Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
An Invitation to 3-D Vision: From Images to Geometric Models (Interdisciplinary Applied Mathematics)
An Invitation to 3-D Vision: From Images to Geometric Models (Interdisciplinary Applied Mathematics)
This book is intended to give students at the advanced undergraduate or introductory graduate level, and researchers in computer vision, robotics and computer graphics, a self-contained introduction to the geometry of three-dimensional (3- D) vision. This is the study of the reconstruction of 3-D models of objects from a...
Reliability Engineering: Theory and Practice
Reliability Engineering: Theory and Practice

This book shows how to build in, evaluate, and demonstrate reliability and availability of components, equipment, systems. It presents the state-of-the-art of reliability engineering, both in theory and practice, and is based on the author's more than 30 years experience in this field, half in industry and half as Professor of Reliability...

Stochastic Modeling and Analysis of Telecoms Networks
Stochastic Modeling and Analysis of Telecoms Networks

This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
The authors propose a
...

Big and Complex Data Analysis: Methodologies and Applications (Contributions to Statistics)
Big and Complex Data Analysis: Methodologies and Applications (Contributions to Statistics)

This volume conveys some of the surprises, puzzles and success stories in high-dimensional and complex data analysis and related fields. Its peer-reviewed contributions showcase recent advances in variable selection, estimation and prediction strategies for a host of useful models, as well as essential new developments in the field.

...

Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
Relations and Kleene Algebra in Computer Science: 11th International Conference on Relational Methods in Computer Science, RelMiCS 2009, and 6th . . . ... Issues) (Lecture Notes in Computer Science)
Relations and Kleene Algebra in Computer Science: 11th International Conference on Relational Methods in Computer Science, RelMiCS 2009, and 6th . . . ... Issues) (Lecture Notes in Computer Science)
The book constitutes the joint refereed proceedings of the 11th International Conference on Relational Methods in Computer Science, RelMiCS 2009, and the 6th International Conference on Applications of Kleene Algebras, AKA 2009, held in Doha, Qatar in November 2009. The 22 revised full papers presented together with 2 invited papers were...
Applied Gas Dynamics
Applied Gas Dynamics

A revised edition to applied gas dynamics with exclusive coverage on jets and additional sets of problems and examples

The revised and updated second edition of Applied Gas Dynamics offers an authoritative guide to the science of gas dynamics. Written by a noted expert on the topic, the text contains a...

Theory of the Earth
Theory of the Earth
We need a new philosophy of the earth. Geological time used to refer to slow and gradual processes, but today we are watching land sink into the sea and forests transform into deserts. We can even see the creation of new geological strata made of plastic, chicken bones, and other waste that could remain in the fossil record for millennia or...
Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms
An unparalleled learning tool and guide to error correction coding

Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...

Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

unlimited object storage image
Result Page: 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy