Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Ray Tracing from the Ground Up
Ray Tracing from the Ground Up
Computer graphics involves simulating the distribution of light in a 3D environment. There are only a few fundamentally different algorithms that have survived the test of time. They can be loosely classified into projective algorithms and image-space algorithms. The former class projects each geo metric primitive onto the...
Graphics and Visualization: Principles & Algorithms
Graphics and Visualization: Principles & Algorithms
Graphics & Visualization: Principles and Algorithms is aimed at undergraduate and graduate students taking computer graphics and visualization courses. Students in computer-aided design courses with emphasis on visualization will also benefit from this text, since mathematical modeling techniques with parametric curves and...
Movies Made for Television: 1964-2004 (5 Volume Set)
Movies Made for Television: 1964-2004 (5 Volume Set)
Movies Made for Television in 2004 celebrates 40 full television seasons. As I wrote in the introduction in 1980 to the original (single) volume that chronicled the genre, the range was as esthetically and technically wide at the time as it would remain through the years since as any theatrical offerings – within its restricted...
Knowledge Representation and Reasoning Under Uncertainty: Logic at Work
Knowledge Representation and Reasoning Under Uncertainty: Logic at Work

This volume is based on the International Conference Logic at Work, held in Amsterdam, The Netherlands, in December 1992. The 14 papers in this volume are selected from 86 submissions and 8 invited contributions and are all devoted to knowledge representation and reasoning under uncertainty, which are core issues of formal artificial...

Efficient Structures for Geometric Data Management (Lecture Notes in Computer Science)
Efficient Structures for Geometric Data Management (Lecture Notes in Computer Science)

This book is the revised and extended version of a Pfr.D. dissertation submitted to the Department of Electrical Engineering and Computer Sciences, University of California at Berkeley. Many of the ideas presented in this book have their roots in discussions with Eugene Wong, my mentor and thesis advisor. I would like to thank Gene...

Advanced Topics in Information Retrieval (The Information Retrieval Series)
Advanced Topics in Information Retrieval (The Information Retrieval Series)

This book presents a wide-spectrum illustration of what research in Information Retrieval has produced or will produce in the next years. The book content includes chapters on Aggregated Search, Digital Advertising, Digital Libraries, Discovery of Spam and Opinions in the Web, Evaluation, Information Retrieval in Context, Multimedia...

The Description Logic Handbook: Theory, Implementation and Applications
The Description Logic Handbook: Theory, Implementation and Applications

Since the publication of the first edition of The Description Logic Handbook in 2003, the interest in Description Logics (DL) has steadily increased. This applies both to the number of active DL researchers working on DL theory and implementations of reasoning services, and to the number of applications based on DL technology. One...

Annotated C# Standard
Annotated C# Standard

This book is an annotated version of the C# Language Standard, created by adding around 400 separate annotations to the complete text of the Standard. The Standard was formally adopted as ISO Standard 23270:2006 in April 2006 and published in August 2006, and adopted as Ecma International Standard 334 version 4 in June 2006. Microsoft...

Financial Cryptography and Data Security: 12th International Conference, FC 2008
Financial Cryptography and Data Security: 12th International Conference, FC 2008

I am are very happy to have taken part in the 12th Financial Cryptography and Data Security Conference (FC 2008). Due to the recent growth in the number of security and cryptography venues, the competition for high-quality submissions has been on the rise. Despite that, the continued success of FC is attested by the research...

Gamers at Work: Stories Behind the Games People Play
Gamers at Work: Stories Behind the Games People Play

For nearly four decades, video games have captured the imaginations and drawn the ire of people around the world. Actors play them. Rappers promote them. Politicians want to control them. Even baseball legends make them. Video games are a cultural crossroads where business, entertainment, and technology converge.

Sales of
...

A Companion to Rhetoric and Rhetorical Criticism (Blackwell Companions to Literature and Culture)
A Companion to Rhetoric and Rhetorical Criticism (Blackwell Companions to Literature and Culture)

The essays in A Companion to Rhetoric and Rhetorical Criticism explore rhetoric as a practical art of deliberation and judgment, best taught and learned through concrete examples of argument, interpretation, and criticism. Historically and in our own time scholars have shown that rhetoric can very well be theorized in the strong sense that...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy