Organisational Semiotics offers an effective approach to analysing organisations and modelling organisational behaviour. ...
اقرأ المزيد
This book begins with consideration of possible frameworks for understanding virtuality and virtualization. It examines group ...
اقرأ المزيدHacking Detection using AI is a hot research topic. There are two types of Intrusion Detection Systems (IDS), Network IDS(NIDS) ...
اقرأ المزيد
Image analysis is a computational feat which humans show excellence in, in comp- ison with computers. Yet the list of applications ...
اقرأ المزيد
This book is a post-conference publication and contains a selection of papers presented at the VLBV workshop in 2005, Fifty-?ve ...
اقرأ المزيد
The volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
اقرأ المزيد
This book covered are information and data visualization; advances techniques for visual information management; mobile visual ...
اقرأ المزيد
Vthe 8th International Conference on VISual Information Systems held in Amsterdam dealt with a variety of aspects, from visual ...
اقرأ المزيد
This book takes steps towards the realization of domestic robots by presenting an integrated systems view of computer vision ...
اقرأ المزيد
Combines visual inputs like image and video with a natural language question concerning the input and generates a natural ...
اقرأ المزيد
This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
اقرأ المزيد
The amount of digitized information available on the Internet, in digital libraries, and other forms of information systems ...
اقرأ المزيد
The first great graphics technology for the Web,VRML,has been mistaken for something else since its inception. Viewed variously ...
اقرأ المزيد
This pioneering book deals specifically with the visualization of the Second-Generation Web. Now in its second edition it ...
اقرأ المزيد
Vargas-Quesada and Moya-Anegón propose a methodology for visualizing large scientific domains. They create science maps, ...
اقرأ المزيد
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
اقرأ المزيدThe study presents an innovative voice-controlled prosthetic hand for amputees below the elbow to retrieve some of the hand ...
اقرأ المزيد
The book describes practical methods that can be used for voltage security assessment and offers a variety of examples. This ...
اقرأ المزيد
This book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...
اقرأ المزيد
This book features original research in the areas of algorithms and data structures, combinatorial algorithms, graph drawings ...
اقرأ المزيد