Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu
Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu

This book constitutes the refereed proceedings of the 6th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2011, held in Chengdu, China, in August 2011. The 26 revised full papers and 13 invited papers presented were carefully reviewed and selected from numerous submissions. The papers address all...

The Complete Medicinal Herbal: A Practical Guide to the Healing Properties of Herbs
The Complete Medicinal Herbal: A Practical Guide to the Healing Properties of Herbs
Complete Medicinal Herbal is a fully illustrated practical guide to the healing properties of herbs. The book includes more than 120 medicinal herbs with important therapeutic properties and a section on their historical uses, The Complete Medicinal Herbal is a must for every home book shelve. All the parts of the plants that...
The Story of Silver: How the White Metal Shaped America and the Modern World
The Story of Silver: How the White Metal Shaped America and the Modern World

How silver influenced two hundred years of world history, and why it matters today

This is the story of silver’s transformation from soft money during the nineteenth century to hard asset today, and how manipulations of the white metal by American president Franklin D. Roosevelt during the 1930s and by
...

Crystal Reports XI Official Guide
Crystal Reports XI Official Guide
The authorized guide to the latest edition of the #1 business intelligence software product - Crystal Reports. More than 16 million licenses of Crystal Reports have been shipped to date.  This book is a reference designed to provide hands-on guidance for the latest release of the product suite. The latest version of Crystal Reports and the...
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian...
Empire and the Five Kings
Empire and the Five Kings

One of the West’s leading intellectuals offers a provocative look at America’s withdrawal from world leadership and the rising powers who seek to fill the vacuum left behind.

The United States was once the hope of the world, a beacon of freedom and the defender of liberal democracy. Nations and
...

Germs, Genes, & Civilization: How Epidemics Shaped Who We Are Today
Germs, Genes, & Civilization: How Epidemics Shaped Who We Are Today

“Clear, thoughtful, and thought-provoking, Germs, Genes & Civilization makes the case that infectious diseases have played a major role in shaping society. Clark argues that religion, morals, and even democracy have all been influenced by the smallest and most dangerous organisms on our planet. While...

Network Protocols Handbook
Network Protocols Handbook
We are living in the IT(Information Technologies) times. The IT provides us many powerful tools that have significantly changed our way of life, work and business operations. Among all the IT advancements, Internet has the most impact in every aspect of our society for the past 20 years. From Internet, people can get instant news, communicate with...
Advanced Web Technologies and Applications
Advanced Web Technologies and Applications
This book constitutes the refereed proceedings of the 6th Asia-Pacific Web Conference, APWeb 2004, held in Hangzhou, China, in April 2004.

The 60 revised full papers, 24 revised short papers, 15 revised poster papers, and 3 revised industrial papers presented together with 3 keynote papers and 3 invited papers were carefully reviewed and...

Progress on Cryptography: 25 Years of Cryptography in China
Progress on Cryptography: 25 Years of Cryptography in China
This workshop entitled “Progress on Cryptography: 25 Year of Cryptography in China” is being held during the celebration of Professor Guozhen Xiao’s 70th birthday. This proceeding is a birthday gift from all of his current and former graduate students, who have had the pleasure of being supervised by Professor Xiao during the last...
Database Modeling for Industrial Data Management: Emerging Technologies and Applications
Database Modeling for Industrial Data Management: Emerging Technologies and Applications
Collecting and presenting the latest research and development results from the leading researchers in the field of industrial database modeling, Database Modeling for Industrial Data Management: Emerging Technologies and Applications provides a single record of current research and practical applications in industrial database modeling. This book...
Semantic Grid: Model, Methodology, and Applications (Advanced Topics in Science and Technology in China)
Semantic Grid: Model, Methodology, and Applications (Advanced Topics in Science and Technology in China)

Semantic Grid: Model, Methodology, and Applications introduces to the science, core technologies, and killer applications. First, scientific issues of semantic grid systems are covered, followed by two basic technical issues, data-level semantic mapping, and service-level semantic interoperating. Two killer applications are then introduced to...

unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy