Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Markov Random Field Modeling in Image Analysis (Advances in Pattern Recognition)
Markov Random Field Modeling in Image Analysis (Advances in Pattern Recognition)

Modeling problems in this book are addressed mainly from the computational viewpoint. The primary concerns are how to define an objective function for the optimal solution to a image analysis or computer vision problem and how to find the optimal solution. The solution is defined in an optimization sense because the perfect solution is...

Managing Mission-Critical Domains and DNS
Managing Mission-Critical Domains and DNS

Manage your organization’s naming architecture effectively, from the administrative/policy side right through to the technical DNS and nameserver implementations. This practical book takes you through the basics—the anatomies of domain names and DNS requests—and covers DNS and domain issues from a variety of...

The Success of Open Source
The Success of Open Source

Much of the innovative programming that powers the Internet, creates operating systems, and produces software is the result of "open source" code, that is, code that is freely distributed--as opposed to being kept secret--by those who write it. Leaving source code open has generated some of the most sophisticated developments in...

Nanotechnology : Science, Innovation, and Opportunity
Nanotechnology : Science, Innovation, and Opportunity

 

Inside the Emerging Multibillion-Dollar Nanotechnology Industry

Suddenly, nanotechnology isn't science fiction or mere theory: It's becoming one of the world's fastest-growing, highest-impact industries. In Nanotechnology: Science, Innovation, and...

Fuzzy Logic and Probability Applications: A Practical Guide
Fuzzy Logic and Probability Applications: A Practical Guide

Probability theory and fuzzy logic are the principal components of an array of methodologies for dealing with problems in which uncertainty and imprecision play important roles. In relation to probability theory, fuzzy logic is a new kid on the block. As such, it has been and continues to be, though to a lesser degree, an object of...

Inventors at Work: The Minds and Motivation Behind Modern Inventions
Inventors at Work: The Minds and Motivation Behind Modern Inventions

Inventors at Work: The Minds and Motivation Behind Modern Inventions is a collection of interviews with inventors of famous products, innovations, and technologies that have made life easier or even changed the way we live. All of these scientists, engineers, wild-eyed geniuses, and amateur technologists have dedicated their...

Molecular Electronics: Commercial Insights, Chemistry, Devices, Architecture and Programming
Molecular Electronics: Commercial Insights, Chemistry, Devices, Architecture and Programming

This book presents an in-depth discussion on molecular electronics in an easy-to-understand manner, aiming at chemists, computer scientists, surface scientists, physicists, and applied mathematicians. Lighter overviews are provided for the science-minded layperson and the high tech entrepreneur in this nanoscale science. The author has...

Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with...
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
Finding Source Code on the Web for Remix and Reuse
Finding Source Code on the Web for Remix and Reuse

In recent years, searching for source code on the web has become increasingly common among professional software developers and is emerging as an area of academic research. This volume surveys past research and presents the state of the art in the area of "code retrieval on the web." This work is concerned with the algorithms, ...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

Inverse Problems in Engineering Mechanics
Inverse Problems in Engineering Mechanics
Inverse problems can be found in many topics of engineering mechanics. There are many successful applications in the fields of inverse problems (non-destructive testing and characterization of material properties by ultrasonic or X-ray techniques, thermography, etc.). Generally speaking, the inverse problems are concerned with the determination of...
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy