Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

3D Computer Vision: Efficient Methods and Applications (X.media.publishing)
3D Computer Vision: Efficient Methods and Applications (X.media.publishing)

This book provides an introduction to the foundations of three-dimensional computer vision and describes recent contributions to the field. Geometric methods include linear and bundle adjustment based approaches to scene reconstruction and camera calibration, stereo vision, point cloud segmentation, and pose estimation of rigid, articulated, and...

Robotics (Intelligent Systems, Control and Automation: Science and Engineering)
Robotics (Intelligent Systems, Control and Automation: Science and Engineering)

This supplementary introductory tutorial treats the following subjects: the basic characteristics of industrial robot mechanisms; the pose and movement of an object, which are described by homogenous transformation matrices; a geometric model of robot mechanism; a short introduction into kinematics and dynamics of robots; robot sensors and the...

Effective Software Maintenance and Evolution: A Reuse-Based Approach
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Almost three decades ago, while teaching at Toronto’s York University, serendipity struck me in the form of frame technology. Frustrated at having to reedit my customizations over and over each time I reused my code generators, I became determined to automate the splicing process. I soon discovered I had a tiger by the tail. Tigers are...
High Performance Deformable Image Registration Algorithms for Manycore Processors
High Performance Deformable Image Registration Algorithms for Manycore Processors

High Performance Deformable Image Registration Algorithms for Manycore Processors develops highly data-parallel image registration algorithms suitable for use on modern multi-core architectures, including graphics processing units (GPUs). Focusing on deformable registration, we show how to develop data-parallel versions of the...

Data Mining with R: Learning with Case Studies
Data Mining with R: Learning with Case Studies

The versatile capabilities and large set of add-on packages make R an excellent alternative to many existing and often expensive data mining tools. Exploring this area from the perspective of a practitioner, Data Mining with R: Learning with Case Studies uses practical examples to illustrate the power of R and data...

Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)

Approaches to the recovery of three-dimensional information on a biological object, which are often formulated or implemented initially in an intuitive way, are concisely described here based on physical models of the object and the image-formation process. Both three-dimensional electron microscopy and X-ray tomography can be captured in the...

Hadoop Real World Solutions Cookbook
Hadoop Real World Solutions Cookbook

Ever felt you could use some no-nonsense, practical help when developing applications with Hadoop? Well, you've just found it. This real-world solutions cookbook is packed with handy recipes you can apply to your own everyday issues.

Overview

  • Solutions to common problems when working in the Hadoop...
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
Continued advances in information technologies are enabling a growing number of physical devices to be imbued with computingand communications capabilities. Aircraft, cars, household appliances, cellular telephones, and health monitoring devices all contain microprocessors that are being linked with other information processing devices. Such...
3D Art Essentials: The Fundamentals of 3D Modeling, Texturing, and Animation
3D Art Essentials: The Fundamentals of 3D Modeling, Texturing, and Animation

This book was written to give beginning 3D artists a map through the art and how to get involved in the 3D industry. You can use this book by reading all the way through it cover to cover with or without doing the tutorials, by picking and choosing chapters based on gaps you want to fill, or as a quick reference to a concept you...

Add Audio and Video to Your Site: The Mini Missing Manual
Add Audio and Video to Your Site: The Mini Missing Manual

Nothing spices up a website like a cool sound effect (think ker-thunk as a visitor presses a button) or an embedded video. In this Mini Missing Manual, you’ll learn how to add several kinds of media files to your site: background music, a MIDI player, sound effects, and videos.

You’ll also find out where you can...

Ecosystem Responses to Mercury Contamination: Indicators of Change
Ecosystem Responses to Mercury Contamination: Indicators of Change

As rising levels of mercury in the environment pose an increasing threat of toxicity to humans and wildlife, several laws already call for industries to reduce mercury emissions at the source. Ecosystem Responses to Mercury Contamination: Indicators of Change outlines the infrastructure and methods needed to measure, monitor, and regulate the...

Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy