Home | Amazing | Today | Tags | Publishers | Years | Search 
Multimodal Interactive Pattern Recognition and Applications
Multimodal Interactive Pattern Recognition and Applications

Our interest in human–computer interaction started with our participation in the TT2 project (“Trans–Type-2”, 2002–2005—http://www.tt2.atosorigin.es), funded by the European Union (EU) and coordinated by Atos Origin, which dealt with the development of statistical-based technologies for computer...

Linear Programming and Network Flows
Linear Programming and Network Flows

Linear Programming deals with the problem of minimizing or maximizing a linear function in the presence of linear inequalities. Since the development of the simplex method by George B. Dantzig in 1947, linear programming has been extensively used in the military, industrial, governmental, and urban planning fields, among others. The...

Biomedical Applications of Proteomics
Biomedical Applications of Proteomics

In medicine, as in any other life sciences discipline, research should start by raising a question (hypothesis) to solve a problem. Then the scientist should select the most appropriated method(s) to answer the question and solve the dilemma. The obtained intermediate and final results may answer the question or may raise additional...

Chemical Engineering Fluid Mechanics, Revised and Expanded
Chemical Engineering Fluid Mechanics, Revised and Expanded

The objectives of this book are twofold: (1) for the student, to show how the fundamental principles underlying the behavior of fluids (with emphasis on one-dimensional macroscopic balances) can be applied in an organized and systematic manner to the solution of practical engineering problems, and (2) for the practicing engineer, to...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Algorithm-Architecture Matching for Signal and Image Processing
Algorithm-Architecture Matching for Signal and Image Processing

Advances in signal and image processing together with increasing computing power are bringing mobile technology closer to applications in a variety of domains like automotive, health, telecommunication, multimedia, entertainment and many others. The development of these leading applications, involving a large diversity of algorithms...

Geeks and Geezers
Geeks and Geezers
We were drawn to thinking and then ultimately writing about geeks and geezers from very different starting points. Coauthoring a book isn’t quite like synchronized swimming. It’s more like gaining perspective and depth through incongruity. Through writing and arguing in what seemed like endless and percussive...
Windows Azure Platform
Windows Azure Platform
In the past couple of years, cloud computing has emerged as a disruptive force in the information technology (IT) industry. Its impact is of the same magnitude as the Internet and offshoring. Gartner Research has identified cloud computing as one of the “top 10 disruptive technologies 2008–2012.” According to...
Object-Oriented Software Engineering Using UML, Patterns, and Java (3rd Edition)
Object-Oriented Software Engineering Using UML, Patterns, and Java (3rd Edition)

The K2 towers at 8,611 meters in the Karakorum range of the western Himalayas. It is the second highest peak of the world and is considered the most difficult 8000er to climb. An expedition to the K2 typically lasts several months in the summer, when the weather is most favorable. Even in summer, snowstorms are frequent....

Google+ For Dummies
Google+ For Dummies
Chances are you’re one of the 750 million or so users of Facebook, or maybe you’ve tried Twitter or another social network. Google has responded to the lively interest in social networking with one of its own called Google+ (also known as “Google Plus” or even just “g+”), and Google+ is...
America's Secret Establishment: An Introduction to the Order of Skull & Bones
America's Secret Establishment: An Introduction to the Order of Skull & Bones
The book began with an anonymous donation to the author of an 8-inch package of documents in the early 1980s. Nothing less than the membership list and supporting documents for a truly secret society the Yale Skull and Bones.

The late Johnny Johnson, of Phoenix Arizona was the spark that moved me to write first a
...
Carbon-Carbon Materials and Composites
Carbon-Carbon Materials and Composites
Carbon-carbon composites, which have been used extensively for missile applications, were a part of NASA's Apollo spacecraft heat shield system. The development of carbon-carbon materials began in 1958 and was nurtured under the U.S. Air Force space plane program, Dyna-Soar, and by numerous thermal protection systems...
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy