Students studying computer animation and computer games have to be familiar with geometry, matrices, vectors, rotation transforms, quaternions, curves and surfaces, and as computer graphics software b
The 1980s and 1990s experienced a proliferation of schools implementing Computer-Based Learning (CBL) and/or Computer-Based Training (CBT) because of today's technological growth. As Technology Educat
Taking readers to the cutting edge of physics, mathematics, and computer science, Julian Brown tells the dramatic story of the groundbreaking efforts to create a fundamentally new kind of computer tha
This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and sim
This book constitutes the refereed proceedings of the 4th International Conference on Computer Vision/Computer Graphics Collaboration Techniques, MIRAGE 2009, held in Rocquencourt, France, in May 2009
International Trade Subsidy Rules and Tax and Financial Export Incentives is an inquiry into the interrelations between international trade subsidy rules and the use of tax and financial export incent
This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 2008, in Karlsruhe, Germany, in memory of
Defining the limits of computer technology, the authors make a compelling case that binary logic will always be inferior to human intuitive ability. A stunning reaffirmation of human intelligence.
If you're looking for a fun, effective, low-impact workout that will build stamina, enhance flexibility, and improve your cardiovascular well-being, look no more. This gentle and effective dance is no
She argues with her mother. She occasionally skips class. And she alternately crushes on two totally different boys. But Chloe King is by no means your typical teenager. The girl can scale buildings
Dr. Sherwin Nuland, author of the National Book Award-winning How We Die, once again combines knowledge, compassion, and elegance of expression to shed light on the workings of our bodies from the per
Two renowned investment advisors and authors of the bestseller The Great Reckoning bring to light both currents of disaster and the potential for prosperity and renewal in the face of radical changes
Imagine being able to "walk" into your computer and interact with any program you create. It sounds like science fiction, but it's science fact. Surgeons now rehearse operations on computer-generated
In this book, internationally recognized experts in philosophy of science, computer science, and modeling and simulation are contributing to the discussion on how ontology, epistemology, and teleology
Requirements Engineering and Management for Software Development Projects presents a complete guide on requirements for software development including engineering, computer science and management acti
By the year 2050, great advances have been made in the realm of computer science, but the most sophisticated computer ever to have been built is about to be revealed to the world. The brainchild of Pr
By the year 2050, great advances have been made in the realm of computer science, but the most sophisticated computer ever to have been built is about to be revealed to the world. The brainchild of Pr
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
This collection covers advances in automatic differentiation theory and practice. Computer scientists and mathematicians will learn about recent developments in automatic differentiation theory as wel
Data analysis and machine learning are research areas at the intersection of computer science, artificial intelligence, mathematics and statistics. They cover general methods and techniques that can b
This book constitutes the refereed proceedings of the 28th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2002, held in Cesky Krumlov, Czech Republic in June 2002.The 36 re
* When should children start using computers? * How should schools incorporate computer use into their curriculum? * Which types of computer software programs should be avoided? * Are children who don
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Symposium on Computer Music Modeling and Retrieval, CMMR 2013, held in Marseille, France, in October
Content-based 3-D object retrieval has attracted extensive attention recently and has applications in a variety of fields, such as, computer-aided design, tele-medicine,mobile multimedia, virtual real
In many computer vision applications, objects have to be learned and recognized in images or image sequences. This book presents new probabilistic hierarchical models that allow an efficient represent
In this primer for IT specialists on the aspects of molecular biology and medicine that lend themselves to the application of computer science, budding bioinformaticians will find clear explanations o
After experiencing heart break and loss, Robin, a good looking computer scientist turned to drugs for solace, and opted for the street life, where he met Monica, a committed Christian doctor, who chal
What does an arrogant businessman, his best friend, a retired gentleman and his dog, a spirit guide, a super monk, a ruffian, a computer genius, and two of the most powerful men on the planet all have
A computer file survives the raid on Osama bin Laden in the hands of his last courier and it launches a mission across the Middle East, Europe, Canada and into New England to kill four American soldie
Wouldn't it be great if you could just push a button on your computer and have a list of all you memories pop up. This ingenious book of lists, which is in essence a catalogue of all your memories, do
Meta-Programming and Model-Driven Meta-Program Development: Principles, Processes and Techniques presents an overall analysis of meta-programming, focusing on insights of meta-programming techniques,
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples
The book is designed to help children learn and understand the concepts of a computer. It gives them step by step instructions and leads them through the process on how to do something. The book also
The book is designed to help children learn and understand the concepts of a computer. It gives them step by step instructions and leads them through the process on how to do something. The book also
This book is written for both linguists and computer scientists working in the field of artificial intelligence as well as to anyone interested in intelligent text processing. Lexical function is a co
"Life is quickly slipping from my earthly body. I'm not strong enough to even sit at my computer; I'm using a pencil, eraser, and tablet. There may not be time for revision or proofreading, yet my min
The author, who died in 1984, is well-known both as a person and through his research in mathematical logic and theoretical computer science. In the first part of the book he presents the new classica
After fulfilling every objective of a top secret mission to Jupiter's Ganymede and now only days from home, four NASA astronauts learn from their computer systems analyst in Houston through an unautho
Science FictionAfter fulfilling every objective of a top secret mission to Jupiter's Ganymede and now only days from home, four NASA astronauts learn from their computer systems analyst in Houston thr