These two volumes constitute the refereed proceedings of the First International Conference on Intelligent Robotics and Applications, ...
Lire la suiteThis book introduces the most important basic concepts of computer graphics, coupling the technical background and theory ...
Lire la suiteThe geometric ideas in computer science, mathematics, engineering, and physics have considerable overlap and students in ...
Lire la suiteThis book provides a comprehensive coverage of the most important machine learning techniques used and their application ...
Lire la suiteThis book constitutes the thoroughly refereed post-workshop proceedings of the First International Workshop on Motion in ...
Lire la suiteMedia forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share ...
Lire la suiteMultimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results ...
Lire la suiteThis book, edited and authored by a team of world-leading researchers, provides a broad overview of advanced photonic methods ...
Lire la suiteThis book is organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, ...
Lire la suiteThis book is organized in topical sections on sketching, navigation and selection, studies and evaluation, camera planning, ...
Lire la suiteThis book includes spatial orientation, spatial navigation, spatial learning, maps and modalities, spatial communication, ...
Lire la suiteThis book gives a comprehensive and up-to-date account of the optimisation approach to shape correspondence, and the question ...
Lire la suiteThe field of computer vision has developed significantly over the last several years and the application areas span a broad ...
Lire la suiteThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Lire la suiteNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Lire la suite