Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009
Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009

This volume collects the papers accepted for presentation at MIRAGE 2009. The MIRAGE conference is continuing to receive international recognition, with this year’s presentations coming from 25 countries despite the large worldwide financial crisis. This time Asia submitted far fewer papers than previously and fewer than Europe. France...

Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings
Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings

It is a pleasure and an honour both to organize ICB 2009, the 3rd IAPR/IEEE International Conference on Biometrics. This will be held 2–5 June in Alghero, Italy, hosted by the Computer Vision Laboratory, University of Sassari. The conference series is the premier forum for presenting research in biometrics and its allied technologies:...

Pro DNS and BIND 10
Pro DNS and BIND 10

Every time you get e-mail, every time you access a web page, you use the Domain Name System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day. Every one of those 2 billion requests originate from a DNS that supports a group of local users, and every one of them is finally answered by a DNS server that may...

Machine Vision
Machine Vision

This textbook covers both fundamentals and advanced topics in computer-based recognition of objects in scenes. It is intended to be both a text and a reference. Almost every chapter has a “Fundamentals” section which is pedagogically structured as a textbook, and a “Topics” section which includes extensive references...

Fuzzy Logic: A Spectrum of Theoretical & Practical Issues (Studies in Fuzziness and Soft Computing)
Fuzzy Logic: A Spectrum of Theoretical & Practical Issues (Studies in Fuzziness and Soft Computing)

This book exclusively surveys the active on-going research of the current maturity of fuzzy logic over the last four decades. Many world leaders of fuzzy logic have enthusiastically contributed their best research results into five theoretical, philosophical and fundamental sub areas and nine distinctive applications, including two PhD...

Information Visualization in Data Mining and Knowledge Discovery
Information Visualization in Data Mining and Knowledge Discovery

Mainstream data mining techniques significantly limit the role of human reasoning and insight. Likewise, in data visualization, the role of computational analysis is relatively small. The power demonstrated individually by these approaches to knowledge discovery suggests that somehow uniting the two could lead to increased efficiency and more...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Fast Fourier Transform - Algorithms and Applications (Signals and Communication Technology)
Fast Fourier Transform - Algorithms and Applications (Signals and Communication Technology)

This book presents an introduction to the principles of the fast Fourier transform (FFT). It covers FFTs, frequency domain filtering, and applications to video and audio signal processing.

As fields like communications, speech and image processing, and related areas are rapidly developing, the FFT as one of the essential...

Apple Pro Training Series: Aperture 3
Apple Pro Training Series: Aperture 3

Welcome to the official Apple Pro Training course for Aperture, the powerful photo editing and management software from Apple. This book includes a variety of real-world photography projects, which are used as clear examples of the way Aperture works, from import and organization to image editing and output.

Whether...

An Introduction to Support Vector Machines and Other Kernel-based Learning Methods
An Introduction to Support Vector Machines and Other Kernel-based Learning Methods

This is the first comprehensive introduction to Support Vector Machines (SVMs), a new generation learning system based on recent advances in statistical learning theory. SVMs deliver state-of-the-art performance in real-world applications such as text categorisation, hand-written character recognition, image classification, biosequences...

Bridging the Gap Between Graph Edit Distance and Kernel Machines (Series in Machine Perception and Artifical Intelligence)
Bridging the Gap Between Graph Edit Distance and Kernel Machines (Series in Machine Perception and Artifical Intelligence)

When we rst started working on the problem of making the kernel machine approach applicable to the classi cation of graphs a couple of years ago, our e orts were mainly driven by the fact that kernel methods had led to impressive performance results on many data sets. It didn't take us long to appreciate the sheer elegance of how...

Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy