Home | Amazing | Today | Tags | Publishers | Years | Search 
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
With the rapid increase of computational powers and availability of modern sensing, analysis and rendering equipment and technologies, computers are becoming more and more intelligent. Many research projects and commercial products have demonstrated the capability for a computer to interact with human in a natural way by looking at...
Web Page Recommendation Models: Theory and Algorithms (Synthesis Lectures on Data Management)
Web Page Recommendation Models: Theory and Algorithms (Synthesis Lectures on Data Management)

One of the application areas of data mining is the World Wide Web (WWW or Web), which serves as a huge, widely distributed, global information service for every kind of information such as news, advertisements, consumer information, financial management, education, government, e-commerce, health services, and many other information services....

Advancements in Distributed Computing and Internet Technologies: Trends and Issues
Advancements in Distributed Computing and Internet Technologies: Trends and Issues
The concept of the Internet has been a tremendous success by this time. Other than being a great source of fun and enjoyment, millions of people around the world rely on the Internet for various tasks related to their livelihoods. The overwhelming growth of the Internet and its users is now a reality, which has put new thoughts...
Programming Your Home: Automate with Arduino, Android, and Your Computer (Pragmatic Programmers)
Programming Your Home: Automate with Arduino, Android, and Your Computer (Pragmatic Programmers)
Welcome to the exciting, empowering world of home automation! If you have ever wanted your home to do more than just protect you against the outside elements and want to interface it to the digital domain, this book will show you how. By demonstrating several easy-to-build projects, you will be able to take the skills you learned from this...
Grading Knowledge: Extracting Degree Information from Texts
Grading Knowledge: Extracting Degree Information from Texts
If you are sitting in a basement room without a view — not to mention the bars in front of the windows — and writing a book, then you better have good company. I had the best company you could imagine. Waltraud Hiltl, Katja Markert, Martin Romacker, Klemens Schnattinger, Andreas Klee and I shared very little office...
Artificial Intelligence in Recognition and Classification of Astrophysical and Medical Images (Studies in Computational Intelligence)
Artificial Intelligence in Recognition and Classification of Astrophysical and Medical Images (Studies in Computational Intelligence)
During the past decade digital imaging has significantly progressed in all imaging areas ranging from medicine, pharmacy, chemistry, biology to astrophysics, meteorology and geophysics. The avalanche of digitized images produced a need for special techniques of processing and knowledge extraction from many digital images with...
Handbook of Swarm Intelligence: Concepts, Principles and Applications (Adaptation, Learning, and Optimization)
Handbook of Swarm Intelligence: Concepts, Principles and Applications (Adaptation, Learning, and Optimization)
Swarm Intelligence is a collection of nature-inspired algorithms under the big umbrella of evolutionary computation. They are population based algorithms. A population of individuals (potential candidate solutions) cooperating among themselves and statistically becoming better and better over generations and eventually finding (a)...
Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Integrating Microelectronics into Gas Distribution
Integrating Microelectronics into Gas Distribution

This volume contains papers presented at the first and second IGT symposia on microelectronics in the gas industry. The first was held November 18–20, 1985, in Orlando, Florida. The second symposium was held September 8–10, 1986, in Fontana, Wisconsin.

The purpose of these symposia was to disseminate information on...

Designing Management Information Systems
Designing Management Information Systems

Management information systems produce the information that managers use to make important strategic decisions. They formthe basis for management reports, both financial and non-financial, and as such they are a vital component of modern business management. Few managerial decisions are taken without consulting the data captured by...

CCNA Cisco Certified Network Associate Study Guide, includes CD-ROM: Exam 640-802
CCNA Cisco Certified Network Associate Study Guide, includes CD-ROM: Exam 640-802

Welcome to the exciting world of Cisco certification! You have picked up this book because you want something better—namely, a better job with more satisfaction. Rest assured that you have made a good decision. Cisco certification can help you get your first networking job or more money and a...

Introduction to Information Systems: Supporting and Transforming Business
Introduction to Information Systems: Supporting and Transforming Business

Rainer, Cegielski Introduction to Information Systems will answer this question for you. In every chapter, you will see how real global businesses use technology and information systems to increase their profitability, gain market share, improve their customer service, and manage their daily operations. In other words, information...

Result Page: 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy