81-160
of
7,308
results
-
Pre-Owned Lecture Notes in Com...This volume contains the papers presented at the 6th International Workshop on... This volume contains the papers presented at the 6th International Workshop on Randomization and Approximation Techniques in Computer Science (RAN- DOM 2002) which took place at Harvard University Cambridge Massachusetts from September 13-15 2002.... more
-
Pre-Owned Synthesis Lectures o...This is the first comprehensive history of human-computer interaction (HCI). W... This is the first comprehensive history of human-computer interaction (HCI). Whether you are a user-experience professional or an academic researcher whether you identify with computer science human factors information systems information science... more
-
Pre-Owned Lecture Notes in Com...In July 1998 a summer school in cryptology and data security was organized att... In July 1998 a summer school in cryptology and data security was organized atthecomputersciencedepartmentofAarhusUniversity Denmark.Thistook place as a part of a series of summer schools organized by the European Edu- tional Forum an... more
-
Pre-Owned Lecture Notes in Com...Constraints provide a declarative way of representing infinite sets of data. T... Constraints provide a declarative way of representing infinite sets of data. They are well suited for combining different logical or programming paradigms as has been known for constraint logic programming since the 1980s and more recently for... more
-
Pre-Owned Lecture Notes in Com...Largeandcomplexsoftwaresystemsprovidethenecessaryinfrastuctureinall- dustries ... Largeandcomplexsoftwaresystemsprovidethenecessaryinfrastuctureinall- dustries today. In order to construct such large systems in a systematic manner the focus in the development methodologies has switched in the last two decades from functional... more
-
Pre-Owned Lecture Notes in Com...During the last few years we have seen quite spectacular progress in the area ... During the last few years we have seen quite spectacular progress in the area of approximation algorithms: for several fundamental optimization problems we now actually know matching upper and lower bounds for their approximability. This... more
-
Pre-Owned Lecture Notes in Com...This book is based on material presented at the international summer school on... This book is based on material presented at the international summer school on Applied Semantics that took place in Caminha Portugal in September 2000. We aim to present some recent developments in programming language research both in semantic... more
-
Pre-Owned Lecture Notes in Com...This volume contains invited and contributed papers presented at the eighth ed... This volume contains invited and contributed papers presented at the eighth edition of the International Summer School on Neural Networks dedicated to Prof.EduardoR.Caianiello.Theschoolwasestablishedin1996byProf.Antonio Zichichi director of the... more
-
Lecture Notes in Computer Scie...The Pernambuco School on Software Engineering (PSSE) 2007 was the second in a ... The Pernambuco School on Software Engineering (PSSE) 2007 was the second in a series of events devoted to the study of advanced computer science and to the promotion of international scienti?c collaboration. The main theme in 2007 was testing.... more
-
Pre-Owned Lecture Notes in Com...Formal methods have been applied successfully to the verification of medium-si... Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design. However their application to the development of large systems requires more emphasis on specification modelling and... more
-
Pre-Owned Lecture Notes in Com...This volume contains the notes of the lectures given at the Fourth Inter- tion... This volume contains the notes of the lectures given at the Fourth Inter- tionalSchoolonAdvanced FunctionalProgramming heldAugust19-24 2002 at St. Anne s College in Oxford UK. This School was preceded by earlier ones in B? astad (1995 Sweden LNCS... more
-
Pre-Owned Lecture Notes in Com...Inthisvolumeyouwill?ndthelecturenotescorrespondingtothepres- rd tationsgivenat... Inthisvolumeyouwill?ndthelecturenotescorrespondingtothepres- rd tationsgivenatthe3 summerschoolonAdvancedFunctionalProgramming heldinBraga PortugalfromSeptember12-19 1998. ThisschoolwasprecededbyearlieronesinB?astad(1995 Sweden LNCS925) andOlympia... more
-
Lecture Notes in Computer Scie...This volume includes six lectures given at the ICTAC (International Colloquium... This volume includes six lectures given at the ICTAC (International Colloquium on Theoretical Aspects of Computing) School on Formal Methods for an Informal World held on September 1-7 2021 originally scheduled to take place in Astana but held in... more
-
Pre-Owned Lecture Notes in Com...his book presents the refereed proceedings of the 6th European Symposium on Re... his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security ESORICS 2000 held in Toulouse France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of... more
-
Lecture Notes in Computer Scie...This 10-volume LNCS conference set constitutes the proceedings of the 17th Asi... This 10-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 270 full papers together included in this volume were carefully reviewed and selected... more
-
Pre-Owned Lecture Notes in Com...Security is a rapidly growing area of computer science with direct and increas... Security is a rapidly growing area of computer science with direct and increasing relevance to real life applications such as Internet transactions electronic commerce information protection network and systems integrity etc. This volume presents... more
-
Pre-Owned Lecture Notes in Com...The two-volume set originates from the Advanced Course on Petri Nets held in D... The two-volume set originates from the Advanced Course on Petri Nets held in Dagstuhl Germany in September 1996; beyond the lectures given there additional chapters have been commissioned to give a well-balanced presentation of the state of the art... more
-
Lecture Notes in Computer Scie...This 10-volume LNCS conference set constitutes the proceedings of the 17th Asi... This 10-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 270 full papers together included in this volume were carefully reviewed and selected... more
-
Lecture Notes in Computer Scie...This 2-volume LNCS conference set constitutes the proceedings of the 17th Asia... This 2-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 269 full papers included in this volume were carefully reviewed and selected from 839... more
-
Lecture Notes in Computer Scie...This 10-volume LNCS conference set constitutes the proceedings of the 17th Asi... This 10-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 270 full papers together included in this volume were carefully reviewed and selected... more
-
Lecture Notes in Computer Scie...This 10-volume LNCS conference set constitutes the proceedings of the 17th Asi... This 10-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 270 full papers together included in this volume were carefully reviewed and selected... more
-
Pre-Owned Lecture Notes in Com...This book presents the state of the art in software visualization and thus att... This book presents the state of the art in software visualization and thus attempts to establish it as a field on its own. Based on a seminar held at Dagstuhl Castle in May 2001 the book offers topical sections on: - algorithm animation - software... more
-
Pre-Owned Lecture Notes in Com...Formal methods have been applied successfully to the verification of medium-si... Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design. However their application to more complex systems resulting from the object-oriented and the more recent component-based... more
-
Lecture Notes in Computer Scie...The three volume set LNCS 13554 13555 13556 constitutes the proceedings of the... The three volume set LNCS 13554 13555 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security ESORICS 2022 which took place in September 2022. The conference took place in Copenhagen Denmark in a hybrid... more
-
Pre-Owned Lecture Notes in Com...ESORICS the European Symposium on Research in Computer Security is the leading... ESORICS the European Symposium on Research in Computer Security is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years at various locations throughout Europe and is... more
-
Lecture Notes in Computer Scie...This 10-volume LNCS conference set constitutes the proceedings of the 17th Asi... This 10-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 270 full papers together included in this volume were carefully reviewed and selected... more
-
Pre-Owned Lecture Notes in Com...ESORICS the European Symposium On Research In Computer Security is the leading... ESORICS the European Symposium On Research In Computer Security is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by... more
-
Pre-Owned Lecture Notes in Com...This volume contains the papers presented at the International Workshop on Mat... This volume contains the papers presented at the International Workshop on Mathematical Methods Models and Architectures for Computer Network Se- rity(MMM-ACNS2003)heldinSt.Petersburg Russia duringSeptember21-23... more
-
Lecture Notes in Computer Scie...This 10-volume LNCS conference set constitutes the proceedings of the 17th Asi... This 10-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 270 full papers together included in this volume were carefully reviewed and selected... more
-
Lecture Notes in Computer Scie...This 10-volume LNCS conference set constitutes the proceedings of the 17th Asi... This 10-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 270 full papers together included in this volume were carefully reviewed and selected... more
-
Lecture Notes in Computer Scie...The three volume set LNCS 13554 13555 13556 constitutes the proceedings of the... The three volume set LNCS 13554 13555 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security ESORICS 2022 which took place in September 2022. The conference took place in Copenhagen Denmark in a hybrid... more
-
Lecture Notes in Computer Scie...This 10-volume LNCS conference set constitutes the proceedings of the 17th Asi... This 10-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 270 full papers together included in this volume were carefully reviewed and selected... more
-
Lecture Notes in Computer Scie...This 10-volume LNCS conference set constitutes the proceedings of the 17th Asi... This 10-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 270 full papers together included in this volume were carefully reviewed and selected... more
-
Lecture Notes in Computer Scie...This 2-volume LNCS conference set constitutes the proceedings of the 17th Asia... This 2-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 269 full papers included in this volume were carefully reviewed and selected from 839... more
-
Lecture Notes in Computer Scie...The 7-volume set of LNCS 13841-13847 constitutes the proceedings of the 16th A... The 7-volume set of LNCS 13841-13847 constitutes the proceedings of the 16th Asian Conference on Computer Vision ACCV 2022 held in Macao China December 2022. The total of 277 contributions included in the proceedings set was carefully reviewed and... more
-
Lecture Notes in Computer Scie...This 10-volume LNCS conference set constitutes the proceedings of the 17th Asi... This 10-volume LNCS conference set constitutes the proceedings of the 17th Asian Conference on Computer Vision in Hanoi Vietnam held during December 8-12 2024. The 270 full papers together included in this volume were carefully reviewed and selected... more
-
Synthesis Lectures on Computer...This synthesis lecture presents the current state-of-the-art in applying low-l... This synthesis lecture presents the current state-of-the-art in applying low-latency lossless hardware compression algorithms to cache memory and the memory/cache link. There are many non-trivial challenges that must be addressed to make data... more
-
Synthesis Lectures on Computer...Most emerging applications in imaging and machine learning must perform immens... Most emerging applications in imaging and machine learning must perform immense amounts of computation while holding to strict limits on energy and power. To meet these goals architects are building increasingly specialized compute engines tailored... more
-
Pre-Owned Synthesis Lectures o...In its early years the field of computer vision was largely motivated by resea... In its early years the field of computer vision was largely motivated by researchers seeking computational models of biological vision and solutions to practical problems in manufacturing defense and medicine. For the past two decades or so there... more
-
Synthesis Lectures on Computer...Many modern computer systems including homogeneous and heterogeneous architect... Many modern computer systems including homogeneous and heterogeneous architectures support shared memory in hardware. In a shared memory system each of the processor cores may read and write to a single shared address space. For a shared memory... more
-
Synthesis Lectures on Computer...Dynamic binary modification tools form a software layer between a running appl... Dynamic binary modification tools form a software layer between a running application and the underlying operating system providing the powerful opportunity to inspect and potentially modify every user-level guest application instruction that... more
-
Synthesis Lectures on Computer...Datacenter networks provide the communication substrate for large parallel com... Datacenter networks provide the communication substrate for large parallel computer systems that form the ecosystem for high performance computing (HPC) systems and modern Internet applications. The design of new datacenter networks is motivated by... more
-
Pre-Owned Synthesis Lectures o...The emerging three-dimensional (3D) chip architectures with their intrinsic ca... The emerging three-dimensional (3D) chip architectures with their intrinsic capability of reducing the wire length promise attractive solutions to reduce the delay of interconnects in future microprocessors. 3D memory stacking enables much higher... more
-
Synthesis Lectures on Computer...This book provides a thorough overview of the state-of-the-art field-programma... This book provides a thorough overview of the state-of-the-art field-programmable gate array (FPGA)-based robotic computing accelerator designs and summarizes their adopted optimized techniques. This book consists of ten chapters delving into the... more
-
Pre-Owned Synthesis Lectures o...Path planning and navigation are indispensable components for controlling auto... Path planning and navigation are indispensable components for controlling autonomous agents in interactive virtual worlds. Given the growing demands on the size and complexity of modern virtual worlds a number of new techniques have been developed... more
-
Pre-Owned Synthesis Lectures o...This book provides computer engineers academic researchers new graduate studen... This book provides computer engineers academic researchers new graduate students and seasoned practitioners an end-to-end overview of virtual memory. We begin with a recap of foundational concepts and discuss not only state-of-the-art virtual memory... more
-
Pre-Owned Synthesis Lectures o...Since the end of Dennard scaling in the early 2000s improving the energy effic... Since the end of Dennard scaling in the early 2000s improving the energy efficiency of computation has been the main concern of the research community and industry. The large energy efficiency gap between general-purpose processors and... more
-
Pre-Owned Synthesis Lectures o...Since the 1970 s microprocessor-based digital platforms have been riding Moore... Since the 1970 s microprocessor-based digital platforms have been riding Moore s law allowing for doubling of density for the same area roughly every two years. However whereas microprocessor fabrication has focused on increasing instruction... more
-
Synthesis Lectures on Computer...This book provides a structured treatment of the key principles and techniques... This book provides a structured treatment of the key principles and techniques for enabling efficient processing of deep neural networks (DNNs). DNNs are currently widely used for many artificial intelligence (AI) applications including computer... more
-
