 |
|
|
 |  |  |  |  Depth Map and 3D Imaging Applications: Algorithms and Technologies
This book has three editors, and all of us are involved in image processing and computer vision research.
We have contributed to the 3D imaging research, especially in the field of passive optical 3D shape
recovery methods. Over the last decade, significant progress had been made in 3D imaging research. As
a result, 3D imaging... |
|
 The Complete IS-IS Routing Protocol
IS-IS has always been my favourite Interior Gateway Protocol. Its elegant simplicity, its
well-structured data formats, its flexibility and easy extensibility are all appealing – IS-IS
epitomizes link-state routing. Whether for this reason or others, IS-IS is the IGP of choice
in some of the world’s largest networks.... |  |  Classification, Clustering, and Data Mining Applications: Proceedings
This book presents some of the key research undertaken by the members of
the International Federation of Classification Societies during the two years
since our last symposium. If the past is a guide to the future, these papers
contain the seeds of new ideas that will invigorate our field.
The editors are grateful... |  |  Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this... |
|
|
| Result Page: 438 437 436 435 434 433 432 431 430 429 428 427 426 425 424 423 422 421 420 |