Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)

The authors survey a recent technique in computer vision called Interactive Co-segmentation, which is the task of simultaneously extracting common foreground objects from multiple related images. They survey several of the algorithms, present underlying common ideas, and give an overview of applications of object co-segmentation.

We
...
Geometric Algebra: An Algebraic System for Computer Games and Animation
Geometric Algebra: An Algebraic System for Computer Games and Animation

In my first book on geometric algebra in 2007 the preface described how I had been completely surprised by the existence of geometric algebra, especially after having recently completed a book on vector analysis where it was not even mentioned! So why am I writing a second book on the same subject?Well it’s not because I have...

Telescope Optics : Complete Manual for Amateur Astronomers
Telescope Optics : Complete Manual for Amateur Astronomers
The authors gratefully acknowledge the help of Klaas Compaan, who was our advisor during the writing of this book. He guarded us against a number of errors and unclarities and also allowed us to publish the data for some of the new optical systems he has designed.

We received further support from Richard Berry, our editor. He invested a
...
Franchising & Licensing: Two Powerful Ways to Grow Your Business in Any Economy
Franchising & Licensing: Two Powerful Ways to Grow Your Business in Any Economy
It is hard to believe that nearly 15 years have passed since the publication of
the first edition of Franchising & Licensing in 1991. The impact of technology
and globalization has had a permanent effect on the dynamics of the franchise
relationship. When the manuscript was being written for the first edition
in the late
...
Race, Class, and the Death Penalty: Capital Punishment in American History
Race, Class, and the Death Penalty: Capital Punishment in American History

No scholarly effort is ever conducted without heavy indebtedness to others. This is particularly true of efforts that rest as heavily as this one does upon data collection efforts carried out by others. Our largest debt is, of course, to M. Watt Espy. Without his continuing effort, this study would have been impossible. We are profoundly...

Enterprise JavaBeans 3.0 (5th Edition)
Enterprise JavaBeans 3.0 (5th Edition)

This book explains and demonstrates the fundamentals of the EJB 3.0 and Java Persistence programming models. Although EJB makes application development much simpler, it is still a complex technology that requires a great deal of time and study to master. This book provides a straightforward, no-nonsense explanation of the...

Manuscript Verse Collectors and the Politics of Anti-Courtly Love Poetry
Manuscript Verse Collectors and the Politics of Anti-Courtly Love Poetry
This book reappraises the work of early-seventeenth-century collectors of English Renaissance poetry in manuscript. The verse miscellanies, or poetry anthologies, of these collectors have long attracted the attention of literary editors looking for texts by individual, major authors, and they have more recently interested historians for their poems...
The Rohonc Code: Tracing a Historical Riddle
The Rohonc Code: Tracing a Historical Riddle

First discovered in a Hungarian library in 1838, the Rohonc Codex keeps privileged company with some of the most famous unsolved writing systems in the world, notably the Voynich manuscript, the Phaistos Disk, and Linear A. Written entirely in cipher, this 400-year-old, 450-page-long, richly illustrated manuscript initially gained...

Born Of The Night (The League)
Born Of The Night (The League)

Kidnapped by merciless marauders who threaten her father's planetary kingdom, princess Kiara is rescued by a masked stranger known as Nemesis, a renegade assassin and warrior-soldier who has sworn to protect the innocent. Original.

Best-selling author Sherrilyn Kenyon (The Dark-Hunter novels) restores three out-of-print titles in...

Assessment of Aphasia
Assessment of Aphasia
This book is addressed to the practicing speech clinician and neuropsychologist dealing with aphasic adults and children, as well as with children who have delayed or disordered language development. It is also written as a primary or ancillary text in graduate courses dealing with the assessment of speech and language problems. To...
Integrated Circuit and System Design. Power and Timing Modeling, Optimization, and Simulation
Integrated Circuit and System Design. Power and Timing Modeling, Optimization, and Simulation

Welcome to the proceedings of the 20th International Workshop on Power and TimingModeling, Optimization and Simulations, PATMOS 2010. Over the years, PATMOS has evolved into an important European event, where researchers from both industry and academia discuss and investigate the emerging challenges in future and contemporary applications,...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy