|
|
|
|
|
Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)
As I write this, Java is just beginning its second decade. Unlike many other computer
languages whose influence begins to wane over the years, Java’s has grown stronger
with the passage of time. Java leapt to the forefront of Internet programming with
its first release. Each subsequent version has solidified that position. Today,... | | Deploying OpenStack
This book is aimed at developers, technologists, and system administrators eager to
understand and deploy cloud computing infrastructure projects based upon OpenStack
software. It is intended to provide the reader with a solid understanding of the Open-
Stack project goals, details of specific OpenStack software components,... | | Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)
Humans receive the great majority of information about their environment through
sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key
component for building artificial systems that can perceive and understand their environment.
Computer vision is likely to change society in many ways; for example,
it... |
|
|
Vision Based Systemsfor UAV Applications (Studies in Computational Intelligence)
This monograph is motivated by a significant number of vision based algorithms for Unmanned Aerial Vehicles (UAV) that were developed during research and development projects. Vision information is utilized in various applications like visual surveillance, aim systems, recognition systems, collision-avoidance systems and navigation. This book... | | Instant Ember.js Application Development How-to
Ember.js is a frontend web development framework that organizes your JavaScript into clean, reusable code. With its powerful tools and concepts at your disposal you can create large scale web applications that rival native applications.
No matter how big your application gets, Ember.js makes your code manageable.
... | | Iris Biometric Model for Secured Network Access
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a... |
|
|
Result Page: 877 876 875 874 873 872 871 870 869 868 867 866 865 864 863 862 861 860 859 |