Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Visual Indexing and Retrieval (SpringerBriefs in Computer Science)
Visual Indexing and Retrieval (SpringerBriefs in Computer Science)
Visual Indexing and Retrieval is a wide-scope research domain which unites researchers from image analysis and computer vision, to information management.

For nearly twenty years, this research has been extremely active world-wide. With the advent of social networks conveying huge amount of visual information to the
...
Emerging Technologies of Text Mining: Techniques and Applications
Emerging Technologies of Text Mining: Techniques and Applications
All around modern society, an enormous amount of strategic information is spread in many different presentation forms, like e-mail, formal and informal documents, historical reports, personal notes, Web pages, and so on. The access and transformation of this information in knowledge as a basis for decision making in the corporate world have become...
Pattern Recognition From Classical to Modern Approaches
Pattern Recognition From Classical to Modern Approaches

Recognizing patterns is at the core of man's attempts to understand the universe that we inhabit. Through the development of sensors and instruments, we have extended our ability to gather data far beyond the range and scale of man's natural senses. As a result we are now able to gather data on phenomena occurring in the far reaches...

Data Structures and Algorithms with JavaScript
Data Structures and Algorithms with JavaScript

As an experienced JavaScript developer moving to server-side programming, you need to implement classic data structures and algorithms associated with conventional object-oriented languages like C# and Java. This practical guide shows you how to work hands-on with a variety of storage mechanisms—including linked lists, stacks,...

Artificial Intelligence: Methodology, Systems, and Applications: 11th International Conference, AIMSA 2004, Varna, Bulgaria, September 2-4, 2004
Artificial Intelligence: Methodology, Systems, and Applications: 11th International Conference, AIMSA 2004, Varna, Bulgaria, September 2-4, 2004
The 11th Conference “Artificial Intelligence: Methodology, Systems, Applications – Semantic Web Challenges” (AIMSA 2004) continued successfully pursuing the main aim of the AIMSA series of conferences – to foster the multidisciplinary community of artificial intelligence researchers, embracing both the theoretic...
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Model-Driven Software Development: Integrating Quality Assurance (Premier Reference Source)
Model-Driven Software Development: Integrating Quality Assurance (Premier Reference Source)
Model-driven software development (MDSD) drastically alters the software development process, characterized by a high degree of innovation and productivity. However, quality assurance application in the domain of software models and model-driven software development is still in an emergent phase.

Model-Driven Software Development:...

Medical Infrared Imaging
Medical Infrared Imaging

Rapid evolution of technical advances in infrared sensor technology, image processing, “smart” algorithms, databases, and system integration paves the way for new methods of research and use in medical infrared imaging. These breakthroughs permit easy-to-use, high-sensitivity imaging that can address key issues of diagnostic...

Mastering Oracle8i
Mastering Oracle8i
We want information… information...” Possibly you recognize these words as the primary interest of a somewhat clandestine group, and as told by a character called Number 2 to Patrick McGoohan’s character Number 6 (in the old TV show The Prisoner). Indeed, in this day, information is king, and the speedy, accurate, and reliable...
Linux Email
Linux Email
Many businesses want to run their email servers on Linux for greater control and flexibility of corporate communications, but getting started can be complicated. The attractiveness of a free-to-use and robust email service running on Linux can be undermined by the apparent technical challenges involved. Some of the complexity arises from the fact...
Multimedia Retrieval (Data-Centric Systems and Applications)
Multimedia Retrieval (Data-Centric Systems and Applications)
Retrieval of multimedia data is different from retrieval of structured data. A key problem in multimedia databases is search, and the proposed solutions to the problem of multimedia information retrieval span a rather wide spectrum of topics outside the traditional database area, ranging from information retrieval and humancomputer interaction to...
Text Algorithms
Text Algorithms
"It is very convenient to have this book at hand. It is the first book that systematically presents the results of work on practical and theoretical algorithmic problems on texts up to the most recent developments in stringology."--Mathematical Reviews

"Given the practical importance of this fast-moving subject, serious
...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy