Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Managing and Mining Uncertain Data (Advances in Database Systems)
Managing and Mining Uncertain Data (Advances in Database Systems)

Uncertain data management has seen a revival in interest in recent years because of a number of new fields which utilize this kind of data. For example, in fields such as privacy-preserving data mining, additional errors may be added to data in order to mask the identity of the records. Often the data may be imputed using statistical methods...

Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
With the rapid increase of computational powers and availability of modern sensing, analysis and rendering equipment and technologies, computers are becoming more and more intelligent. Many research projects and commercial products have demonstrated the capability for a computer to interact with human in a natural way by looking at...
Elliptic and Parabolic Equations Involving the Hardy-Leray Potential (De Gruyter Nonlinear Analysis and Applications)
Elliptic and Parabolic Equations Involving the Hardy-Leray Potential (De Gruyter Nonlinear Analysis and Applications)
The scientific literature on the Hardy-Leray inequality, also known as the uncertainty principle, is very extensive and scattered. The Hardy-Leray potential shows an extreme spectral behavior and a peculiar influence on diffusion problems, both stationary and evolutionary. In this book, a big part of the scattered knowledge about these different...
Sex Magicians: The Lives and Spiritual Practices of Paschal Beverly Randolph, Aleister Crowley, Jack Parsons, Marjorie Cameron, Anton LaVey, and Others
Sex Magicians: The Lives and Spiritual Practices of Paschal Beverly Randolph, Aleister Crowley, Jack Parsons, Marjorie Cameron, Anton LaVey, and Others
An in-depth look at the lives and occult practices of 12 influential practitioners of sex magic from the 19th century to the present day

• Explores the background and sexual magical beliefs of Paschal Beverly Randolph, Ida Craddock, Aleister Crowley, Maria de Naglowska, Austin Osman Spare, Julius Evola, Franz Bardon,
...
Mining Intelligence and Knowledge Exploration: 7th International Conference, MIKE 2019, Goa, India, December 19–22, 2019, Proceedings (Lecture Notes in Computer Science, 11987)
Mining Intelligence and Knowledge Exploration: 7th International Conference, MIKE 2019, Goa, India, December 19–22, 2019, Proceedings (Lecture Notes in Computer Science, 11987)

This book constitutes the refereed conference proceedings of the 7th International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2019, held in Goa, India, in December 2019.

The 31 full papers were carefully reviewed and selected from 83 submissions. The accepted papers were chosen on the basis of...

Networking Wireless Sensors
Networking Wireless Sensors
With its origins in the early nineties, the subject of wireless sensor networks
has seen an explosive growth in interest in both academia and industry. In just
the past five years several hundred papers have been written on the subject. I
have written this book because I believe there is an urgent need to make this vast...
Fundamentals of Sensor Network Programming: Applications and Technology
Fundamentals of Sensor Network Programming: Applications and Technology

Sensor processing is a central and an important problem in aerospace/defense, automation, medical imaging, and robotics, to name only a few areas. A surveillance system used in aerospace and defense is an example of a sensor processing system. It uses devices such as infrared sensors, microwave radars, and laser radars that are...

Genetic Programming: An Introduction (The Morgan Kaufmann Series in Artificial Intelligence)
Genetic Programming: An Introduction (The Morgan Kaufmann Series in Artificial Intelligence)

Since the early 1990s, genetic programming (GP)-a discipline whose goal is to enable the automatic generation of computer programs-has emerged as one of the most promising paradigms for fast, productive software development. GP combines biological metaphors gleaned from Darwin's theory of evolution with computer-science approaches drawn...

Visualization of Time-Oriented Data (Human-Computer Interaction Series)
Visualization of Time-Oriented Data (Human-Computer Interaction Series)
Time is an exceptional dimension.We recognize this every day: when we are waiting for a train, time seems to run at a snail’s pace, but the hours we spend in a bar with a good friend pass by so quickly. There are times when one can wait endlessly for something to happen, and there are times when one is overwhelmed by events...
Artificial General Intelligence (Cognitive Technologies)
Artificial General Intelligence (Cognitive Technologies)

This is the first book on current research on artificial general intelligence (AGI), work explicitly focused on engineering general intelligence – autonomous, self-reflective, self-improving, commonsensical intelligence. Each author explains a specific aspect of AGI in detail in each chapter, while also investigating the common themes in...

Statistical and Machine Learning Approaches for Network Analysis (Wiley Series in Computational Statistics)
Statistical and Machine Learning Approaches for Network Analysis (Wiley Series in Computational Statistics)

Explore the multidisciplinary nature of complex networks through machine learning techniques

Statistical and Machine Learning Approaches for Network Analysis provides an accessible framework for structurally analyzing graphs by bringing together known and novel approaches on graph classes and graph measures for...

unlimited object storage image
Result Page: 95 94 93 92 91 90 89 88 87 86 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy