | Tags | Publishers | Years | Search 
Intelligent Multimedia Databases and Information Retrieval: Advancing Applications and Technologies
Intelligent Multimedia Databases and Information Retrieval: Advancing Applications and Technologies
The decreasing costs of consumer electronic devices such as digital cameras and digital camcorders, along with the ease of transportation facilitated by the Internet, has lead to a phenomenal rise in the amount of multimedia data. Now multimedia data comprising of images, audio, and video is becoming increasingly common. Given that...
Gamers at Work: Stories Behind the Games People Play
Gamers at Work: Stories Behind the Games People Play

For nearly four decades, video games have captured the imaginations and drawn the ire of people around the world. Actors play them. Rappers promote them. Politicians want to control them. Even baseball legends make them. Video games are a cultural crossroads where business, entertainment, and technology converge.

Sales of
...

Robotic Micro-Assembly
Robotic Micro-Assembly
This book deals with the current methods developed around the world on robotic microassembly. It is dedicated to Master’s and Ph.D. students, and also scientists and engineers involved in microrobotics and also in robotics. As robotic microassembly is a new way to manufacture microelectromechanical systems (MEMS),...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Recommender Systems Handbook
Recommender Systems Handbook

The explosive growth of e-commerce and online environments has made the issue of information search and selection increasingly serious; users are overloaded by options to consider and they may not have the time or knowledge to personally evaluate these options. Recommender systems have proven to be a valuable way for online users to cope with...

Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Creating Striking Graphics with Maya and Photoshop
Creating Striking Graphics with Maya and Photoshop
Welcome to Creating Striking Graphics with Maya and Photoshop and the cutting edge of photo-realistic and surrealistic design. If you’re a Photoshop artist coming to this book, sit back and enjoy the ride. The intent of the book is not to overwhelm you with technical details, but to help ease you into the world of Maya...
Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Embedded systems are electronic systems that include a microprocessor to perform certain specific tasks. The microprocessor is embedded or hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny chips come out of factories like Freescale, Microchip, Philips, Texas Instruments, and Mitsubishi,...
MCSA/MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide (70-291)
MCSA/MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide (70-291)
Microsoft’s Microsoft Certified Systems Administrator (MCSA) and Microsoft Certified Systems Engineer (MCSE) tracks for Windows Server 2003 are the premier certifications for computer industry professionals. Covering the core technologies around which Microsoft’s future will be built, this program provides powerful...
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Within the last 15 years in the field of “sputtering by particle bombardment” several new and important results have been published in internal reports, in PhD thesis, as well as in the open literature. This relates especially to a more detailed understanding of the sputtering process by computational means such as...
Multimedia Semantics: Metadata, Analysis and Interaction
Multimedia Semantics: Metadata, Analysis and Interaction
Digital multimedia items can be found on most electronic equipment ranging from mobile phones and portable audiovisual devices to desktop computers. Users are able to acquire, create, store, send, edit, browse, and render through such content at an increasingly fast rate. While it becomes easier to generate and store data, it also...
Introduction to Hardware Security and Trust
Introduction to Hardware Security and Trust
As technology feature size of devices and interconnects shrink at the rate predicted by Moore’s law, gate density and design complexity on single integrated chip (IC) keep increasing in recent decades. The close to nanoscale fabrication process introduces more manufacturing errors. New failure mechanisms that are not covered...
Result Page: 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy