This book is a collection of carefully selected works presented at the Third International Conference on Computer Vision ...
Lire la suiteThis book is organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, ...
Lire la suiteThis book presents research results on the application of advanced signal processing techniques for improving the value of ...
Lire la suiteThe unprecedented growth in the range of multimedia services offered today by modern telecommunication systems, is possible ...
Lire la suiteParticularly intense lightning discharges can produce transient luminous events above thunderclouds, termed sprites, elves ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Workshop on Structural and Syntactic Pattern Recognition, ...
Lire la suiteThis book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...
Lire la suiteIn this volume the important concept of switched and impulsive control is discussed, with a wide field of applications in ...
Lire la suiteReal examples clearly demonstrate both traditional and emerging approaches to systems analysis and design, including object-oriented ...
Lire la suiteUnleash your iPhone and take it to the limit using secret tips and techniques from gadget hacker Erica Sadun. Fast and fun ...
Lire la suiteA total of 90 papers were selected, after peer review, for this volume. Topics of these papers fall into six diff- ent areas ...
Lire la suiteTerrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to ...
Lire la suiteTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques ...
Lire la suiteBegins with a concise review of the basic science of tissues and then moves into diagnosis, treatment planning, and surgical ...
Lire la suiteThis book begins with an algorithm–a set of IF…THEN rules used in the development of a new, ethical, video surveillance ...
Lire la suiteThis text is a light technical introduction to the three technical foundations for multimedia applications across the Internet: ...
Lire la suiteThe non-interference perspective is common when theorizing about the protection of the private life of individuals and their ...
Lire la suiteGuidelines for taking SketchUp to the next level in order to incorporate it into every phase of the architectural design ...
Lire la suiteThe VC-1 and H.264 Video Compression Standards for Broadband Video Services covers these video coding standards, as well ...
Lire la suiteTrade Unions on YouTube provides a much-needed assessment of how old social movement actors employ new social media platforms ...
Lire la suite