These two volumes constitute the refereed proceedings of the First International Conference on Intelligent Robotics and Applications, ...
اقرأ المزيد
                This book introduces the most important basic concepts of computer graphics, coupling the technical background and theory ...
اقرأ المزيد
                The geometric ideas in computer science, mathematics, engineering, and physics have considerable overlap and students in ...
اقرأ المزيد
                This book provides a comprehensive coverage of the most important machine learning techniques used and their application ...
اقرأ المزيد
                This book constitutes the thoroughly refereed post-workshop proceedings of the First International Workshop on Motion in ...
اقرأ المزيدMedia forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share ...
اقرأ المزيد
                Multimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results ...
اقرأ المزيد
                This book, edited and authored by a team of world-leading researchers, provides a broad overview of advanced photonic methods ...
اقرأ المزيد
                This book is organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, ...
اقرأ المزيد
                This book is organized in topical sections on sketching, navigation and selection, studies and evaluation, camera planning, ...
اقرأ المزيد
                This book includes spatial orientation, spatial navigation, spatial learning, maps and modalities, spatial communication, ...
اقرأ المزيد
                This book gives a comprehensive and up-to-date account of the optimisation approach to shape correspondence, and the question ...
اقرأ المزيد
                The field of computer vision has developed significantly over the last several years and the application areas span a broad ...
اقرأ المزيد
                This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
اقرأ المزيد
                Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
اقرأ المزيد