Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand

The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...

International Symposium on History of Machines and Mechanisms (Hmm Symposium)
International Symposium on History of Machines and Mechanisms (Hmm Symposium)
The HMM2004 International Symposium on History of Machines and Mechanisms is the second event of a series that has been started in 2000 as main activity of the IFToMM Permanent Commission for History of MMS, Mechanism and Machine Science. The aim of the HMM Symposium is to be a forum to exchange views, opinions, and experiences...
Modern Database Management (10th Edition)
Modern Database Management (10th Edition)
This text is designed to be used with an introductory course in database management. Such a course is usually required as part of an information systems curriculum in business schools, computer technology programs, and applied computer science departments. The Association for Information Systems (AIS), the Association for...
Classification, Clustering, and Data Mining Applications: Proceedings
Classification, Clustering, and Data Mining Applications: Proceedings
This book presents some of the key research undertaken by the members of the International Federation of Classification Societies during the two years since our last symposium. If the past is a guide to the future, these papers contain the seeds of new ideas that will invigorate our field.

The editors are grateful
...
Modeling Decision for Artificial Intelligence: 8th International Conference, MDAI 2011
Modeling Decision for Artificial Intelligence: 8th International Conference, MDAI 2011

This volume contains papers presented at the 8th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2011), held in Changsha, China, July 28-30. This conference followed MDAI 2004 (Barcelona, Catalonia, Spain),MDAI 2005 (Tsukuba, Japan),MDAI 2006 (Tarragona,Catalonia, Spain), MDAI 2007 (Kitakyushu,...

Steel Designers' Manual
Steel Designers' Manual

At the instigation of the Iron and Steel Federation, the late Bernard Godfrey began work in 1952 on the first edition of the Steel Designers’ Manual. As principal author he worked on the manuscript almost continuously for a period of two years. On many Friday evenings he would meet with his co-authors, Charles Gray, Lewis Kent...

Cisco Unified Presence Fundamentals (Networking Technology: IP Communications)
Cisco Unified Presence Fundamentals (Networking Technology: IP Communications)

Unified Communications and Collaboration is on the so-called “Hot List” in any forum wherein people are discussing communications and ways to better stay in touch. This book is aimed at explaining the concepts, ideas, and capabilities behind Presence, which is likely one of the least understood and most underestimated features in...

Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia
Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia

This volume collects the proceedings of two related international conferences on foundations and practical applications of mathematical methods of data analysis, of Formal Concept Analysis and of methods for information extraction from natural language texts. The first conference, named Knowledge - Ontology - Theory 2007 (KONT 2007),...

Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now involves some...

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

Story Circle: Digital Storytelling Around the World
Story Circle: Digital Storytelling Around the World
Everyone loves a story. Not everyone loves a computer. ‘Digital storytelling’ is a workshop-based practice in which people are taught to use digital media to create short audio-video stories, usually about their own lives, placing the universal human delight in narrative and self expression into the hands of everyone, bringing a...
GlassFish Security
GlassFish Security

Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.

Learn to secure Java EE...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy