Home | Amazing | Today | Tags | Publishers | Years | Search 
Phakic Intraocular Lenses: Principles and Practice
Phakic Intraocular Lenses: Principles and Practice

Phakic intraocular lenses are innovative devices that provide the ability to correct extreme levels of myopia, nearsightedness, and astigmatism that other modalities have been unsuccessful correcting.

As these devices are increasingly gaining popularity internationally, it has become equally important for a reference to...

Probabilistic Reasoning in Multiagent Systems: A Graphical Models Approach
Probabilistic Reasoning in Multiagent Systems: A Graphical Models Approach
This book investigates the opportunities in building intelligent decision support systems offered by multiagent distributed probabilistic reasoning.

Probabilistic reasoning with graphical models, also known as Bayesian networks or belief networks, has become an active field of research and practice in artificial intelligence, operations...

Opengl Superbible: The Complete Guide to Opengl Programming for Windows Nt and Windows 95
Opengl Superbible: The Complete Guide to Opengl Programming for Windows Nt and Windows 95

Welcome to OpenGL SuperBible! The first time I ever heard of OpenGL was at the 1992 Win32 Developers Conference in San Francisco. Windows NT 3.1 was in early beta (or late alpha) and many vendors were present, pledging their future support for this exciting new platform. Among them was a company called Silicon Graphics, Inc. (SGI)....

Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Information Systems: The State of the Field (John Wiley Series in Information Systems)
Information Systems: The State of the Field (John Wiley Series in Information Systems)
The information systems field has contributed greatly to the rise of the information economy and the information society. Yet, after more than a quarter-century since its formation, it still is plagued by doubts about its identity and legitimacy. Information Systems: The State of the Field contains the reflections of leading IS scholars on...
Nuclear Import and Export in Plants and Animals
Nuclear Import and Export in Plants and Animals
The nucleus is perhaps the most complex organelle of the cell. The wide range of functions of the cell nucleus and its molecular components include packaging and maintaining the integrity of the cellular genetic material, generating messages to the protein synthesis machinery of the cell, assembling ribosome precursors and delivering them to the...
Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Determining the identity of a person is becoming critical in our vastly interconnected
information society. As increasing number of biometrics-based identification systems
are being deployed for many civilian and forensic applications, biometrics and its
applications have evoked considerable interest. The current state of affairs is
...
Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Biometrics: Identity Verification in a Networked World
Biometrics: Identity Verification in a Networked World

An in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment

No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce...

Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing
Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing

Interactive curve modeling techniques and their applications are extremely useful in a number of academic and industrial settings, and specifically play a significant role in multidisciplinary problem solving, such as in font design, designing objects, CAD/CAM, medical operations, scientific data visualization, virtual reality, character...

 
Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy