This book includes spatial orientation, spatial navigation, spatial learning, maps and modalities, spatial communication, ...
Continue readingThis book gives a comprehensive and up-to-date account of the optimisation approach to shape correspondence, and the question ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Workshop on Structural and Syntactic Pattern Recognition, ...
Continue readingThis book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...
Continue readingThis book was inspired by the last argument and resulted from the workshop on Supervised and Unsupervised Ensemble Methods ...
Continue readingThis book explains the principles that make support vector machines (SVMs) a successful modelling and prediction tool for ...
Continue readingThe support vector machine (SVM) has become one of the standard tools for machine learning and data mining. This carefully ...
Continue readingA concise and accessible introduction to the science and applications of text analytics (or text mining), which enables automatic ...
Continue readingThis volume presents the results of the Neural Information Processing Systems Competition track at the 2018 NeurIPS conference. ...
Continue readingToday’s mobile robot perception is insufficient for acting goal-directedly in unconstrained, dynamic everyday environments ...
Continue readingThis, the 37th issue of the Transactions on Computational Science, is devoted to the area of Computer Graphics. The 9 papers ...
Continue readingThe field of computer vision has developed significantly over the last several years and the application areas span a broad ...
Continue readingTthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
Continue readingThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Continue readingNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Continue readingThis book includs but not limited to Conceptual and logical models, Data management and retrieval, Geographical search engines, ...
Continue reading