Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Content Computing: Advanced Workshop on Content Computing, AWCC 2004
Content Computing: Advanced Workshop on Content Computing, AWCC 2004

This book constitutes the refereed proceedings of the Advanced Workshop on Content Computing, AWCC 2004, held in Zhen Jiang, Jiang Su, China in November 2004.

The 26 revised full papers and 36 revised short papers presented were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections on mobile...

Topology-based Methods in Visualization (Mathematics and Visualization)
Topology-based Methods in Visualization (Mathematics and Visualization)
Enabling insight into large and complex datasets is a prevalent theme in visualization research for which different approaches are pursued.

Topology-based methods are built on the idea of abstracting characteristic structures such as the topological skeleton from the data and to construct the visualizations accordingly. There are currently new...

GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
Moodle 1.9 Testing and Assessment
Moodle 1.9 Testing and Assessment

This book is a practical guide to testing in Moodle. You will initially learn to create different types of questions such as True/False, multiple choice, short answer, and so on. After you have learned how to create questions you will follow a step-by-step process to create complete tests by tweaking various options. Once you have gone...

Biometrics and ID Management: COST 2101 European Workshop, BioID 2011
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011

This volume of Springer Lecture Notes in Computer Sciences (LNCS) constitutes the final publication of the EU COST 2101 Action “Biometrics for Identity Documents and Smart Cards,” which has been successfully running during the years 2006-2010. One of the many valuable outputs of this initiative is the realization of a new...

Freud and His Critics
Freud and His Critics
Wars against Freud have been waged along virtually every front during the past decade. Now Paul Robinson takes on three of Freud's most formidable critics, mounting a thoughtful, witty, and ultimately devastating critique of the historian of science Frank Sulloway, the psychoanalyst Jeffrey Masson, and the philosopher Adolf...
Sun (R) Certified System Administrator for Solaris (TM) 10 Study Guide (Exams 310-200 & 310-202)
Sun (R) Certified System Administrator for Solaris (TM) 10 Study Guide (Exams 310-200 & 310-202)

Get the book that shows you not only what—but how—to study

  • 100% complete coverage of all official objectives for Sun Solaris exams CX-310-200 and CX-310-202
  • Exam Readiness Checklist at the front of the book--you're ready for the exam when all objectives on the list are checked off...
Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications
Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications
Critically acclaimed text for computer performance analysis—now in its second edition

The Second Edition of this now-classic text provides a current and thorough treatment of queueing systems, queueing networks, continuous and discrete-time Markov chains, and simulation. Thoroughly updated with...

Novel 3D Media Technologies
Novel 3D Media Technologies

This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The contributions are based on the results of the FP7 European Project ROMEO, which focuses on new methods for the compression...

Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
This book gathers a selection of peer-reviewed papers presented at the Tiangong-2 Data Utilization Conference, which was held in Beijing, China, in December 2018. As the first space laboratory in China, Tiangong-2 carries 3 new types of remote sensing payloads – the Wide-band Imaging Spectrometer (WIS), Three-dimensional Imaging...
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy