Home | Amazing | Today | Tags | Publishers | Years | Search 
Representations and Techniques for 3D Object Recognition & Scene Interpretation
Representations and Techniques for 3D Object Recognition & Scene Interpretation

3D scene understanding and object recognition are among the grandest challenges in computer vision. A wide variety of techniques and goals, such as structure from motion, optical flow, stereo, edge detection, and segmentation, could be viewed as subtasks within scene understanding and recognition. Many of these applicable methods are...

Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the...

The Elements of User Experience: User-Centered Design for the Web and Beyond (2nd Edition)
The Elements of User Experience: User-Centered Design for the Web and Beyond (2nd Edition)

From the moment it was published almost ten years ago, Elements of User Experience became a vital reference for web and interaction designers the world over, and has come to define the core principles of the practice. Now, in this updated, expanded, and full-color new edition, Jesse James Garrett has refined his...

Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Mastering Microsoft SharePoint Foundation 2010
Mastering Microsoft SharePoint Foundation 2010

This book is intended for IT administrators to get a handle on SharePoint Foundation and is an update of Mastering Windows SharePoint Services 3.0. It is meant to be used both as a reference for overworked network administrators who don’t have a lot of time to spare slogging through articles and forums, and as a cover-to-cover...

LinkedIn For Dummies
LinkedIn For Dummies

Relationships matter. Ever since the dawn of time, when caveman Fred asked caveman Barney whether there was any work down at the quarry, human beings have always networked. We’re social creatures who like to reach out and talk to someone. As the Internet developed and grew in popularity, people rapidly took advantage of this new...

Understanding IBM SOA Foundation Suite: Learning Visually with Examples
Understanding IBM SOA Foundation Suite: Learning Visually with Examples

The IBM SOA Foundation Suite is an integrated, open-standards-based set of software, best practices, and patterns that help you systematically maximize the business value of SOA. Understanding IBM SOA Foundation Suite brings together 26 hands-on tutorials that will help you master IBM SOA Foundation and apply it successfully...

Magento 1.3 Theme Design
Magento 1.3 Theme Design
Magento is the hottest and most powerful e-commerce software around and it has gained massive popularity in a short period. By using Magento's powerful theming engine, you can control the look, content, and functionality, and easily launch a flexible e-commerce web site. However, because of its powerful features, developing Magento themes is easier...
Field Confirmation Testing for Suspicious Substances
Field Confirmation Testing for Suspicious Substances
Frequently a substance found at a port of entry, waste site, laboratory triage facility, or even in a hazardous materials emergency will be labeled and purportedly identified. But law enforcement and other first responders cannot take this claim at face value, as the accuracy is not confirmed and must be verified. A comprehensive handbook for...
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
With the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive...
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy