MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Related Articles
  Exclusive Promotions

6 328 products

Advertisement

11% OFF
The ability to manipulate spatial data in different forms and to extract additional meaning from them is at the heart of GIS, yet genuine spatial analysis tools are rarely incorporated into commercial
Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and RD secrets. Trade Secret Theft,
Asian interregional economic cooperation has assumed greater prominence with the rise of Asia's two giant economies of China and India. The economic liberalization of China's economy in 1979, followed by India in
Due to market forces and technological evolution, Big Data computing is developing at an increasing rate. A wide variety of novel approaches and tools have emerged to tackle the challenges of Big
Computational semantics is the art and science of computing meaning in natural language. The meaning of a sentence is derived from the meanings of the individual words in it, and this process
16% OFF
Get your PC running at full speed again--and remove malevolent software Save yourself time, money, and frustration by becoming your own computer guru. The Healthy PC: Preventive Care, Home Remedies, and Green
20% OFF
In recent years, there has been a growing interest in the fields of pattern recognition and machine vision in academia and industries. New theories have been developed, with new design of technology
This edited collection of papers presented at the 18th International Symposium of Biomechanics in Sport, highlights cutting-edge research material on sports biomechanics from many of the leading international academics in the field.
20% OFF
ICT is playing an increasingly important role in both business and individual's private life. It has increased international interconnectedness and speed up the process of globalization. But on the other side the
Since the publication of the first edition of Computers as Cognitive Tools in 1993, rapid changes have taken place in the uses of technology for educational purposes and in the theories underlying
Shimon Even's Graph Algorithms, published in 1979, was a seminal introductory book on algorithms read by everyone engaged in the field. This thoroughly revised second edition, with a foreword by Richard M.
Policy informatics is addressing governance challenges and their consequences, which span the seeming inability of governments to solve complex problems and the disaffection of people from their governments. Policy informatics seeks approaches
Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely
This book investigates the contextual factors that led to Korean society becoming 'broadband heaven' - the most wired nation in the world - by scrutinizing the historical contexts surrounding the Korean Information
21% OFF
Start a career in networking Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the
Arising from courses taught by the authors, this largely self-contained treatment is ideal for mathematicians who are interested in applications or for students from applied fields who want to understand the mathematics
Computer simulation is increasingly used in physics and engineering to predict the probable outcome of experiments and to aid in their interpretation. The methods of simulation are based on a range of
Computer (robot) vision is a very challenging area of research. The problem of object recognition is central to computer vision in many applications such as the automatic sorting , selection, orientation, and
This text covers the essential fundamentals of digital video from video principles, to conversion, compression, coding, interfaces and output. The text is based on the industry bible , The Art of Digital
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.