|
|
|
|
| | Restricted Kalman Filtering: Theory, Methods, and Application (SpringerBriefs in Statistics)
In this book, I highlight the developments in Kalman filtering subject to general linear constraints. Essentially, the material to be presented is almost entirely based on the results and examples originally developed in Pizzinga et al. (2008a), Cerqueira et al. (2009), Pizzinga (2009, 2010), Souza et al. (2011), Pizzinga et al. (2011), and... | | |
|
|
|
User Interface Design for Mere Mortals(TM)The growth of personal computing in the past two decades of the 20th century put a new emphasis on user interface design. As part of user interface design, companies began to focus on the usability of a product. The term usability has its roots in the 14th century, but as computing technology became prevalent in the 1980s, the definition... | | Terrorism Informatics: Knowledge Management and Data Mining for Homeland SecurityTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are... | | |
|
|
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 |