These two volumes constitute the refereed proceedings of the First International Conference on Intelligent Robotics and Applications, ...
Continue readingThis book introduces the most important basic concepts of computer graphics, coupling the technical background and theory ...
Continue readingThe geometric ideas in computer science, mathematics, engineering, and physics have considerable overlap and students in ...
Continue readingThis book provides a comprehensive coverage of the most important machine learning techniques used and their application ...
Continue readingThis book constitutes the thoroughly refereed post-workshop proceedings of the First International Workshop on Motion in ...
Continue readingMedia forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share ...
Continue readingMultimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results ...
Continue readingThis book, edited and authored by a team of world-leading researchers, provides a broad overview of advanced photonic methods ...
Continue readingThis book is organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, ...
Continue readingThis book is organized in topical sections on sketching, navigation and selection, studies and evaluation, camera planning, ...
Continue readingThis book includes spatial orientation, spatial navigation, spatial learning, maps and modalities, spatial communication, ...
Continue readingThis book gives a comprehensive and up-to-date account of the optimisation approach to shape correspondence, and the question ...
Continue readingThe field of computer vision has developed significantly over the last several years and the application areas span a broad ...
Continue readingThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Continue readingNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Continue reading