Home | Amazing | Today | Tags | Publishers | Years | Search 
Advancements in Distributed Computing and Internet Technologies: Trends and Issues
Advancements in Distributed Computing and Internet Technologies: Trends and Issues
The concept of the Internet has been a tremendous success by this time. Other than being a great source of fun and enjoyment, millions of people around the world rely on the Internet for various tasks related to their livelihoods. The overwhelming growth of the Internet and its users is now a reality, which has put new thoughts...
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)

The authors survey a recent technique in computer vision called Interactive Co-segmentation, which is the task of simultaneously extracting common foreground objects from multiple related images. They survey several of the algorithms, present underlying common ideas, and give an overview of applications of object co-segmentation.

We
...
Web Page Recommendation Models: Theory and Algorithms (Synthesis Lectures on Data Management)
Web Page Recommendation Models: Theory and Algorithms (Synthesis Lectures on Data Management)

One of the application areas of data mining is the World Wide Web (WWW or Web), which serves as a huge, widely distributed, global information service for every kind of information such as news, advertisements, consumer information, financial management, education, government, e-commerce, health services, and many other information services....

Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
With the rapid increase of computational powers and availability of modern sensing, analysis and rendering equipment and technologies, computers are becoming more and more intelligent. Many research projects and commercial products have demonstrated the capability for a computer to interact with human in a natural way by looking at...
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
The purpose of this book is to convey vital knowledge about application security to developers working on the Android platform, to enable the development of robust, rugged, and more secure applications. While application security knowledge and skills have matured rapidly over the past couple of years, that...
The Definitive Guide to HTML5
The Definitive Guide to HTML5
The Hypertext Markup Language (HTML) has been around since the early 1990s. My earliest encounter was somewhere around 1993 or 1994, when I was working at a university research lab not far from London. There was only one browser—NCSA Mosaic—and the number of web servers could be counted on one hand.

...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Applied Semantic Web Technologies
Applied Semantic Web Technologies
Since Tim Berners-Lee’s original idea for a global system of interlinked hypertext documents from 1989, the World Wide Web has grown into the world’s biggest pool of human knowledge. Over the past few years, the Web has changed the way people communicate and exchange information. It has created new business...
Data Clustering in C++: An Object-Oriented Approach (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Data Clustering in C++: An Object-Oriented Approach (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Data clustering is a highly interdisciplinary field whose goal is to divide a set of objects into homogeneous groups such that objects in the same group are similar and objects in different groups are quite distinct. Thousands of papers and a number of books on data clustering have been published over the past 50 years....
Neural and Fuzzy Logic Control of Drives and Power Systems
Neural and Fuzzy Logic Control of Drives and Power Systems
The idea of writing this book arose from the need to investigate the main principles of modern power electronic control strategies, using fuzzy logic and neural networks, for research and teaching. Primarily, the book aims to be a quick learning guide for postgraduate/undergraduate students or design engineers interested in...
Linear Programming: An Introduction with Applications
Linear Programming: An Introduction with Applications
This book is aimed at freshman, sophomores, and juniors in college who are even remotely interested in some of the current applications of mathematics to the real world. The difficulty with most of the other linear programming books on the market is that they are high end books, written primarily in a fairly rigorous fashion...
Result Page: 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy