Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
From the reviews:

"...a useful reference for all biometric security professionals and researchers. The four coauthors have a distinguished combination of academic and professional experience....Overall, readers will be pleased with the style and substance of this book." -Computing Reviews

"This is a comprehensive reviews...

Machine Learning for Adaptive Many-Core Machines - A Practical Approach (Studies in Big Data)
Machine Learning for Adaptive Many-Core Machines - A Practical Approach (Studies in Big Data)

The overwhelming data produced everyday and the increasing performance and cost requirements of applications are transversal to a wide range of activities in society, from science to industry. In particular, the magnitude and complexity of the tasks that Machine Learning (ML) algorithms have to solve are driving the need to devise...

Mining the Web: Analysis of Hypertext and Semi Structured Data (The Morgan Kaufmann Series in Data Management Systems)
Mining the Web: Analysis of Hypertext and Semi Structured Data (The Morgan Kaufmann Series in Data Management Systems)
Mining the Web: Discovering Knowledge from Hypertext Data is the first book devoted entirely to techniques for extracting and producing knowledge from the vast body of unstructured Web data. Building on an initial survey of infrastructural issuesincluding Web crawling and indexingChakrabarti examines machine learning techniques as...
The Power of Survey Design: A User's Guide for Managing Surveys, Interpreting Results, and Influencing Respondents
The Power of Survey Design: A User's Guide for Managing Surveys, Interpreting Results, and Influencing Respondents
Are you in favor of financial incentives for poor countries?" If this question were asked in a survey many would be inclined to agree. Yet the result of this poll would be different if the question asked was "Are you in favor of subsidies for poor countries?" This is a simple example of how one single word, incentives or subsidies,...
Labour Women in Power: Cabinet Ministers in the Twentieth Century
Labour Women in Power: Cabinet Ministers in the Twentieth Century

This book examines the political lives and contributions of Margaret Bondfield, Ellen Wilkinson, Barbara Castle, Judith Hart and Shirley Williams, the only five women to achieve Cabinet rank in a Labour Government from the party’s creation until Blair became Prime Minister. Paula Bartley brings together newly discovered...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Earth Science: An Illustrated Guide to Science (Science Visual Resources)
Earth Science: An Illustrated Guide to Science (Science Visual Resources)

"Earth Science: An Illustrated Guide to Science" is one of eight volumes of "Facts On File's" new "Science Visual Resources" set. Containing six sections, a comprehensive glossary, a Web site guide, and an index, Biology is an ideal learning tool for students and teachers of science. Full-colour diagrams,...

Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Color Image Processing: Methods and Applications
Color Image Processing: Methods and Applications
Over the last two decades, we have witnessed an explosive growth in both the diversity of techniques and the range of applications of image processing. However, the area of color image processing is still sporadically covered, despite having become commonplace, with consumers choosing the convenience of color imaging over traditional grayscale...
Interactive Segmentation Techniques: Algorithms and Performance Evaluation (SpringerBriefs in Electrical and Computer Engineering)
Interactive Segmentation Techniques: Algorithms and Performance Evaluation (SpringerBriefs in Electrical and Computer Engineering)

This book focuses on interactive segmentation techniques, which have been extensively studied in recent decades. Interactive segmentation emphasizes clear extraction of objects of interest, whose locations are roughly indicated by human interactions based on high level perception. This book will first introduce classic graph-cut segmentation...

Modern Analysis of Customer Surveys: with Applications using R
Modern Analysis of Customer Surveys: with Applications using R
Customer survey studies deals with customers, consumers and user satisfaction from a product or service. In practice, many of the customer surveys conducted by business and industry are analyzed in a very simple way, without using models or statistical methods. Typical reports include descriptive statistics and basic graphical displays. As...
.NET Framework Essentials (2nd Edition)
.NET Framework Essentials (2nd Edition)
Fully updated for Microsoft's official release, .NET Framework Essentials, 2nd Edition is an objective, concise, and technical overview of the new Microsoft .NET Framework for developing web applications and services.

Specifically written for intermediate to advanced VB, C/C++, Java, and Delphi developers, .NET Framework...

unlimited object storage image
Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy