 |
|
 Robot Manipulator Control: Theory and Practice (Control Engineering, 15)
Discloses the elements of control theory and robot dynamics. Surveys computed-torque control, robust control of robotic manipulators, adaptive control of robotic manipulators, neural network control of robots, force control, and advanced control techniques. Includes information on designing and operating robotic platforms in discussing robot... |  |  Dictionaries in Early Modern Europe: Lexicography and the Making of Heritage
Dictionaries tell stories of many kinds. The history of dictionaries, of how they were produced, published and used, has much to tell us about the language and the culture of the past. This monumental work of scholarship draws on published and archival material to survey a wide range of dictionaries of western European languages (including... |  |  Oracle Fusion Middleware Patterns
Enterprise Architecture is seldom simplistic enough to be built on a single technology - it generally encompasses a wide array of technologies, including SOA, Identity Management, Business Intelligence, Performance Management, Web 2.0, Content Management, BPM, Distributed caching, Data Integration, and Application Server.
What are... |
|
 Sun Web Server: The Essential Guide
The authoritative, comprehensive guide to Sun Web Server 7.0
Sun Web Server is the secure web serving platform of choice for large-scale enterprises in industries from finance and telecommunications to travel and government. Now there’s a... |  |  |  |  Active Directory Domain Services 2008 How-To
Need fast, reliable, easy-to-implement solutions for Microsoft Active Directory 2008? This book delivers exactly what you’re looking for. You’ll find nearly 250 tested, step-by-step procedures for planning, installing, customizing, and managing Active Directory Domain Services (AD DS) in any production... |
|
 Protecting SQL Server Data
For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.
These... |  |  Managing and Mining Uncertain Data (Advances in Database Systems)
Uncertain data management has seen a revival in interest in recent years because of a number of new fields which utilize this kind of data. For example, in fields such as privacy-preserving data mining, additional errors may be added to data in order to mask the identity of the records. Often the data may be imputed using statistical methods... |  |  Handbook of Face Recognition
Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances... |
|
|
| Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |