 |
|
|
 Robot Manipulator Control: Theory and Practice (Control Engineering, 15)
Discloses the elements of control theory and robot dynamics. Surveys computed-torque control, robust control of robotic manipulators, adaptive control of robotic manipulators, neural network control of robots, force control, and advanced control techniques. Includes information on designing and operating robotic platforms in discussing robot... |  |  Dictionaries in Early Modern Europe: Lexicography and the Making of Heritage
Dictionaries tell stories of many kinds. The history of dictionaries, of how they were produced, published and used, has much to tell us about the language and the culture of the past. This monumental work of scholarship draws on published and archival material to survey a wide range of dictionaries of western European languages (including... |  |  Oracle Fusion Middleware Patterns
Enterprise Architecture is seldom simplistic enough to be built on a single technology - it generally encompasses a wide array of technologies, including SOA, Identity Management, Business Intelligence, Performance Management, Web 2.0, Content Management, BPM, Distributed caching, Data Integration, and Application Server.
What are... |
|
 Sun Web Server: The Essential Guide
The authoritative, comprehensive guide to Sun Web Server 7.0
Sun Web Server is the secure web serving platform of choice for large-scale enterprises in industries from finance and telecommunications to travel and government. Now there’s a... |  |  Managing and Mining Uncertain Data (Advances in Database Systems)
Uncertain data management has seen a revival in interest in recent years because of a number of new fields which utilize this kind of data. For example, in fields such as privacy-preserving data mining, additional errors may be added to data in order to mask the identity of the records. Often the data may be imputed using statistical methods... |  |  Understanding Voice over IP Security (Artech House Telecommunications Library)
VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which... |
|
 |  |  Handbook of Face Recognition
Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances... |  |  Web Form Design: Filling in the Blanks
Forms make or break the most crucial online interactions: checkout, registration, and any task requiring information entry. In Web Form Design, Luke Wroblewski draws on original research, his considerable experience at Yahoo! and eBay, and the perspectives of many of the field's leading designers to show you everything you need to know... |
|
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |