This book is a collection of carefully selected works presented at the Third International Conference on Computer Vision ...
Continue readingThis book is organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, ...
Continue readingThis book presents research results on the application of advanced signal processing techniques for improving the value of ...
Continue readingThe unprecedented growth in the range of multimedia services offered today by modern telecommunication systems, is possible ...
Continue readingParticularly intense lightning discharges can produce transient luminous events above thunderclouds, termed sprites, elves ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Workshop on Structural and Syntactic Pattern Recognition, ...
Continue readingThis book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...
Continue readingIn this volume the important concept of switched and impulsive control is discussed, with a wide field of applications in ...
Continue readingReal examples clearly demonstrate both traditional and emerging approaches to systems analysis and design, including object-oriented ...
Continue readingUnleash your iPhone and take it to the limit using secret tips and techniques from gadget hacker Erica Sadun. Fast and fun ...
Continue readingA total of 90 papers were selected, after peer review, for this volume. Topics of these papers fall into six diff- ent areas ...
Continue readingTerrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to ...
Continue readingTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques ...
Continue readingBegins with a concise review of the basic science of tissues and then moves into diagnosis, treatment planning, and surgical ...
Continue readingThis book begins with an algorithm–a set of IF…THEN rules used in the development of a new, ethical, video surveillance ...
Continue readingThis text is a light technical introduction to the three technical foundations for multimedia applications across the Internet: ...
Continue readingThe non-interference perspective is common when theorizing about the protection of the private life of individuals and their ...
Continue readingGuidelines for taking SketchUp to the next level in order to incorporate it into every phase of the architectural design ...
Continue readingThe VC-1 and H.264 Video Compression Standards for Broadband Video Services covers these video coding standards, as well ...
Continue readingTrade Unions on YouTube provides a much-needed assessment of how old social movement actors employ new social media platforms ...
Continue reading