You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This updated edition describes both the mathematical theory behind a modern photorealistic rendering system as well as its practical implementation. Through the ideas and software in this book, designers will learn to design and employ a full-featured rendering system for creating stunning imagery. Includes a companion site complete with source code for the rendering system described in the book, with support for Windows, OS X, and Linux.
A comprehensive update of the leading-edge computer graphics textbook that sets the standard for physically-based rendering in the industry and the field, with new material on GPU ray tracing. Photorealistic computer graphics are ubiquitous in today’s world, widely used in movies and video games as well as product design and architecture. Physically-based approaches to rendering, where an accurate modeling of the physics of light scattering is at the heart of image synthesis, offer both visual realism and predictability. Now in a comprehensively updated new edition, this best-selling computer graphics textbook sets the standard for physically-based rendering in the industry and the field. ...
Computer graphics is a vast field that is becoming larger every day. It is impossible to cover every topic of interest, even within a specialization such as CG rendering. For many years, Noriko Kurachi has reported on the latest developments for Japanese readers in her monthly column for CG World. Being something of a pioneer herself, she selected
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions. The papers are organized in topical sections on hash functions, usability, analyses and new techniques.
This book constitutes the refereed proceedings of the 13th International Symposium on Applied Reconfigurable Computing, ARC 2017, held in Delft, The Netherlands, in April 2017. The 17 full papers and 11 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They are organized in topical sections on adaptive architectures, embedded computing and security, simulation and synthesis, design space exploration, fault tolerance, FGPA-based designs, neural neworks, and languages and estimation techniques.
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynotes, 8 invited papers and 10 short papers presented in this double volume, were carefully revised and selected from 150 submissions. The papers of Part I (LNCS 10342) are organized in topical sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.
Used by blockbuster game studios, indie developers, and computer science educators, the Unity Game Engine is one of the world's most popular tools for creating real-time interactive graphics. This volume provides an accessible introduction to the expansive Unity ecosystem through a series of unique activities that illustrate some of the important concepts of game development and real-time graphics programming. In a computer-driven world, these coding skills are useful for not just game development, but also contribute to core computer literacy.
This book constitutes the thoroughly refereed post-conferenceproceedings of the 9th International Conference on Passwords, PASSWORDS2015, held in Cambridge, UK, in December 2015. The 6 revised full papers presented together with 3 revised short paperswere carefully reviewed and selected from 32 initial submissions. Thepapers are organized in topical sections on human factors, attacks, and cryptography.