Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MPEG-4 Facial Animation: The Standard, Implementation and Applications
MPEG-4 Facial Animation: The Standard, Implementation and Applications
One of the more revolutionary parts of the MPEG-4 International Standard is the Face and Body Animation, or FBA: the specification for efficient coding of shape and animation of human faces and bodies. This specification is a result of collaboration of experts with different backgrounds ranging from image coding and compression to video analysis,...
Computational Intelligence, Theory and Applications: International Conference 8th Fuzzy Days in Dortmund, Germany, Sept. 29-Oct. 01, 2004
Computational Intelligence, Theory and Applications: International Conference 8th Fuzzy Days in Dortmund, Germany, Sept. 29-Oct. 01, 2004
This book constitutes the refereed proceedings of the 8th Dortmund Fuzzy Days, held in Dortmund, Germany, 2004. The Fuzzy-Days conference has established itself as an international forum for the discussion of new results in the field of Computational Intelligence. All the papers had to undergo a thorough review guaranteeing a solid quality of the...
Beginning Kinect Programming with the Microsoft Kinect SDK
Beginning Kinect Programming with the Microsoft Kinect SDK

Beginning Kinect Programming with the Microsoft Kinect SDK gets you up and running developing Kinect applications for your PC using Microsoft tools and the official SDK. You will have a working Kinect program by the end of the first chapter! The following chapters will open up the secrets of three-dimensional vision, skeleton...

Text-to-Speech Synthesis
Text-to-Speech Synthesis

Text-to-Speech Synthesis provides a complete, end-to-end account of the process of generating speech by computer. Giving an in-depth explanation of all aspects of current speech synthesis technology, it assumes no specialized prior knowledge. Introductory chapters on linguistics, phonetics, signal processing and speech signals lay the...

Heidegger with Derrida: Being Written
Heidegger with Derrida: Being Written

Heidegger with Derrida: Being Written attempts, for the first time, to think Heidegger's philosophy through the lens of Derrida's logocentric thesis, according to which speech has, throughout the history of metaphysics, been given primacy over writing. The book offers a detailed account of Derrida's arguments about...

Affective Dialogue Systems: Tutorial and Research Workshop, ADS 2004, Kloster Irsee, Germany, June 14-16, 2004
Affective Dialogue Systems: Tutorial and Research Workshop, ADS 2004, Kloster Irsee, Germany, June 14-16, 2004
This book constitutes the refereed proceedings of the international Tutorial and Research Workshop on Affective Dialogue Systems, ADS 2004, held in Kloster Irsee, Germany in June 2004.

The 21 revised full papers and 14 revised short papers presented were carefully reviewed and selected for presentation. The papers are organized in topical...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
Telecosmos: The Next Great Telecom Revolution
Telecosmos: The Next Great Telecom Revolution
An insider's guide to the exciting future of telecommunications

The last great telecommunications revolution brought us fiber optics, mobile phones, videoconferencing, and a host of other innovations that improved life and business and connected individuals in ways never imagined. Now emerging technologies such as Voice over Internet Protocol...

The Coming Robot Revolution: Expectations and Fears About Emerging Intelligent, Humanlike Machines
The Coming Robot Revolution: Expectations and Fears About Emerging Intelligent, Humanlike Machines

Making a robot that looks and behaves like a human being has been the subject of many popular science fiction movies and books. Although the development of such a robot faces many challenges, the making of a virtual human has long been potentially possible. With recent advances in various key technologies related to hardware and...

Approximation Methods for Polynomial Optimization: Models, Algorithms, and Applications (SpringerBriefs in Optimization)
Approximation Methods for Polynomial Optimization: Models, Algorithms, and Applications (SpringerBriefs in Optimization)
Polynomial optimization, as its name suggests, is used to optimize a generic multivariate polynomial function, subject to some suitable polynomial equality and/or inequality constraints. Such problem formulation dates back to the nineteenth century when the relationship between nonnegative polynomials and sum of squares (SOS) was...
Network Control and Engineering for QOS, Security and Mobility, III
Network Control and Engineering for QOS, Security and Mobility, III
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con’2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and...
unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy