These two volumes constitute the refereed proceedings of the First International Conference on Intelligent Robotics and Applications, ...
Continue reading
This book introduces the most important basic concepts of computer graphics, coupling the technical background and theory ...
Continue reading
The geometric ideas in computer science, mathematics, engineering, and physics have considerable overlap and students in ...
Continue reading
This book provides a comprehensive coverage of the most important machine learning techniques used and their application ...
Continue reading
This book constitutes the thoroughly refereed post-workshop proceedings of the First International Workshop on Motion in ...
Continue readingMedia forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share ...
Continue reading
Multimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results ...
Continue reading
This book, edited and authored by a team of world-leading researchers, provides a broad overview of advanced photonic methods ...
Continue reading
This book is organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, ...
Continue reading
This book is organized in topical sections on sketching, navigation and selection, studies and evaluation, camera planning, ...
Continue reading
This book includes spatial orientation, spatial navigation, spatial learning, maps and modalities, spatial communication, ...
Continue reading
This book gives a comprehensive and up-to-date account of the optimisation approach to shape correspondence, and the question ...
Continue reading
The field of computer vision has developed significantly over the last several years and the application areas span a broad ...
Continue reading
This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Continue reading
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Continue reading