|
|
|
|
Computer Vision: A Modern Approach (2nd Edition)
Computer vision as a field is an intellectual frontier. Like any frontier, it is
exciting and disorganized, and there is often no reliable authority to appeal to.
Many useful ideas have no theoretical grounding, and some theories are useless
in practice; developed areas are widely scattered, and ... | | Reliable Communications for Short-Range Wireless Systems
Ensuring reliable communication is an important concern in short-range wireless communication systems with stringent quality of service requirements. Key characteristics of these systems, including data rate, communication range, channel profiles, network topologies and power efficiency, are very different from those in long-range systems.... | | Principles of Accounting (Financial Accounting)
Needles/Powers/Crosson delivers interactive pedagogy by illustrating accounting principles and real-world examples to encourage critical thinking. This revision is based on an understanding of the nature, culture, and motivations of today's students and on extensive feedback from instructors. These substantial changes meet the needs of... |
|
Tcl/Tk 8.5 Programming Cookbook
Created in 1988 by John Ousterhoult, while working at the University of Califormia, Berkeley, Tcl (Tool Command Language) is a scripting language originally designed for embedded system platforms. Since its creation, Tcl has grown far beyond its original design with numerous expansions and additions (such as the graphical Took Kit or Tk) to... | | Concise Guide to Computation Theory
What is the theory of computation all about? The theory of computation embodies
the principle by which computers have become the basis of modern digital technology,
which makes a computer perform as desired, and which, consequently, has
led to the prosperity of our advanced information society (just as physical sciences
constitute the... | | WordPress 3 Ultimate Security
Most likely, today, some hacker tried to crack your WordPress site, its data and
content. Maybe that was just a one-off from some bored kid. Just as likely, it was an
automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it
was both.
Whether you've been successfully hacked already, else... |
|
|
|
|
Result Page: Previous 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 Next |