Home | Amazing | Today | Tags | Publishers | Years | Search 
Recent Trends of Mobile Collaborative Augmented Reality Systems
Recent Trends of Mobile Collaborative Augmented Reality Systems

Augmented reality (AR) is a direct or indirect view of real world scenes in which physical objects are annotated with, or overlaid by computer generated digital information. The past two decades have seen a fast growing body of research and development dedicated to techniques and technologies for AR. In particular, due to the recent...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

Computer Simulation Methods in Theoretical Physics
Computer Simulation Methods in Theoretical Physics

The new and exciting field of computational science, and in particular sim- ulational science, has seen rapid change since the first edition of this book came out. New methods have been found, fresh points of view have emerged, and features hidden so far have been uncovered. Almost all the methods presented in the first addition have...

Software Engineering for Image Processing Systems (Image Processing Series)
Software Engineering for Image Processing Systems (Image Processing Series)

This book is not intended to be a traditional software engineering text — there are many good ones. Instead, it is designed specifically for those involved in image processing systems. It provides a modern engineering framework for the specification, design, coding, testing, and maintenance of image processing software and...

Hybrid Learning: 4th International Conference, ICHL 2011, Hong Kong, China, August 10-12, 2011
Hybrid Learning: 4th International Conference, ICHL 2011, Hong Kong, China, August 10-12, 2011

Welcome to the 4th International Conference on Hybrid Learning (ICHL 2011). After spending ICHL 2010 at the Beijing Normal University and ICHL 2009 at University of Macau, we are back to Hong Kong with our new host, The University of Hong Kong’s School of Professional and Continuing Education (HKU SPACE).

...

Engineering Chemistry (as Per VTU)
Engineering Chemistry (as Per VTU)

The objective of this book is to present a substantial introduction to the ideas, phenomena and methods of the problems that are frequently observed in mathematics, mathematical physics and engineering technology. The book can be appreciated at a considerable number of levels and is designed for everyone from amateurs to research workmen.

...
Virtualization: A Manager's Guide
Virtualization: A Manager's Guide

This book is intended to introduce managers or subject matter experts outside of information technology (IT) to the concepts behind virtualization technology, the different categories of virtualization, and how they are used. It is not meant to replace product documentation. It is not meant as a “how to” guide...

Getting Started with Citrix XenApp 6
Getting Started with Citrix XenApp 6

XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure...

OFDMA System Analysis and Design (Artech House Mobile Communication Series)
OFDMA System Analysis and Design (Artech House Mobile Communication Series)

In late 2001, Bill Gates was having dinner with a group of journalists on the night before Microsoft’s launch of the Windows XP operating system. At that time, the dotcom crash was just unfolding, and during dinner, Bill Gates said (correctly) that the dotcom bubble was a distraction and caused a lot of money to be wasted on...

Axioms and Hulls (Lecture Notes in Computer Science)
Axioms and Hulls (Lecture Notes in Computer Science)

A FEW YEARS AGO some students and I were looking at a map that pinpointed the locations of about loo cities. We asked ourselves, "Which of these cities are neighbors of each other?" We knew intuitively that some pairs of cities were neighbors and others were not; we wanted to find a formal mathematical characterization that...

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

Result Page: 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy