Home | Amazing | Today | Tags | Publishers | Years | Search 
Scale Space and Variational Methods in Computer Vision: Second International Conference
Scale Space and Variational Methods in Computer Vision: Second International Conference

This book contains 71 original, scientific articles that address state-of-the-art research related to scale space and variational methods for image processing and computer vision. Topics covered in the book range from mathematical analysis of both established and new models, fast numerical methods, image analysis, segmentation,...

Web Design for ROI: Turning Browsers into Buyers & Prospects into Leads
Web Design for ROI: Turning Browsers into Buyers & Prospects into Leads

This book is a child borne, like many others, of a cosmic combination of passion, frustration, experience, and luck.

Passion—we quite simply love what we do and care deeply about the results. We hope we’re able to communicate this in our writing.

Frustration—it seems for every victory we gain with...

GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)
GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)

We are entering the golden age of GPU computing. Since the introduction of CUDA in 2007, more than 100 million computers with CUDA-capable GPUs have been shipped to end users. Unlike the previous GPGPU shader programming models, CUDA supports parallel programming in C. From my own experience in teaching CUDA programming, C programmers...

Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)
Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)

As I write this, Java is just beginning its second decade. Unlike many other computer languages whose influence begins to wane over the years, Java’s has grown stronger with the passage of time. Java leapt to the forefront of Internet programming with its first release. Each subsequent version has solidified that position. Today,...

Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Web Development with Apache and Perl
Web Development with Apache and Perl

A quick look at your local bookstore’s Internet section will tell you that there are quite a few commercial packages out there for building web sites. What those books often fail to mention is that many of the world’s most popular web sites were built using freely available tools, and run on free operating systems (OS). They...

Architecture of Network Systems (The Morgan Kaufmann Series in Computer Architecture and Design)
Architecture of Network Systems (The Morgan Kaufmann Series in Computer Architecture and Design)

Data communication networks are widely used today and are an integral part of our daily life. The Internet is a medium for business, personal, and government communication, and it is difficult to envision today’s society without this essential infrastructure. The continued success of the Internet is dependent on our ability to...

Pervasive Information Architecture: Designing Cross-Channel User Experiences
Pervasive Information Architecture: Designing Cross-Channel User Experiences

I knew the Internet before it got famous. There were places but no paths, no maps, no search engines. Entry required a key in the form of an IP address and an incantation in the language of UNIX. It was a small world that felt big because it was so easy to get lost in the shadowy realm of texts and data, completely devoid of color....

Applications of Soft Computing: From Theory to Praxis (Advances in Intelligent and Soft Computing)
Applications of Soft Computing: From Theory to Praxis (Advances in Intelligent and Soft Computing)

The World Soft Computing (WSC) conference is an annual international online conference on applied and theoretical soft computing technology. This WSC 2008 is the thirteenth conference in this series and it has been a great success.

We received a lot of excellent paper submissions which were peer-reviewed by an international...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

C++ Programming: Program Design Including Data Structures
C++ Programming: Program Design Including Data Structures

WELCOME TO THE FOURTH EDITION OF C++ Programming: Program Design Including Data Structures. Designed for a two semester (CS1 and CS2) C++ course, this text will provide a breath of fresh air to you and your students. The CS1 and CS2 courses serve as the cornerstone of the Computer Science curriculum. My primary goal is to motivate and...

Java(TM) Programming: From Problem Analysis to Program Design
Java(TM) Programming: From Problem Analysis to Program Design

Welcome to Java Programming: From Problem Analysis to Program Design, Fifth Edition. Designed for a first Computer Science (CS1) Java course, this text will provide a breath of fresh air to you and your students. The CS1 course serves as the cornerstone of the Computer Science curriculum. My primary goal is to motivate and excite all...

Result Page: 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy