Dragon Age: The World of Thedas: Volume 2

Dragon Age: The World of Thedas: Volume 2

Автор:

BioWare’s newest game «Dragon Age: Inquisition» will expand the universe of their epic series in profound ways. This comprehensive book of lore features exclusive art and information, exploring every corner of this dark fantasy masterpiece! Newcomers will appreciate how this volume covers everything they need to know about the world and characters of these smash-hit games! Dedicated fans will revel in the abundance of never-before-revealed secrets, the perfect companion to «Dragon Age: The World of Thedas: Volume 1»! From heroes to villains, to songs and food, and everything in between, this book puts the breath and depth of this inimitable fantasy at your fingertips.

Face Recognition

Face Recognition

Автор:

After 9/11 tragedy, governments in all over the world started to look more seriously to the levels of security they have at their airports and borders. Countries annual budgets were increased drastically to have the most recent technologies in identification, recognition and tracking of suspects. The demand growth on these applications helped researchers to be able to fund their research projects. One of most common biometric recognition techniques is face recognition. Although face recognition is not as accurate as the other recognition methods using iris or fingerprints, it still grabs huge attention of many researchers in the field of computer vision. The main reason behind this attention is the fact that the face is the conventional and the fastest way people use to identify each other. Since the mid of last century the researchers have been working extensively in the field of face recognition trying to introduce new approaches or improve the performance of the available approaches to obtain robust and accurate face recognition systems.

Resource Management for Performance Tuning of Composite Applications

Resource Management for Performance Tuning of Composite Applications

Автор:

Parallel Applications has become one of most demanded subjects on Science Computing for multiple purposes as wheather, biologics, human body, economy, Video On-Demand, image processing, and so on. Now, these applications has to optimize the use of resources in order to increase the performance. This book intends to provide an idea about performance tuning based on resources management strategies for composite applications. Composite applications are defined as those which are composed by two (or more) parallel structures as Master/Worker, Pipeline, SPMD and so on. I sincerely hope to provide a useful material for those who needs it. Thank you

The Art of Watch Dogs

The Art of Watch Dogs

Автор:

In today’s hyper-connected world, Chicago has the country’s most advanced computer system, known as the CtOS. Concept art and sketches show how the developers designed a living, breathing and «hack-able» cityscape. This book will focus on Aiden Pearce, his allies and enemies, building a new Chicago, and the design of the tech and gadgetry to hack and control CtOS.

Distributed Objects

Distributed Objects

Автор:

This book is designed for students in colleges and universities, as well as others in Software industry and public service, who seek to learn the essentials of Computer Science and high-growth Information Technology. No prerequisite knowledge is necessary, although an understanding of basic Computing principles will prove useful. Readers benefit from the book’s integrated set of concepts, examples and recommended sources for more information. This book is designed to be used as a textbook by students of Computer Science and Information Technology either in a classroom or for self-study. A major characteristic of the book is that it relies on teaching a few carefully selected principles in depth, rather than give an overview of a large number of techniques.

Mobile Development with C#

Mobile Development with C#

Автор:

Mobile Development with C#

Neural Network Architectures for Solving Imperfect Information Game

Neural Network Architectures for Solving Imperfect Information Game

Автор:

Many FFNN are trained to solve the Double Dummy Bridge Problems (DDBP) in bridge games and they have been formalized in the best defense model, which presents the strongest possible assumptions about the opponent. This is used by human players because modeling the strongest possible opponents provides a lower bound on the pay off that can be expected when the opponents are less informed. In the learning course, besides acquiring this basic information, several other more sophisticated features need to be developed by the learning system.

Image Registration Algorithms

Image Registration Algorithms

Автор:

Image registration is very hot topics in the field of research from last two decades. It has a lot of applications in different field of medical imaging, remote sensing, image re-targeting etc. It is a process of aligning two or more images into one coordinate system that taken at different times, from different sensors, or from different viewpoints. The purpose of this book is to provide a comprehensive review of the existing works available on image registration. Finally I proposed a new feature based image registration method where used edge as image feature. I believe that it will be a useful document for students, academicians, researchers and others who want to work on image registration technique regardless for specific applications.

Ноутбук. Эффективная работа

Ноутбук. Эффективная работа

Автор: С. В. Глушаков, А. С. Сурядный

В книге содержатся полезные советы по эксплуатации ноутбука. Рассматривается устройство мобильного компьютера и аксессуары, технология беспроводного подключения к Интернету. Подробно описывается подключение внешних устройств: цифровой фото- и видеокамеры, Bluetooth-адаптера и Модуля GPS, а также второго монитора и мультимедийного проектора для проведения презентаций.

MasteringTM AutoCAD® 2000

MasteringTM  AutoCAD®  2000

Автор:

MasteringTM AutoCAD® 2000