 |
|
 Information Visualization in Data Mining and Knowledge Discovery
Mainstream data mining techniques significantly limit the role of human reasoning and insight. Likewise, in data visualization, the role of computational analysis is relatively small. The power demonstrated individually by these approaches to knowledge discovery suggests that somehow uniting the two could lead to increased efficiency and more... |  |  Real-Time Volume Graphics
IN TRADITIONAL COMPUTER GRAPHICS, 3D objects are created using highlevel
surface representations such as polygonal meshes, NURBS (nonuniform
rational B-spline) patches, or subdivision surfaces. Using this modeling
paradigm, visual properties of surfaces, such as color, roughness, and
reflectance, are described by means of a shading... |  |  |
|
 LinkedIn For Dummies
Relationships matter. Ever since the dawn of time, when caveman Fred asked caveman Barney whether there was any work down at the quarry, human beings have always networked. We’re social creatures who like to reach out and talk to someone. As the Internet developed and grew in popularity, people rapidly took advantage of this new... |  |  Code: The Hidden Language of Computer Hardware and Software
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with each other. And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological... |  |  Encyclopedia of Cryptology
Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that... |
|
|
|
Result Page: 216 215 214 213 212 211 210 209 208 207 206 205 204 |