Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Forensics and Security
Multimedia Forensics and Security
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,...
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques

This volume contains the papers presented at the 14th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX 2011) and the 15th International Workshop on Randomization and Computation (RANDOM 2011), which took place concurrently in Princeton University, USA, during August 17–19,...

Eye Tracking Methodology: Theory and Practice
Eye Tracking Methodology: Theory and Practice
Despite the availability of cheap, fast, accurate and usable eye trackers, there is still little information available on how to develop, implement and use these systems. This second edition of Andrew Duchowski’s successful guide to these systems contains significant additional material on the topic and fills this gap in the market with this...
Canon EOS Digital Rebel XSi/450D (Focal Digital Camera Guides)
Canon EOS Digital Rebel XSi/450D (Focal Digital Camera Guides)
Focal Digital Camera Guides: Canon EOS Digital Rebel XSi/450D

Just bought a Canon EOS Digital Rebel XSi/450D and looking to combine practical know-how with inspiration? This one-stop, easy-to-read guide covers all the basic functions of the camera, and everything beyond.

For the basics, turn to the quick start guide, which
...
Grouping Multidimensional Data: Recent Advances in Clustering
Grouping Multidimensional Data: Recent Advances in Clustering
Clustering is a fundamental problem that has numerous applications in many disciplines. Clustering techniques are used to discover natural groups in datasets and to identify abstract structures that might reside there, without having any background knowledge of the characteristics of the data. They have been used in various areas including...
Fundamentals of Probability: With Stochastic Processes
Fundamentals of Probability: With Stochastic Processes

"The 4th edition of Ghahramani's book is replete with intriguing historical notes, insightful comments, and well-selected examples/exercises that, together, capture much of the essence of probability. Along with its Companion Website, the book is suitable as a primary resource for a first course in probability. Moreover, it...

Railroad Vehicle Dynamics: A Computational Approach
Railroad Vehicle Dynamics: A Computational Approach
The methods of computational mechanics have been used extensively in modeling many physical systems. The use of multibody-system techniques, in particular, has been applied successfully in the study of various, fundamentally different applications. Railroad Vehicle Dynamics: A Computational Approach presents a computational multibody-system...
Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara
Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized...

Systematic Design for Emergence in Cellular Nonlinear Networks: With Applications in Natural Computing and Signal Processing-
Systematic Design for Emergence in Cellular Nonlinear Networks: With Applications in Natural Computing and Signal Processing-
The main problem addressed in this book came out during a Fulbright research fellowship stage at U.C. Berkeley (California, USA, 1996–1998). Then, I had the opportunity to work in the research group of Leon Chua on a subject called CNN (cellular neural/nonlinear network). The CNN, developed in the end of the 1980s was an important step ahead...
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Proceedings of the 22nd International Meshing Roundtable
Proceedings of the 22nd International Meshing Roundtable

This volume contains the articles presented at the 22nd International Meshing Roundtable (IMR) organized, in part, by Sandia National Laboratories and was held on Oct 13-16, 2013 in Orlando, Florida, USA. The first IMR was held in 1992, and the conference series has been held annually since. Each year the IMR brings together researchers,...

DVD Authoring and Production
DVD Authoring and Production
SPECIAL FEATURE: A copy of the author's own DVD title, StarGaze, is included to provide real-world examples of each DVD authoring and production process. This book takes up where DVD Demystified leaves off, explaining the vital details of designing, producing, and selling a DVD. Don't make a disc without it. - Jim Taylor, Chief of DVD...
unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy