3D Face Processing: Modeling, Analysis and Synthesis introduces the frontiers of 3D face processing techniques. It reviews existing 3D face processing techniques, including techniques for 3D face geometry modeling; 3D face motion modeling; and 3D face motion tracking and animation. Then it discusses a unified framework for face...
Today government agencies not only have official Web sites but also sponsor moderated chats, blogs, digital video clips, online tutorials, videogames, and virtual tours of national landmarks. Sophisticated online marketing campaigns target citizens with messages from the government—even as officials make news with digital gaffes involving...
Oral squamous cell carcinoma (SCC) is the 13th commonest cancer worldwide, and the most common cancer in the Asian subcontinent due to the widespread habit of tobacco and betel nut chewing. Despite many advances in diagnosis and treatment, the survival statistics have only marginally improved. However our...
Typically, there are over twenty radio systems on board the average commercial jet aircraft dealing with communication, navigation and surveillance functions. Very high frequency (VHF) air-to-ground communication is usually the main method of information and control exchange between pilot and air traffic control. Satellite and high frequency...
This book provides clinicians with a broader understanding of screening and preventive diagnosis using radiological imaging. The first part of the book is dedicated to the fundamentals of screening and preventive diagnosis. The second part of the book discusses the most important practical examples of radiological screening and surveillance,...
Up-to-the-minute observations from a world-famous security expert
Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon...
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.
This book teaches you how to secure your online identity and personal...
The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.
The thoroughly updated and greatly expanded Fourth Edition of the best-selling Manual of Gastroenterologic Procedures covers all diagnostic and therapeutic procedures in current use for adult and pediatric patients. Fifty procedures—both endoscopic and non-endoscopic—are described in a concise, structured,...
What matters in understanding digital media? Is looking at the external appearance and audience experience of software enough--or should we look further? In Expressive Processing, Noah Wardrip-Fruin argues that understanding what goes on beneath the surface, the computational processes that make digital media function, is...
As a graduate student at Ohio State in the mid-1970s, I inherited a unique computer
vision laboratory from the doctoral research of previous students. They had
designed and built an early frame-grabber to deliver digitized color video from a
(very large) electronic video camera on a tripod to a mini-computer (sic) with a...