Home | Amazing | Today | Tags | Publishers | Years | Search 
Object Categorization: Computer and Human Vision Perspectives
Object Categorization: Computer and Human Vision Perspectives

The recognition of object categories has a rich history in computer vision. In the 1970s, generic object recognition systems sought to model and recognize objects based on their coarse, prototypical shape. These early systems employed complex 3-D models, which offered invariance to viewpoint (including image translation, rotation, and scale),...

Trust Management for Service-Oriented Environments
Trust Management for Service-Oriented Environments

The Web was originally created to enable the sharing of information among scientists. Sir Tim Berners-Lee first proposed the idea of creating a ?Web of information? when he suggested a solution to integrate three technologies: HTML (HyperText Markup Language), HTTP (HyperText Transfer Protocol), andWeb browsers [131]. HTML was proposed as a...

Digital Design for Computer Data Acquisition
Digital Design for Computer Data Acquisition

This digital electronics text focuses on "how to" design, build, operate and adapt data acquisition systems. The material begins with basic logic gates and ends with a 40 KHz voltage measurer. The approach aims to cover a minimal number of topics in detail. The data acquisition circuits described communicate with a host computer...

ASP.NET 3.5 Website Programming: Problem - Design - Solution
ASP.NET 3.5 Website Programming: Problem - Design - Solution

Dear reader, thanks for picking up this book, and welcome to the ASP.NET 3.5 Website Programming: Problem–Design–Solution, fully updated to ASP.NET version 3.5! The idea for this book was born in 2001, with ASP.NET 1.0, from the desire to have a book that teaches how to create real-world web sites. The fi rst edition was published...

Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009
Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale...

Technology-Supported Environments for Personalized Learning: Methods and Case Studies (Premier Reference Source)
Technology-Supported Environments for Personalized Learning: Methods and Case Studies (Premier Reference Source)

Responding to the specific needs of each student, personalized learning has the potential to refocus education on the individual rather than the institution. Technology-Supported Environments for Personalized Learning: Methods and Case Studies explores the metaphor of anytime and anywhere individual education as well as the idea of...

When the People Speak: Deliberative Democracy and Public Consultation
When the People Speak: Deliberative Democracy and Public Consultation

All over the world, democratic reforms have brought power to the people, but under conditions where the people have little opportunity to think about the power that they exercise. In this book, James Fishkin combines a new theory of democracy with actual practice and shows how an idea that harks back to ancient Athens can be used to revive...

Imagining the Tenth Dimension: A New Way of Thinking About Time and Space
Imagining the Tenth Dimension: A New Way of Thinking About Time and Space

Reality, today's physicists tell us, is created by the vibrations of exquisitely tiny superstrings in ten spatial dimensions. Ten dimensions? Most of us have barely gotten used to the idea that there are four.

Using simple geometry and an easygoing writing style, author Rob Bryanton starts with the lower dimensions that we are...

Sensor Networks: Where Theory Meets Practice (Signals and Communication Technology)
Sensor Networks: Where Theory Meets Practice (Signals and Communication Technology)

This book collects very recent results in the realm of sensor networking. In particular, it links the theory of sensor networking with practical and implementation aspects. Such, it highlights how sensor networking represents a very interesting research/application area, allowing a researcher to apply his theories and a practitioner to...

iPhone 3D Programming: Developing Graphical Applications with OpenGL ES
iPhone 3D Programming: Developing Graphical Applications with OpenGL ES

What does it take to build an iPhone app with stunning 3D graphics? This book will show you how to apply OpenGL graphics programming techniques to any device running the iPhone OS -- including the iPad and iPod Touch -- with no iPhone development or 3D graphics experience required. iPhone 3D Programming provides clear...

Adobe Coldfusion Anthology
Adobe Coldfusion Anthology

Adobe ColdFusion remains one of today’s significant Web Services tools and frameworks, and stands to become even more important as a possible primary tool for cloud development as well. As important as ColdFusion is and continues to become, we thought it would be a good idea to tap the leading authority on ColdFusion, the Fusion...

Augmented Reality using Appcelerator Titanium Starter
Augmented Reality using Appcelerator Titanium Starter
I first starting thinking about human/machine augmentations in 2000 when I started a company focused in the Telco software space. Initially, I focused on how to enable wireless content development, but at that time, devices were primitive. High speed networks hadn't fully taken on in many areas of the U.S. for mobile networks...
Result Page: 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy