Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Foundations of Computer Vision: Computational Geometry, Visual Image Structures and Object Shape Detection (Intelligent Systems Reference Library)
Foundations of Computer Vision: Computational Geometry, Visual Image Structures and Object Shape Detection (Intelligent Systems Reference Library)

This book introduces the fundamentals of computer vision (CV), with a focus on extracting useful information from digital images and videos. Including a wealth of methods used in detecting and classifying image objects and their shapes, it is the first book to apply a trio of tools (computational geometry, topology and algorithms) in solving...

Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)
Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)
Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress best-selling book Ethereal Packet Sniffing.

This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows,
...
Unconstrained Face Recognition (International Series on Biometrics)
Unconstrained Face Recognition (International Series on Biometrics)
Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a...
Understanding GPS: Principles and Applications, Second Edition
Understanding GPS: Principles and Applications, Second Edition
"Every GPS engineer should have this book. An engineer can find in one place a thorough treatment of the entire GPS system. Will prove of great benefit to those first approaching a GPS engineering task, but the experienced engineer will also find it a valuable reference. The most complete description of the signal acquisition and tracking...
Pro SQL Server 2012 Practices
Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Biomedical Image Analysis: Tracking (Synthesis Lectures on Image, Video, & Multimedia Processing)
Biomedical Image Analysis: Tracking (Synthesis Lectures on Image, Video, & Multimedia Processing)
In biological and medical imaging applications, tracking objects in motion is a critical task. This book describes the state-of-the-art in biomedical tracking techniques. We begin by detailing methods for tracking using active contours, which have been highly successful in biomedical applications. The book next covers the major probabilistic...
Car PC Hacks
Car PC Hacks
A car PC or carputer is a car tricked-out with electronics for playing radio, music and DVD movies, connecting to the Internet, navigating and tracking with satellite, taking photos, and any electronic gadget a person wants in a car. All these devices are managed and controlled through a single screen or interface. The only place car PC enthusiasts...
Applying Computational Intelligence: How to Create Value
Applying Computational Intelligence: How to Create Value

The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines...

The Build Master: Microsoft's Software Configuration Management Best Practices
The Build Master: Microsoft's Software Configuration Management Best Practices

The first best-practice, start-to-finish guide for the software build process

Managing builds is crucial to the profitable delivery of high-quality software; however, the build process has been one of the least-understood stages of the entire development lifecycle....

Depth Map and 3D Imaging Applications: Algorithms and Technologies
Depth Map and 3D Imaging Applications: Algorithms and Technologies
This book has three editors, and all of us are involved in image processing and computer vision research. We have contributed to the 3D imaging research, especially in the field of passive optical 3D shape recovery methods. Over the last decade, significant progress had been made in 3D imaging research. As a result, 3D imaging...
Computer Vision Analysis of Image Motion by Variational Methods (Springer Topics in Signal Processing)
Computer Vision Analysis of Image Motion by Variational Methods (Springer Topics in Signal Processing)

This book presents a unified view of image motion analysis under the variational framework. Variational methods, rooted in physics and mechanics, but appearing in many other domains, such as statistics, control, and computer vision, address a problem from an optimization standpoint, i.e., they formulate it as the optimization of an objective...

Result Page: 44 43 42 41 40 39 38 37 36 35 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy