Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Interaction and Intelligent User Interfaces: Principles, Methods and Applications
Multimedia Interaction and Intelligent User Interfaces: Principles, Methods and Applications

Consumer electronics (CE) devices, providing multimedia entertainment and enabling communication, have become ubiquitous in daily life. However, consumer interaction with such equipment currently requires the use of devices such as remote controls and keyboards, which are often inconvenient, ambiguous and non-interactive. An important...

Human Factors and Ergonomics in Consumer Product Design: Methods and Techniques (Handbook of Human Factors in Consumer Product Design)
Human Factors and Ergonomics in Consumer Product Design: Methods and Techniques (Handbook of Human Factors in Consumer Product Design)

Every day we interact with thousands of consumer products. We not only expect them to perform their functions safely, reliably, and efficiently, but also to do it so seamlessly that we don’t even think about it. However, with the many factors involved in consumer product design, from the application of human factors and ergonomics...

Semantic-Based Visual Information Retrieval
Semantic-Based Visual Information Retrieval
Content-based visual information retrieval (CBVIR) is one of the most interesting research topics in the last years for the image and video community. With the progress of electronic equipment and computer techniques for visual information capturing and processing, a huge number of image and video records have been collected. Visual information...
VMware VI and vSphere SDK: Managing the VMware Infrastructure and vSphere
VMware VI and vSphere SDK: Managing the VMware Infrastructure and vSphere
Virtualization is not a new concept, but it is changing the computing industry in a profound way. Server virtualization is now #1 on enterprises’ budget lists. According to analysts, it will continue to be the highest impact trend, changing infrastructure and operations through 2012.

Virtualization became popular for two reasons.
...
Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Mudbox 2013 Cookbook
Mudbox 2013 Cookbook
Sculpting software has changed the face of the 3D industry. Whether you are creating a character for the next Avatar movie or adding details to a post apocalyptic city in The Last of Us, 3D sculpting has become an essential tool for creating a level of realism in digital art that was much harder to achieve in the past. A couple of...
Augmented Reality for Android Application Development
Augmented Reality for Android Application Development

As an Android developer, including Augmented Reality (AR) in your mobile apps could be a profitable new string to your bow. This tutorial takes you through every aspect of AR for Android with lots of hands-on exercises.

Overview

  • Understand the main concepts and architectural components of an AR...
Learning System Center App Controller
Learning System Center App Controller

Design, implement, and manage System Center App Controller

About This Book

  • Manage application services using System center App controller
  • Move Virtual Machines from on-premises to Microsoft Azure Cloud, Managing Private Cloud, and Public Microsoft Azure Cloud
  • Step-by-step...
Unit Operations: An Approach to Videogame Criticism
Unit Operations: An Approach to Videogame Criticism
"Bogost challenges humanists and technologists to pay attention to one another, something they desperately need to do as computation accelerates us into the red zones of widespread virtual reality. This book gives us what we need to meet that challenge: a general theory for understanding creativity under computation, one that will apply...
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and...
Hacking exposed web applications, 3rd Edition
Hacking exposed web applications, 3rd Edition

There is no escaping the reality that businesses live on the Web today. From banks to bookstores, from auctions to games, the Web is the place where most businesses ply their trade. For consumers, the Web has become the place where they do the majority of their business as well. For example, nearly 50 percent of all retail music sales in the...

Windows Server 2012 Hyper-V: Deploying Hyper-V Enterprise Server Virtualization Platform
Windows Server 2012 Hyper-V: Deploying Hyper-V Enterprise Server Virtualization Platform

The only thing which is not constant is change; change provides new ideologies and methodologies for getting things done in more efficient and cost-effective ways. We all have been seeing a drastic shift of industry where every single product and IT system being supported is migrated to a virtualized server platform also known as a virtual...

unlimited object storage image
Result Page: 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy