Architectures for Computer Vision

Architectures for Computer Vision

(1 reviews, 297 downloads)
, 2014-08-25, 336 pages, pdf, epub
This book aims to ill in the gaps between computer vision and Verilog HDL design. For this purpose, we have to learn about the four disciplines: Verilog HDL, vision principles, vision architectures, and Verilog design. This area, which we call…
Opportunistic Mobile Social Networks

Opportunistic Mobile Social Networks

(1 reviews, 440 downloads)
, 2014-08-05, 541 pages, pdf, epub
The widespread availability of mobile devices along with recent advancements in networking capabilities make opportunistic mobile social networks (MSNs) one of the most promising technologies for next-generation mobile applications. Opportunistic Mobile Social Networks supplies a new perspective of these networks…
An Architectural Approach to Level Design

An Architectural Approach to Level Design

(1 reviews, 519 downloads)
, 2014-06-12, 469 pages, pdf, epub
Explore Level Design through the Lens of Architectural and Spatial Experience Theory Written by a game developer and professor trained in architecture, An Architectural Approach to Level Design is one of the first books to integrate architectural and spatial design…
Real-Time Embedded Systems

Real-Time Embedded Systems

(1 reviews, 508 downloads)
, 2012-01-27, 536 pages, pdf, epub
From the Foreword: “…the presentation of real-time scheduling is probably the best in terms of clarity I have ever read in the professional literature. Easy to understand, which is important for busy professionals keen to acquire (or refresh) new knowledge…
Anonymous Communication Networks: Protecting Privacy on the Web

Anonymous Communication Networks: Protecting Privacy on the Web

(1 reviews, 673 downloads)
, 2014-07-07, 203 pages, pdf, epub
In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing…