|
|
|
|
|
| | Image Fusion: Algorithms and ApplicationsA complete resource containing in one volume the latest algorithms, design techniques and applications on the 'hot' topic of image fusion
The application of sensor technology has brought considerable interest in the area of image fusion. Written by leading experts in the field, this book brings together in one volume the most... | | |
|
Guide to Computer Network Security (Computer Communications and Networks)Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to... | | Computational Fluid Dynamics: An Introduction (Von Karman Institute Book)Computational Fluid Dynamics: An Introduction grew out of a von Karman Institute (VKI) Lecture Series by the same title first presented in 1985 and repeated with modifications every year since that time.
The objective, then and now, was to present the subject of computational fluid dynamics (CFD) to an audience unfamiliar with all but... | | The Method Framework for Engineering System ArchitecturesOne of the biggest sources of pain in system development is “system integration and test.” This is frequently where projects sailing along with all-green progress reports and Earned Value Management System status summaries start to see these indicators increasingly turn to yellow and then to red. Projects that were thought to be 80... |
|
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian... | | Computational Prospects Of Infinity - Part I: Tutorials (Lecture Notes)This volume presents the written versions of the tutorial lectures given at the Workshop on Computational Prospects of Infinity, held from 18 June to 15 August 2005 at the Institute for Mathematical Sciences, National University of Singapore. It consists of articles by four of the leading experts in recursion theory (computability theory) and set... | | |
|
|
Result Page: Previous 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 Next |