|
|
|
|
Biologically Motivated Computer VisionThis book constitutes the refereed proceedings of the Second International Workshop on Biologically Motivated Computer Vision, BMCV 2002, held in Tübingen, Germany, in November 2002.
The 22 revised full papers and 37 revised short papers presented together with 6 invited papers were carefully reviewed and selected from 97... | | Applying UML: Advanced ApplicationsSo why did we write "yet another" book on the UML? Does the world need it and what, if anything, makes it distinctive? The real answer is that the only way to answer those questions is to read the end result. Here, however, are some of our answers.
In an attempt to end the "object oriented Tower of Babel", the Unified... | | Flash 3D Cheats Most WantedDigital 3D is a tricky area &emdash; and until the day someone makes 3D TV commercially viable, its going to remain a tricky area. What is 3D? Can you genuinely render 3D on a flat screen? Do you have to spend a years wages to get a dedicated piece of 3D software? Do you have to conjure up a bunch of complex math techniques to make the... |
|
Expert One-on-One Visual Basic .NET Business ObjectsWhether you've already made the move to Visual Basic .NET, or you want to know what's in it for you when you do, Expert One-on-One Visual Basic .NET Business Objects will show you the kinds of opportunities that .NET makes available. It will allow you to make clear, informed decisions about the right way to develop your projects,... | | Peer-to-Peer with VB .NETPeer-to-peer proponents claim that their technology holds the keys to building virtual supercomputers, sharing vast pools of knowledge, and creating self-sufficient communities on the Internet. Peer-to-Peer with VB .NET explores how these design ideas can be integrated into existing .NET applications.
This book is an honest... | | HackNotes(tm) Network Security Portable ReferenceHackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted... |
|
| | How To Do Everything with Your Tablet PCExplore the capabilities and benefits of your Tablet PC hardware and software with help from this easy-to-understand guide. Get a thorough run-through of your new device, as well as the Windows XP Tablet PC Edition operating system that runs on it. Once you've become familiar with the hardware and software features, follow helpful chapters that... | | Turing (A Novel about Computation)Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a... |
|
|
|
Result Page: Previous 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 Next |