Synthesis Lectures on Computer...This book targets engineers and researchers familiar with basic computer archi... This book targets engineers and researchers familiar with basic computer architecture concepts who are interested in learning about on-chip networks. This work is designed to be a short synthesis of the most critical concepts in on-chip network... more
-
Synthesis Lectures on Computer...For the last ten years face biometric research has been intensively studied by... For the last ten years face biometric research has been intensively studied by the computer vision community. Face recognition systems have been used in mobile banking and surveillance systems. For face recognition systems face spoofing attack... more
-
Pre-Owned Synthesis Lectures o...Solving problems with deep neural networks typically relies on massive amounts... Solving problems with deep neural networks typically relies on massive amounts of labeled training data to achieve high performance. While in many situations huge volumes of unlabeled data can be and often are generated and available the cost of... more
-
Synthesis Lectures on Computer...Person re-identification is the problem of associating observations of targets... Person re-identification is the problem of associating observations of targets in different non-overlapping cameras. Most of the existing learning-based methods have resulted in improved performance on standard re-identification benchmarks but at... more
-
Pre-Owned Synthesis Lectures o...Datacenter networks provide the communication substrate for large parallel com... Datacenter networks provide the communication substrate for large parallel computer systems that form the ecosystem for high performance computing (HPC) systems and modern Internet applications. The design of new datacenter networks is motivated by... more
-
Synthesis Lectures on Computer...Originally developed to support video games graphics processor units (GPUs) ar... Originally developed to support video games graphics processor units (GPUs) are now increasingly used for general-purpose (non-graphics) applications ranging from machine learning to mining of cryptographic currencies. GPUs can achieve improved... more
-
Pre-Owned Synthesis Lectures o...In the human quest for scientific knowledge empirical evidence is collected by... In the human quest for scientific knowledge empirical evidence is collected by visual perception. Tracking with computer vision takes on the important role to reveal complex patterns of motion that exist in the world we live in. Multi-object... more
-
Pre-Owned Synthesis Lectures o...For the last ten years face biometric research has been intensively studied by... For the last ten years face biometric research has been intensively studied by the computer vision community. Face recognition systems have been used in mobile banking and surveillance systems. For face recognition systems face spoofing attack... more
-
Pre-Owned Synthesis Lectures o...This lecture presents a study of the microarchitecture of contemporary micropr... This lecture presents a study of the microarchitecture of contemporary microprocessors. The focus is on implementation aspects with discussions on their implications in terms of performance power and cost of state-of-the-art designs. The lecture... more
-
Synthesis Lectures on Computer...A key determinant of overall system performance and power dissipation is the c... A key determinant of overall system performance and power dissipation is the cache hierarchy since access to off-chip memory consumes many more cycles and energy than on-chip accesses. In addition multi-core processors are expected to place ever... more
-
Pre-Owned Synthesis Lectures o...This book serves as a practical guide to simulation of 3D deformable solids us... This book serves as a practical guide to simulation of 3D deformable solids using the Finite Element Method (FEM). It reviews a number of topics related to the theory and implementation of FEM approaches: measures of deformation constitutive laws of... more
-
Pre-Owned Synthesis Lectures o...Today computer-system optimization at both the hardware and software levels mu... Today computer-system optimization at both the hardware and software levels must consider the details of the memory system in its analysis; failing to do so yields systems that are increasingly inefficient as those systems become more complex. This... more
-
Pre-Owned Synthesis Lectures o...Many modern computer systems including homogeneous and heterogeneous architect... Many modern computer systems including homogeneous and heterogeneous architectures support shared memory in hardware. In a shared memory system each of the processor cores may read and write to a single shared address space. For a shared memory... more
-
Synthesis Lectures on Computer...Solving problems with deep neural networks typically relies on massive amounts... Solving problems with deep neural networks typically relies on massive amounts of labeled training data to achieve high performance. While in many situations huge volumes of unlabeled data can be and often are generated and available the cost of... more
-
Synthesis Lectures on Visual C...As we increase our reliance on computer-generated information often using it a... As we increase our reliance on computer-generated information often using it as part of our decision-making process we must devise tools to assess the correctness of that information. Consider for example software embedded on vehicles used for... more
-
Synthesis Lectures on Computer...In its early years the field of computer vision was largely motivated by resea... In its early years the field of computer vision was largely motivated by researchers seeking computational models of biological vision and solutions to practical problems in manufacturing defense and medicine. For the past two decades or so there... more
-
Pre-Owned Synthesis Lectures o...This book aims to achieve the following goals: (1) to provide a high-level sur... This book aims to achieve the following goals: (1) to provide a high-level survey of key analytics models and algorithms without going into mathematical details; (2) to analyze the usage patterns of these models; and (3) to discuss opportunities for... more
-
Pre-Owned Synthesis Lectures o...This book provides a structured treatment of the key principles and techniques... This book provides a structured treatment of the key principles and techniques for enabling efficient processing of deep neural networks (DNNs). DNNs are currently widely used for many artificial intelligence (AI) applications including computer... more
-
Synthesis Lectures on Computer...This book introduces readers to emerging persistent memory (PM) technologies t... This book introduces readers to emerging persistent memory (PM) technologies that promise the performance of dynamic random-access memory (DRAM) with the durability of traditional storage media such as hard disks and solid-state drives (SSDs).... more
-
Synthesis Lectures on Visual C...Heritage sites across the world have witnessed a number of natural calamities ... Heritage sites across the world have witnessed a number of natural calamities sabotage and damage from visitors resulting in their present ruined condition. Many sites are now restricted to reduce the risk of further damage. Yet these masterpieces... more
-
Synthesis Lectures on Computer...This lecture presents a study of the microarchitecture of contemporary micropr... This lecture presents a study of the microarchitecture of contemporary microprocessors. The focus is on implementation aspects with discussions on their implications in terms of performance power and cost of state-of-the-art designs. The lecture... more
-
Synthesis Lectures on Computer...The advent of multicore processors has renewed interest in the idea of incorpo... The advent of multicore processors has renewed interest in the idea of incorporating transactions into the programming model used to write parallel programs. This approach known as transactional memory offers an alternative and hopefully better way... more
-
Pre-Owned Synthesis Lectures o...Dynamic binary modification tools form a software layer between a running appl... Dynamic binary modification tools form a software layer between a running application and the underlying operating system providing the powerful opportunity to inspect and potentially modify every user-level guest application instruction that... more
-
Synthesis Lectures on Computer...Compiling for parallelism is a longstanding topic of compiler research. This b... Compiling for parallelism is a longstanding topic of compiler research. This book describes the fundamental principles of compiling regular numerical programs for parallelism. We begin with an explanation of analyses that allow a compiler to... more
-
Pre-Owned Synthesis Lectures o...Originally developed to support video games graphics processor units (GPUs) ar... Originally developed to support video games graphics processor units (GPUs) are now increasingly used for general-purpose (non-graphics) applications ranging from machine learning to mining of cryptographic currencies. GPUs can achieve improved... more
-
Pre-Owned Synthesis Lectures o...This volume presents novel computational models for representing digital human... This volume presents novel computational models for representing digital humans and their interactions with other virtual characters and meaningful environments. In this context we describe efficient algorithms to animate control and author... more
-
Pre-Owned Synthesis Lectures o...Compiling for parallelism is a longstanding topic of compiler research. This b... Compiling for parallelism is a longstanding topic of compiler research. This book describes the fundamental principles of compiling regular numerical programs for parallelism. We begin with an explanation of analyses that allow a compiler to... more
-
Synthesis Lectures on Computer...This book presents and surveys normalization techniques with a deep analysis i... This book presents and surveys normalization techniques with a deep analysis in training deep neural networks. In addition the author provides technical details in designing new normalization methods and network architectures tailored to specific... more
-
Synthesis Lectures on Computer...Face detection because of its vast array of applications is one of the most ac... Face detection because of its vast array of applications is one of the most active research areas in computer vision. In this book we review various approaches to face detection developed in the past decade with more emphasis on boosting-based... more
-
Synthesis Lectures on Computer...In the human quest for scientific knowledge empirical evidence is collected by... In the human quest for scientific knowledge empirical evidence is collected by visual perception. Tracking with computer vision takes on the important role to reveal complex patterns of motion that exist in the world we live in. Multi-object... more
Ads related to synthesis lectures on computer science
Shopping for the best deal on Synthesis lectures on computer science Computer Books - Select a product below or see other matches to read product reviews, compare prices and store ratings.