Home | Amazing | Today | Tags | Publishers | Years | Search 
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Visual Data Mining: Theory, Techniques and Tools for Visual Analytics (Lecture Notes in Computer Science)
Visual Data Mining: Theory, Techniques and Tools for Visual Analytics (Lecture Notes in Computer Science)
The importance of visual data mining, as a strong sub-discipline of data mining, had already been recognized in the beginning of the decade. In 2005 a panel of renowned individuals met to address the shortcomings and drawbacks of the current state of visual information processing. The need for a systematic and methodological development of visual...
Strategies for Information Technology and Intellectual Capital
Strategies for Information Technology and Intellectual Capital
"Due to the increasing importance of the intangible assets of a company, firms are now concerned with how best to manage and measure knowledge and other intangibles. In addition to this, information technology has drastically changed the way these measurements are managed. Strategies for Information Technology and Intellectual Capital:...
Mathematical Principles of Optical Fiber Communication (CBMS-NSF Regional Conference Series in Applied Mathematics)
Mathematical Principles of Optical Fiber Communication (CBMS-NSF Regional Conference Series in Applied Mathematics)
With the maturing of mobile portable telephony and the emerging broadband access market, greater fiber transmission capacity will be essential in the early 21st century. Since the demand for more capacity drives the development of new optics-based technologies, fiber optics therefore remains a vibrant area for research. Mathematical Principles of...
Explorations in Information Space: Knowledge, Actor, and Firms
Explorations in Information Space: Knowledge, Actor, and Firms
As humankind seeks to extend its spatiotemporal reach both on and beyond its planet, it is constantly being forced by a recalcitrant nature to renegotiate the terms of its covenant with her. In some cases, the bargaining gets tough and nature takes offence, gradually revealing her anger with the terms that humanity seeks to impose on her through...
The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
"No present book comes near this one in the range and depth of treatment of these two extremely important methods—the Lanczos algorithm and the method of conjugate gradients." Chris Paige, School of Computer Science, McGill University.   The Lanczos and conjugate gradient (CG) algorithms are fascinating numerical...
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
The relatively recent increase in computational power available for mathematical modeling and simulation raises the possibility that modern numerical methods can play a significant role in the analysis of complex particulate flows. This introductory monograph focuses on basic models and physically based computational solution strategies for the...
Reflections on the Teaching of Programming: Methods and Implementations (Lecture Notes in Computer Science)
Reflections on the Teaching of Programming: Methods and Implementations (Lecture Notes in Computer Science)
This state-of-the-art survey, reflecting on the teaching of programming, has been written by a group of primarily Scandinavian researchers and educators with special interest and experience in the subject of programming. The 14 chapters - contributed by 24 authors - present practical experience gathered in the process of teaching programming and...
RFID Technology and Applications
RFID Technology and Applications
This book is addressed to business management and project managers as well as researchers who are evaluating the use of radio frequency identification (RFID) for tracking uniquely identified objects. In an effort to make RFID project management less of an art form and more of a science RFID Technology and Applications brings together pioneering...
SAP GRC For Dummies (Computer/Tech)
SAP GRC For Dummies (Computer/Tech)
Governance, risk, and compliance—these three big letters can add up to one giant headache. But GRC doesn't have to be a boil on your corporate behind. SAP GRC For Dummies untangles the web of regulations that confronts your company and introduces you to software solutions the not only keep you in compliance, but also make your whole...
Introduction to Hilbert Spaces with Applications
Introduction to Hilbert Spaces with Applications
The Second Edition if this successful text offers a systematic exposition of the basic ideas and results of Hilbert space theory and functional analysis. It includes a simple introduction to the Lebesgue integral and a new chapter on wavelets. The book provides the reader with revised examples and updated diverse applications to differential and...
Nonlinear Digital Filters: Analysis and Applications
Nonlinear Digital Filters: Analysis and Applications
This book provides an easy to understand overview of nonlinear behavior in digital filters, showing how it can be utilized or avoided when operating nonlinear digital filters. It gives techniques for analyzing discrete-time systems with discontinuous linearity, enabling the analysis of other nonlinear discrete-time systems, such as sigma delta...
Result Page: 423 422 421 420 419 418 417 416 415 414 413 412 411 410 409 408 407 406 405 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy