eBooks-it.org Logo
eBooks-IT.org Inner Image

CRC Press eBooks Page 40

Download free CRC Press eBooks Page 40

Super-Resolution Imaging

Super-Resolution Imaging Image
This book functions as the definitive overview of the field of super-resolution imaging. Written by the leading researchers in the field of image and video super-resolution, it surveys the latest state-of-the-art techniques in super-resolution imaging. Each detailed chapter provides coverage of the implementations and applications of super-resolution imaging. Its 14 sections span a wide range of modern super-resolution imaging techniques and includes variational, Bayesian, feature-based, multi-channel, learning-based, locally adaptive, and nonparametric methods. It discusses, among others, medical, military, and remote-sensing applications. The book can be used as a reference, a basis for short-courses on the subject, or as part of a graduate course ...

Software Engineering Foundations

A Software Science Perspective
Software Engineering Foundations Image
A groundbreaking book in this field, Software Engineering Foundations: A Software Science Perspective integrates the latest research, methodologies, and their applications into a unified theoretical framework. Based on the author's 30 years of experience, it examines a wide range of underlying theories from philosophy, cognitive informatics, denotational mathematics, system science, organization laws, and engineering economics. The book contains in-depth information, annotated references, real-world problems, heuristics, and research opportunities.Highlighting the inherent limitations of the historical programming-language-centered approach, the author explores an interdisciplinary approach to software engineering. He identifies fundamental cognitive...

SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure Devices

SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure Devices Image
What seems routine today was not always so. The field of Si-based heterostructures rests solidly on the shoulders of materials scientists and crystal growers, those purveyors of the semiconductor black arts associated with the deposition of pristine films of nanoscale dimensionality onto enormous Si wafers with near infinite precision. We can now grow near-defect free, nanoscale films of Si and SiGe strained-layer epitaxy compatible with conventional high-volume silicon integrated circuit manufacturing. SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure Devices tells the materials side of the story and details the many advances in the Si-SiGe strained-layer epitaxy for device applications. Drawn from the comprehensive and well-reviewed Si...

Security in Wireless Mesh Networks

Security in Wireless Mesh Networks Image
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications. Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and preventi...

Secure Java

For Web Application Development
Secure Java Image
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modelingexplaining how to integrate these practices into a secure software development life cycle. From the risk assessment phase to the proof of concept phase, the book details a secure web application development process. The authors provide in-depth implementation guidance and best practices for access control, cryptography, logging, secure coding, and authentication and authorization in web ap...



2007 - 2017 © eBooks-IT.org