Home | Amazing | Today | Tags | Publishers | Years | Search 
30 Arduino Projects for the Evil Genius
30 Arduino Projects for the Evil Genius

30 Ways to Have Some Computer-Controlled Evil Fun!

This wickedly inventive guide shows you how to program and build a variety of projects with the Arduino microcontroller development system. Covering Windows, Mac, and Linux platforms, 30 Arduino Projects for the Evil Genius gets you up to speed with the simplified C...

Cloud Computing: First International Conference, CloudComp 2009, Munich, Germany, October 19-21, 2009
Cloud Computing: First International Conference, CloudComp 2009, Munich, Germany, October 19-21, 2009

Welcome to the proceedings ofCloudComp 2009.

Acomputing cloudis more thana collection of computer resources, because it provides mechanisms to manage those resources. In a cloud computing platform, software is migrating from the desktop to the "clouds," promising users, at any time and anywhere, access to their...

How Do Witches Fly? A practical approach to nocturnal flights.
How Do Witches Fly? A practical approach to nocturnal flights.

Books which examine the folklore of Europe's traditional "witch" plants are not uncommon, and some give some coverage to describing the psychotropic and hallucinogenic effects of these plants on the human body. However this book is rather more unusual than that in that the author is first and foremost a biochemist with an...

Pattern Recognition From Classical to Modern Approaches
Pattern Recognition From Classical to Modern Approaches

Recognizing patterns is at the core of man's attempts to understand the universe that we inhabit. Through the development of sensors and instruments, we have extended our ability to gather data far beyond the range and scale of man's natural senses. As a result we are now able to gather data on phenomena occurring in the far reaches...

Bridging the Gap Between Graph Edit Distance and Kernel Machines (Series in Machine Perception and Artifical Intelligence)
Bridging the Gap Between Graph Edit Distance and Kernel Machines (Series in Machine Perception and Artifical Intelligence)

When we rst started working on the problem of making the kernel machine approach applicable to the classi cation of graphs a couple of years ago, our e orts were mainly driven by the fact that kernel methods had led to impressive performance results on many data sets. It didn't take us long to appreciate the sheer elegance of how...

Handbook of Software Engineering and Knowledge Engineering: Recent Advances
Handbook of Software Engineering and Knowledge Engineering: Recent Advances

The Handbook of Software Engineering and Knowledge Engineering is the first comprehensive handbook covering these two important areas that have become interwoven in recent years. Many international experts contribute to this Hand book. Each article is written in a way that a practitioner of software engineering and knowledge engineering can...

Computer Aided and Integrated Manufacturing Systems, Vol. 1: Computer Techniques
Computer Aided and Integrated Manufacturing Systems, Vol. 1: Computer Techniques

This is an invaluable five-volume reference on the very broad and highly significant subject of computer aided and integrated manufacturing systems. It is a set of distinctly titled and well-harmonized volumes by leading experts on the international scene.

The techniques and technologies used in computer aided and integrated...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Artificial General Intelligence: 4th International Conference, AGI 2011, Mountain View
Artificial General Intelligence: 4th International Conference, AGI 2011, Mountain View

The original goal of the AI field was the construction of “thinking machines” – that is, computer systems with human-like general intelligence. Due to the difficulty of this task, for the last few decades the majority of AI researchers have focused on what has been called “narrow AI” – the production...

IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)
IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)

In 1862, the gardener James Bateman sent several specimens of the Christmas orchid to Charles Darwin. This orchid was first planted in Britain in 1855 and it did not blossom until 1857. It had been discovered several decades before by the French botanist Louis-Marie Aubert du Petit-Thouars in Madagascar in 1822. The most significant...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

The Image Processing Handbook, Sixth Edition
The Image Processing Handbook, Sixth Edition

Image processing is used in a wide variety of applications, for two somewhat different purposes:

1. improving the visual appearance of images to a human observer, including their printing and transmission, and

2. preparing images for the measurement of the features and structures which they reveal.

The...

Result Page: 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy