Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Material Appearance Modeling: A Data-Coherent Approach
Material Appearance Modeling: A Data-Coherent Approach

A principal aim of computer graphics is to generate images that look as real as photographs. Realistic computer graphics imagery has however proven to be quite challenging to produce, since the appearance of materials arises from complicated physical processes that are difficult to analytically model and simulate, and image-based modeling of...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Spatio-temporal Networks: Modeling and Algorithms (SpringerBriefs in Computer Science)
Spatio-temporal Networks: Modeling and Algorithms (SpringerBriefs in Computer Science)
Spatio-temporal networks (STN)are spatial networks whose topology and/or attributes change with time. These are encountered in many critical areas of everyday life such as transportation networks, electric power distribution grids, and social networks of mobile users. STN modeling and computations raise significant challenges. The model must...
Machine Learning for Mobile: Practical guide to building intelligent mobile applications powered by machine learning
Machine Learning for Mobile: Practical guide to building intelligent mobile applications powered by machine learning

Leverage the power of machine learning on mobiles and build intelligent mobile applications with ease

Key Features

  • Build smart mobile applications for Android and iOS devices
  • Use popular machine learning toolkits such as Core ML and TensorFlow Lite
  • Explore...
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Architect and deploy a Power BI solution. This book will help you understand the many available options and choose the best combination for hosting, developing, sharing, and deploying a Power BI solution within your organization.

Pro Power BI Architecture provides detailed examples and explains...
Visual Saliency: From Pixel-Level to Object-Level Analysis
Visual Saliency: From Pixel-Level to Object-Level Analysis
This book provides an introduction to recent advances in theory, algorithms and application of Boolean map distance for image processing. Applications include modeling what humans find salient or prominent in an image, and then using this for guiding smart image cropping, selective image filtering, image segmentation, image matting, etc....
Database Programming with JDBC and Java
Database Programming with JDBC and Java

Java and databases make a powerful combination. Getting the two sides to work together, however, takes some effort--largely because Java deals in objects while most databases do not.

This book describes the standard Java interfaces that make portable object-oriented access to relational databases possible and offers a robust
...

Information Architecture with XML: A Management Strategy
Information Architecture with XML: A Management Strategy
In the ‘good old days’ before food labelling, sell-by dates and competitive brand promotion,
you placed yourself at the mercy of your local village store manager. After the
painful wait for the previous customer to bid his farewells and finally let attention turn
your way, you placed your trust in the nice old guy who
...
Open Source Development with CVS
Open Source Development with CVS
The need for a modern source-code management strategy in the distributed open-source community is paramount. The benevolent dictatorship model of open-source maintainers is only quasi-stable, but it is far better than the other extreme: the chaos of democratic code development.

The best available compromise is the concurrent versioning system...

Inverse Problem Theory and Methods for Model Parameter Estimation
Inverse Problem Theory and Methods for Model Parameter Estimation
‘Tarantola's book is undoubtedly the most important work on probabilistic inverse theory. It presents a complete theory where a physical parameter is represented, not by a number, but by a probability distribution.’ Klaus Mosegaard, Niels Bohr Institute

The use of actual observations to infer the properties of a
...
American Cars 1946-1959: Every Model, Year by Year
American Cars 1946-1959: Every Model, Year by Year

From the resumption of automobile production at the close of World War II through the 1950s, the American auto industry would see the births and deaths of several manufacturers, great technological advances, and an era of dramatic styling as a prospering nation asserted its growing mobility. Cars of this period are among the most iconic...

Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)
Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)

The history of database research over the past 30 years is one of exceptional productivity that has led to the database system becoming arguably the most impor tant development in the field of software engineering- The database is now the underlying framework of the information system, and has fundamentally changed the way many...

unlimited object storage image
Result Page: 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy