Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Supported Cooperative Work and Social Computing: 13th CCF Conference, ChineseCSCW 2018, Guilin, China, August 18–19, 2018, Revised Selected ... in Computer and Information Science, 917)
Computer Supported Cooperative Work and Social Computing: 13th CCF Conference, ChineseCSCW 2018, Guilin, China, August 18–19, 2018, Revised Selected ... in Computer and Information Science, 917)
Welcome to ChineseCSCW 2018, the 13th CCF Conference on Computer Supported Cooperative Work and Social Computing. ChineseCSCW 2018 was sponsored by the China Computer Federation (CCF), and co-organized by the Technical Committee on Cooperative Computing (TCCC) of CCF and Guilin University of Technology. The...
Chinese Business Law (The Palgrave Series on Chinese Law)
Chinese Business Law (The Palgrave Series on Chinese Law)
This book offers the first definitive English-language resource on Chinese business law. Written by an authoritative source, the book accurately describes what the business law is and explains legislative intentions underlying the myriad of law, rules, and regulations. Moreover, it provides the most up-to-date information on law, rules, and...
Internet Addiction Among Cyberkids in China: Risk Factors and Intervention Strategies
Internet Addiction Among Cyberkids in China: Risk Factors and Intervention Strategies
Focusing on the two essential factors of the construction of risk, this book presents research revolving around the staging of and the coping with Internet addiction in China. Using ethnographic methods, it investigates the signs and treatment of Internet addiction and discusses the in-patient approaches used to help children overcome...
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)
Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)

This 2nd edition is an update of the book "Wavelet Theory and Its Application to Pattern Recognition" published in 2000. Three new chapters, which are research results conducted during 2001-2008, will be added. The book consists of two parts - the first contains the basic theory of wavelet analysis and the second includes...

Frommer's China (Frommer's Complete Guides)
Frommer's China (Frommer's Complete Guides)

Frommer's China guides you to the highlights of this vast and varied land, and includes our authors' insider advice on the best experiences, from hiking through some of the most spectacular scenery on the planet to visiting traditional imperial sights.

  • Our expert authors, longtime residents in and...
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Hardware and Computer Organization (Embedded Technology)
Hardware and Computer Organization (Embedded Technology)
Today, we often take for granted the impressive array of computing machinery that surrounds us
and helps us manage our daily lives. Because you are studying computer architecture and digital
hardware, you no doubt have a good understanding of these machines, and you’ve probably written
countless programs on your PCs and
...
Gas Explosion Technology and Biomass Refinery
Gas Explosion Technology and Biomass Refinery

The book introduces gas explosion technology (GET) and its applications in biomass refineries. In this book an overview of GET is provided, the mechanisms are thoroughly discussed. The chapters also cover the latest processes and equipments of GET, including equipment selection, parameter determination and engineering scaling-up. Last but not...

China’s Domestic and International Migration Development (International Talent Development in China)
China’s Domestic and International Migration Development (International Talent Development in China)
This book offers the most comprehensive, up-to-date assessment of China’s domestic and international migration. Restructuring economic development requires large numbers of educated and skilled talents, but this effort comes at a time when the size of China’s domestic workforce is shrinking. In response, both national and regional...
Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
You own your own business. You have also created a website for your business that details the products or services that you offer, but it doesn't allow potential customers to purchase anything online. Don't risk losing business-learn to create a dynamic online environment using only three programs. PHP, MySQL and Apache are three popular...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy