Home | Amazing | Today | Tags | Publishers | Years | Search 
Pattern Recognition: Concepts, Methods and Applications
Pattern Recognition: Concepts, Methods and Applications
Pattern recognition currently comprises a vast body of methods supporting the development of numerous applications in many different areas of activity. The generally recognized relevance of pattern recognition methods and techniques lies, for the most part, in the general trend or "intelligent" task emulation, which has definitely...
Dynamic Contrast-Enhanced Magnetic Resonance Imaging in Oncology (Medical Radiology / Diagnostic Imaging)
Dynamic Contrast-Enhanced Magnetic Resonance Imaging in Oncology (Medical Radiology / Diagnostic Imaging)
Radiologists have long been interested in imaging and measuring blood fl ow and in characterising the structure of blood vessels within pathological tissues. In 1927 Egas Moniz described the technique of cerebral angiography using injection of radio-opaque contrast agent combined with conventional radiology. His earlier published...
Haptic Human-Computer Interaction
Haptic Human-Computer Interaction

Haptic devices allow users to feel their interfaces and interactions. This has the potential to radically change the way we use computers. Haptic interaction is interaction related to the sense of touch. This could be based on force-feedback or tactile devices. We can take advantage of our powerful sense of touch as an alternative...

Radiology of the Stomach and Duodenum (Medical Radiology / Diagnostic Imaging)
Radiology of the Stomach and Duodenum (Medical Radiology / Diagnostic Imaging)

A number of imaging techniques, many of them complementary, are used in the investigation and treatment of disorders of the stomach and duodenum. Optimal patient treatment requires a thorough knowledge of the application of these techniques, as well as a sound understanding of pathology of the stomach and its presenting symptomatology. This...

Algorithm Engineering: 4th International Workshop, WAE 2000 Saarbrucken, Germany, September 5-8, 2000 Proceedings
Algorithm Engineering: 4th International Workshop, WAE 2000 Saarbrucken, Germany, September 5-8, 2000 Proceedings
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Algorithm Engineering, WAE 2000, held in Saarbrücken, Germany in September 2000. The 19 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 30 submissions. Among the topics addressed...
The Design of Rijndael: AES - The Advanced Encryption Standard
The Design of Rijndael: AES - The Advanced Encryption Standard

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology.|This book by the designers of the block cipher presents...

A Generative Theory of Shape (Lecture Notes in Computer Science, 2145)
A Generative Theory of Shape (Lecture Notes in Computer Science, 2145)
From the reviews:

"This book is intended for a general scientifically interested audience . The author develops a generative theory of shape along two principles fundamental to intelligence maximization of transfer and maximization of recoverability. He proceeds by using an algebraically flavoured approach characterizing features as...

Intelligent Data Analysis
Intelligent Data Analysis
This monograph is a detailed introductory presentation of the key classes of intelligent data analysis methods. The ten coherently written chapters by leading experts provide complete coverage of the core issues.

The first half of the book is devoted to the discussion of classical statistical issues, ranging from the basic concepts of...

Multiset Processing: Mathematical, Computer Science, and Molecular Computing Points of View (Lecture Notes in Computer Science)
Multiset Processing: Mathematical, Computer Science, and Molecular Computing Points of View (Lecture Notes in Computer Science)
The multiset (a set with multiplicities associated with its elements, in the form of natural numbers) is a notion which has appeared again and again in many areas of mathematics and computer science, sometimes called a bag (some historical information appears in the enclosed paper by A. Syropoulos). As a data structure, this...
Number Theory for Computing
Number Theory for Computing
There are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists...
Fundamentals of Computer Security
Fundamentals of Computer Security

This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key...

Theoretical Aspects of Computer Science: Advanced Lectures (Lecture Notes in Computer Science)
Theoretical Aspects of Computer Science: Advanced Lectures (Lecture Notes in Computer Science)
The First Summer School on Theoretical Aspects on Computer Science was held at the Institute for Studies in Theoretical Physics and Mathematics (IPM) from July 3-10, 2000.

The idea of organizing a summer school was originated during a conversation between the first and the second editor of this volume in the winter
...
Result Page: Previous 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy