Constitutes the refereed proceedings of the 7th International Conference on Ubiquitous Computing, UbiComp 2005, held in Japan ...
Continue reading
The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Continue reading
This volume provides a comprehensive view of unconstrained face recognition, especially face recognition from multiple still ...
Continue reading
The field of computer vision has developed significantly over the last several years and the application areas span a broad ...
Continue reading
this book is based on the fact that it is the usersâ judgments that is the final measure regarding usability and acceptance ...
Continue reading
This monograph presents a complete computational system for visual attention and object detection: VOCUS (Visual Object detection ...
Continue reading
Tthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
Continue reading
This volume brings together the invited papers and selected participants’ contributions presented at the COST 2102 International ...
Continue reading
This book is organized in topical sections on static and dynamic processing of faces, facial expressions and gaze as well ...
Continue readingAmbulatory sanctions are often seen as a humane alternative to deprivation of liberty. The nature of intervention, the perspective ...
Continue reading
This volume, edited by Randall Shumaker, contains papers in the thematic area of Virtual Reality, addressing the following ...
Continue reading
Image analysis is a computational feat which humans show excellence in, in comp- ison with computers. Yet the list of applications ...
Continue reading
Vthe 8th International Conference on VISual Information Systems held in Amsterdam dealt with a variety of aspects, from visual ...
Continue reading
This book takes steps towards the realization of domestic robots by presenting an integrated systems view of computer vision ...
Continue reading
This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Continue reading
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Continue readingThe study presents an innovative voice-controlled prosthetic hand for amputees below the elbow to retrieve some of the hand ...
Continue reading
Conceptualising employment and volunteering as two distinct forms of social inclusion, Susanne Strauß analyses their interrelations ...
Continue reading
the book include: workshop was the first in the field to focus on the interplay between (a) intelligent technologies, especially ...
Continue reading
The aim of the series of annual W2GIS workshops is to provide an up-to-date review of advances on recent devel- ment and ...
Continue reading