Electronic Books

Total Books: 4581 - 4600 /4684
NoIMG
Virtual, Distributed and Flexible Organisations

Organisational Semiotics offers an effective approach to analysing organisations and modelling organisational behaviour. ...

Lire la suite
Virtuality and Virtualization

This book begins with consideration of possible frameworks for understanding virtuality and virtualization. It examines group ...

Lire la suite
NoIMG
Virus Detection (VICE VERSA) / Moayad Al-Khanji , Osama Kutit , Obada Al-Sabbagh , Khaled Mardini and Abdalrahman Saleh ; supervised by Rami Yard and Kholud Al-Jallad مؤيد عبد الوهاب الخانجي ، اسامة قطيط ، عبادة الصباغ ، خالد فريد مارديني و عبد الرحمن محمد صالح ؛ إشراف رامي يارد و خلود الجلاد

Hacking Detection using AI is a hot research topic. There are two types of Intrusion Detection Systems (IDS), Network IDS(NIDS) ...

Lire la suite
Vision with Direction

Image analysis is a computational feat which humans show excellence in, in comp- ison with computers. Yet the list of applications ...

Lire la suite
Visual Content Processing and Representation

This book is a post-conference publication and contains a selection of papers presented at the VLBV workshop in 2005, Fifty-?ve ...

Lire la suite
Visual Data Mining : Theory, Techniques and Tools for Visual Analytics

The volume is structured in three parts on theory and methodologies, techniques, and tools and applications.

Lire la suite
Visual Information Systems. Web-Based Visual Information Search and Management : 10th International Conference, VISUAL 2008, Salerno, Italy, September 11-12, 2008. Proceedings

This book covered are information and data visualization; advances techniques for visual information management; mobile visual ...

Lire la suite
Visual Information and Information Systems

Vthe 8th International Conference on VISual Information Systems held in Amsterdam dealt with a variety of aspects, from visual ...

Lire la suite
Visual Perception and Robotic Manipulation

This book takes steps towards the realization of domestic robots by presenting an integrated systems view of computer vision ...

Lire la suite
Visual Question Answering: From Theory to Application / Qi Wu, Peng Wang, Xin Wang, Xiaodong He, Wenwu Zhu

Combines visual inputs like image and video with a natural language question concerning the input and generates a natural ...

Lire la suite
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

Lire la suite
Visualization for Information Retrieval

The amount of digitized information available on the Internet, in digital libraries, and other forms of information systems ...

Lire la suite
Visualizing Information Using SVG and X3D

The first great graphics technology for the Web,VRML,has been mistaken for something else since its inception. Viewed variously ...

Lire la suite
Visualizing the Semantic Web

This pioneering book deals specifically with the visualization of the Second-Generation Web. Now in its second edition it ...

Lire la suite
Visualizing the Structure of Science

Vargas-Quesada and Moya-Anegón propose a methodology for visualizing large scientific domains. They create science maps, ...

Lire la suite
VizSEC 2007 : Proceedings of the Workshop on Visualization for Computer Security

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...

Lire la suite
NoIMG
Voice controlled robotic arm / AlMouthana Alshoufani , Nuriddin Audeh , Mohammad shahrour , Andrey mokhammad and Ahmad Salamoun ; supervised by Tarek Barhoum and Mohammad Almasry المثنى الشوفاني ، نور الدين عودة ، محمد شحرور ، اندريه عدنان محمد و احمد سلمون ؛ إشراف طارق برهوم و محمد المصري

The study presents an innovative voice-controlled prosthetic hand for amputees below the elbow to retrieve some of the hand ...

Lire la suite
Voltage Stability of Electric Power Systems

The book describes practical methods that can be used for voltage security assessment and offers a variety of examples. This ...

Lire la suite
Vulnerability Analysis and Defense for the Internet

This book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...

Lire la suite
WALCOM: Algorithms and Computation : Second International Workshop, WALCOM 2008, Dhaka, Bangladesh, February 7-8, 2008. Proceedings

This book features original research in the areas of algorithms and data structures, combinatorial algorithms, graph drawings ...

Lire la suite
Total Books: 4581 - 4600 /4684