Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...
Continue readingThis book presents theoretical framework and sample applications of variant construction. The first part includes the components ...
Continue readingThe variational method is a powerful tool to investigate states and processes in technical devices, nature, living organisms, ...
Continue readingVenture capitalists (VCs) fund ventures with the aim of reaping a capital gain upon exit. Research has identified information ...
Continue readingVirtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
Continue readingOrganisational Semiotics offers an effective approach to analysing organisations and modelling organisational behaviour. ...
Continue readingCreating a virtual network allows you to maximize the use of your servers. Virtualization: From the Desktop to the Enterprise ...
Continue readingThe volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
Continue readingVthe 8th International Conference on VISual Information Systems held in Amsterdam dealt with a variety of aspects, from visual ...
Continue readingThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Continue readingThe amount of digitized information available on the Internet, in digital libraries, and other forms of information systems ...
Continue readingExternal representations (pictures, diagrams, graphs, concrete models) have always been valuable tools for the science teacher. ...
Continue readingThis pioneering book deals specifically with the visualization of the Second-Generation Web. Now in its second edition it ...
Continue readingVargas-Quesada and Moya-Anegón propose a methodology for visualizing large scientific domains. They create science maps, ...
Continue readingNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Continue readingThis book approaches the problem by actually identifying major perceptual dimensions of voice and speech quality perception, ...
Continue readingWith contributions from some of the most experienced and knowledgeable experts in the field, the book desbribes the state-of-the-art ...
Continue readingThe goal of this book is to explore the complexity of a microscopic bit of matter that exists in a myriad of copies within ...
Continue readingThis book gives a comprehensive account of the principles and applications of such filters, including their technological ...
Continue readingAs the applications of wavelet transform have spread to diverse areas of signal analysis and compression, students and practitioners ...
Continue reading