Home | Amazing | Today | Tags | Publishers | Years | Search 
Advances in Artificial Intelligence -- IBERAMIA 2004: 9th Ibero-American Conference on AI, Puebla, Mexico, November 22-26, 2004
Advances in Artificial Intelligence -- IBERAMIA 2004: 9th Ibero-American Conference on AI, Puebla, Mexico, November 22-26, 2004
This book constitutes the refereed proceedings of the 9th Ibero-American Conference on Artificial Intelligence, IBERAMIA 2004, held in Puebla, Mexico in November 2004.

The 97 revised full papers presented were carefully reviewed and selected from 304 submissions. The papers are organized in topical sections on distributed AI and multi-agent...

Wavelet Image and Video Compression (The Springer International Series in Engineering and Computer Science)
Wavelet Image and Video Compression (The Springer International Series in Engineering and Computer Science)
`This is a very well-organized and useful reference book for those who are new to wavelet image and video coding.'
Journal of Electronic Imaging, 9:2 (2000)

An exciting new development has taken place in the digital era that has captured the imagination and talent of
...
Database Modeling and Design: Logical Design, 4th Edition (Data Management Systems)
Database Modeling and Design: Logical Design, 4th Edition (Data Management Systems)
Database systems and database design technology have undergone significant evolution in recent years. The relational data model and relational database systems dominate business applications; in turn, they are extended by other technologies like data warehousing, OLAP, and data mining. How do you model and design your database application in...
Hedge Fund Course (Wiley Finance)
Hedge Fund Course (Wiley Finance)
A self-study course that reviews the technical and quantitative knowledge necessary to properly manage a hedge fund Today, traditional asset managers are looking to develop their own hedge funds as alternative offerings to their clients. Hedge Fund Course presents all the technical and quantitative knowledge necessary to run a leveraged investment...
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
The Internet, or the ARPANET in its original name, was a remarkable idea. The Net was designed in the late 60's by US ARPA (Advanced Research Projects Agency) to connect distant computers to each other. This was a critical need at a time when each computer was a precious resource of computing power, which, if connected, could be shared among...
Test and Analysis of Web Services
Test and Analysis of Web Services
The service-oriented approach has become more and more popular, now allowing highly integrated and yet heterogeneous applications. Web services are the natural evolution of conventional middleware technologies to support Web-based and enterprise-level integration.

The highly dynamic characteristics of service-oriented applications means...

Information Modelling and Knowledge Bases XV (Frontiers in Artificial Intelligence and Applications)
Information Modelling and Knowledge Bases XV (Frontiers in Artificial Intelligence and Applications)
This book provides research communities in Europe and Japan with an overview of scientific results and experiences achieved using innovative methods and approaches in computer science and other disciplines, which have a common interest in understanding and solving problems on information modelling and knowledge bases, as well as applying the...
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions...

Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis...

Foundations of GTK+ Development (Expert's Voice in Open Source)
Foundations of GTK+ Development (Expert's Voice in Open Source)
GTK+ is one of the most influential graphical toolkits for the Linux operating system. It is the technology upon which the GNOME and XFCE desktop environments are based, and it's crucial to have clear understanding of its complexities to build even a simple Linux desktop application. Foundations of GTK+ Development guides you through these...
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

The Communications Handbook, Second Edition (Electrical Engineering Handbook)
The Communications Handbook, Second Edition (Electrical Engineering Handbook)
For more than six years, The Communications Handbook stood as the definitive, one-stop reference for the entire field. With new chapters and extensive revisions that reflect recent technological advances, the second edition is now poised to take its place on the desks of engineers, researchers, and students around the world. From fundamental...
Result Page: 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy