多年來,我一直想錄找一本適合中國計算機系學(xué)生用的算法方面的國外教材。盡管有些不錯的國外教材在中國出版,但總有篇幅過多、內(nèi)容略顯陳舊或數(shù)據(jù)結(jié)構(gòu)內(nèi)容夾雜其中等等這樣或那樣的不甚滿意之處。 去年我有幸看到世界科學(xué)圖書出版社出版的由M.H.Alsuwaiyel撰寫的《Algorithms Design Techniques and Analysis》,它是以國際著名算法專家,我國臺灣出身的李德財教授所主編的系列叢書——Lecture Notes Series on Computing——中的一本。雖然此書不是美國的大學(xué)教材,而是沙特阿拉伯的大學(xué)計算機系教材。但是我很快就被該書的組織簡明、概括,且包含當(dāng)前市面上算法一#較少涉及的概率算法和近似算法
With a worldwide community of users and more than a million dedicated programmers, Perl has proven to be the most effective language for the latest trends in Computing and business. Every programmer must keep up with the latest tools and techniques. This updated version of Advanced Perl Programming from O Reilly gives you the essential knowledge of the modern Perl programmer. Whatever your current level of Perl expertise, this book will help you push your skills to the next level and become a more accomplished programmer.
15篇光流配準(zhǔn)經(jīng)典文獻,目錄如下:
1、A Local Approach for Robust Optical Flow Estimation under Varying
2、A New Method for Computing Optical Flow
3、Accuracy vs. Efficiency Trade-offs in Optical Flow Algorithms
4、all about direct methods
5、An Introduction to OpenCV and Optical Flow
6、Bayesian Real-time Optical Flow
7、Color Optical Flow
8、Computation of Smooth Optical Flow in a Feedback Connected Analog Network
9、Computing optical flow with physical models of brightness Variation
10、Dense estimation and object-based segmentation of the optical flow with robust techniques
11、Example Goal Standard methods Our solution Optical flow under
12、Exploiting Discontinuities in Optical Flow
13、Optical flow for Validating Medical Image Registration
14、Tutorial Computing 2D and 3D Optical Flow.pdf
15、The computation of optical flow
Introduction
Computer security is undeniably important, and as new vulnerabilities are discovered and
exploited, the perceived need for new security solutions grows. "Trusted Computing"
initiatives propose to solve some of today s security problems through hardware changes
to the personal computer. Changing hardware design isn t inherently suspicious, but the
leading trusted Computing proposals have a high cost: they provide security to users
while giving third parties the power to enforce policies on users computers against the
users wishes -- they let others pressure you to hand some control over your PC to
someone else. This is a "feature" ready-made for abuse by software authors who want to
anticompetitively choke off rival software.
It needn t be this way: a straightforward change to the plans of trusted Computing vendors
could leave the security benefits intact while ensuring that a PC owner s
MPI stands for the Message Passing Interface. Written by the MPI Forum (a large committee comprising of a cross-section between industry and research representatives), MPI is a standardized API typically used for parallel and/or distributed Computing. The MPI standard is comprised of 2 documents: MPI-1 (published in 1994) and MPI-2 (published in 1996). MPI-2 is, for the most part, additions and extensions to the original MPI-1 specification.
The MPI-1 and MPI-2 documents can be downloaded from the official MPI Forum web site: http://www.mpi-forum.org/.
Open MPI is an open source, freely available implementation of both the MPI-1 and MPI-2 documents. The Open MPI software achieves high performance the Open MPI project is quite receptive to community input.