Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand

The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...

Principles of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems
Principles of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems
Bacterial contamination of food and water resources, as well as the increasing incidence of nosocomial infections, has us on our toes, looking for ways of recognizing these elements. In addition, the recent and growing threats to personal and territorial securities make this task even  more urgent. Therefore, accurate assessment of the state...
Diagnosis and Surgical Management of Renal Tumors
Diagnosis and Surgical Management of Renal Tumors
Renal cell carcinoma (RCC) is the most common primary malignancy of the kidney, with an estimated 64,000 new cases diagnosed each year in the United States. Worldwide, this figure approaches 270,000 annual incident cases. At the time of initial presentation, 80% of patients with RCC will be diagnosed with a tumor localized the kidney. The...
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Data Protection in a Profiled World
Data Protection in a Profiled World

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data...

Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

UML for Systems Engineering: watching the wheels, 2nd Edition (IEE Professional Applications of Computing)
UML for Systems Engineering: watching the wheels, 2nd Edition (IEE Professional Applications of Computing)

Up until a few years ago there were over 150 different modelling languages available to software developers. This vast array of choice however, only served to severely hinder effective communication. Therefore, to combat this, every methodologist and many companies agreed to speak the same language, hence the birth of the unified modelling...

3D Imaging for Safety and Security (Computational Imaging and Vision)
3D Imaging for Safety and Security (Computational Imaging and Vision)
The past decades have seen significant improvements in 3D imaging where the related techniques and technologies have advanced to a mature state. These exciting developments have sparked increasing interest in industry and academia in the challenges and opportunities afforded by 3D sensing. As a consequence, the emerging area of safety and security...
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews,...

Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
In recent years, technological advances have resulted in the rapid development of a new exciting research direction – the interdisciplinary use of sensors for data collection, systems analysis, and monitoring. Application areas include military surveillance, environmental screening, computational neuroscience,...
The Kock Pouch
The Kock Pouch

This book is about the recently revived technique of Kock pouch in inflammatory bowel disease. It discusses the Kock pouch as an alternative to patients not suitable for a pelvic pouch or where the pelvic pouch has failed. It provides clinicians with all the necessary information on patient guidance and surgical revisions after a...

The Eagle Has Eyes: The FBI Surveillance of César Estrada Chávez of the United Farm Workers Union of America, 1965–1975 (Latinos in the United States)
The Eagle Has Eyes: The FBI Surveillance of César Estrada Chávez of the United Farm Workers Union of America, 1965–1975 (Latinos in the United States)
This book is the first of its kind to bring transparency to the FBI’s attempts to destroy the incipient Chicano Movement of the 1960s. While the activities of the deep state are current research topics, this has not always been the case. The role of the U.S. government in suppressing marginalized racial and ethnic minorities...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy