Home | Amazing | Today | Tags | Publishers | Years | Search 
Intelligent Multimedia Data Hiding: New Directions (Studies in Computational Intelligence)
Intelligent Multimedia Data Hiding: New Directions (Studies in Computational Intelligence)
This book presents the latest research in the area of multimedia data hiding paradigms. The book is divided into four parts and an appendix. The first part introduces multimedia signal processing and information hiding techniques. It includes multimedia representation, need for multimedia, digital watermarking fundamentals and requirements of...
RibbonX For Dummies (Computer/Tech)
RibbonX For Dummies (Computer/Tech)
Includes coding examples and sample conversion programs!

Create VBA, VB.NET, and C# custom applications with this radical new interface

Are you ready to tackle RibbonX? This friendly, plain-English guide gives you the tips and techniques you need to design and implement Ribbon...

Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access...
Dungeons & Dragons  Dummies
Dungeons & Dragons Dummies
Caught in traffic. Trapped in a cubicle. Stuck in a rut.  Tangled up in red tape.

In the real world, sometimes you feel powerless—but not in Dungeons & Dragons (D & D). In this fantasy-adventure, you have all kinds of special powers. You can slay the evil dragon, overcome the orc or the ogre, haunt the...

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Due diligence conducted around technology decisions is complex. Done correctly, it has the power to enable outstanding positive outcomes; done poorly, it can wreak havoc on organizations, corporate cultures, and markets.

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors...

More than a Game: The Computer Game as Fictional Form
More than a Game: The Computer Game as Fictional Form
Taking its cue from practices of reading texts in literary and cultural studies, this book considers the computer game as a new and emerging mode of contemporary storytelling. In a carefully organized study, Barry Atkins discusses questions of narrative and realism in four of the most significant games of the last decade: Tomb Raider,...
Pro SQL Server 2008 Reporting Services
Pro SQL Server 2008 Reporting Services
At its core, the process of designing reports hasn’t changed substantially in the past 15 years. The report designer lays out report objects, which contain data from a known data source, in a design application such as Business Objects Reports or Microsoft Access. He or she then tests report execution, verifies the accuracy of the results,...
Crystal Reports 2008: The Complete Reference (Complete Reference Series)
Crystal Reports 2008: The Complete Reference (Complete Reference Series)

Your One-Stop Guide to Enterprise Reporting with Crystal Reports 2008

Transform disconnected corporate data into compelling, interactive business intelligence using all of the powerful tools available in Crystal Reports 2008. Through detailed explanations, real-world examples, and expert advice, this comprehensive guide...

Transactions on Rough Sets VIII (Lecture Notes in Computer Science)
Transactions on Rough Sets VIII (Lecture Notes in Computer Science)
The LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical and mathematical foundations, through all aspects of rough set theory and its applications, such as data mining, knowledge discovery, and intelligent information processing, to relations between rough sets and other approaches to...
Parallel and Distributed Processing and Applications: Second International Symposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings
Parallel and Distributed Processing and Applications: Second International Symposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings
This book constitutes the refereed proceedings of the Second International Symposium on Parallel and Distributed Processing and Applications, ISPA 2004, held in Hong Kong, China in December 2004.

The 78 revised full papers and 38 revised short papers presented were carefully reviewed and selected from 361 submissions. The papers are organized...

Crime Mapping Case Studies: Practice and Research
Crime Mapping Case Studies: Practice and Research
Crime Mapping Case Studies: From Research to Practice provides a series of key examples from practice and research that demonstrate applications of crime mapping and its effect in many areas of policing and crime reduction. This book brings together case studies that show how crime mapping can be used for analysis,...
Tagging: People-powered Metadata for the Social Web (Voices That Matter)
Tagging: People-powered Metadata for the Social Web (Voices That Matter)
Tagging is fast becoming one of the primary ways people organize and manage digital information. Tagging complements traditional organizational tools like folders and search on users desktops as well as on the web. These developments mean that tagging has broad implications for information management, information architecture and interface design....
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy