Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Graph-Theoretic Concepts in Computer Science: 37th International Workshop, WG 2011
Graph-Theoretic Concepts in Computer Science: 37th International Workshop, WG 2011

The 37th International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2011) took place in Tepl´a Monastery, Czech Republic, during June 21–24, 2011. It was attended by 80 participants who came from all over the world not only to deliver or listen to interesting talks, but also to celebrate the 65th birthday of Ludek...

Keeping Better Company: Corporate Governance Ten Years On
Keeping Better Company: Corporate Governance Ten Years On
This book is about the way companies are directed and controlled, and relate to their sources of finance—what has come to be called corporate governance. The term‘company’ is better than ‘corporation’ as it reflects the human dimension; companies are collections of people, not just inanimate structures.
...
Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth
Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth
This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 2008, in Karlsruhe, Germany, in memory of Thomas Beth.

The themes of the conference reflected the many interests of Thomas Beth. Although, these interests might seem diverse, mathematical...

SUSE Linux 9.3 For Dummies
SUSE Linux 9.3 For Dummies

SUSE Linux is an increasingly popular Linux distribution that competes head-on with Red Hat’s Linux versions. SUSE Linux’s fortunes have been on the rise following Novell’s acquisition of Germany’s SUSE Linux AG for $210 million. SUSE is looking for more growth in the U.S. marketplace, helped in part by IBM’s $50...

Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
Whether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry...
Germany For Dummies (Dummies Travel)
Germany For Dummies (Dummies Travel)
From the Bavarian Alps to the Rhine, from Berlin to the Black Forest, Germany is packed with beer gardens, castles, art, culture, and a hopping nightlife. Take it all in with this handy guide to your perfect Teutonic adventure:
  • Complete coverage of the big cities and small towns, from Berlin and Munich to the spa town of Baden-Baden...
Digital Watermarking for Digital Media
Digital Watermarking for Digital Media
Digital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The...
Business Process Management: Concepts, Languages, Architectures
Business Process Management: Concepts, Languages, Architectures
Business process management is usually treated from two different perspectives: business administration and computer science. While business administration professionals tend to consider information technology as a subordinate aspect for experts to handle, by contrast computer scientists often consider business goals and organizational regulations...
Model-Based Software and Data Integration: First International Workshop, MBSDI 2008, Berlin, Germany, April 1-3, 2008
Model-Based Software and Data Integration: First International Workshop, MBSDI 2008, Berlin, Germany, April 1-3, 2008
This book includes selected papers of the First International Workshop on Model-Based Software and Data Integration 2008, held in Berlin, Germany, in April 2008 as a part of the Berlin Software Integration Week 2008.

The 9 revised full papers presented together with 3 invited lectures were carefully reviewed and selected from numerous...

The Evolution of Hominin Diets: Integrating Approaches to the Study of Palaeolithic Subsistence
The Evolution of Hominin Diets: Integrating Approaches to the Study of Palaeolithic Subsistence
This volume brings together new and important research from the top experts in hominid diets across multiple fields. The objective of the volume is to explore if there is a consensus between the different methods, allowing us to better understand the nature of hominin dietary strategies through time. Contributions focus on modern studies, faunal...
STACS 2007: 24th Annual Symposium on Theoretical Aspects of Computer Science, Aachen, Germany, February 22-24, 2007, Proceedings
STACS 2007: 24th Annual Symposium on Theoretical Aspects of Computer Science, Aachen, Germany, February 22-24, 2007, Proceedings
This book constitutes the refereed proceedings of the 24th Annual Symposium on Theoretical Aspects of Computer Science, STACS 2007, held in Aachen, Germany in February 2007.

The 56 revised full papers presented together with 3 invited papers were carefully reviewed and selected from about 400 submissions. The papers address the whole range of...

The Sexual Economy of War: Discipline and Desire in the U.S. Army (Battlegrounds: Cornell Studies in Military History)
The Sexual Economy of War: Discipline and Desire in the U.S. Army (Battlegrounds: Cornell Studies in Military History)

In The Sexual Economy of War, Andrew Byers argues that in the early twentieth century, concerns about unregulated sexuality affected every aspect of how the US Army conducted military operations. Far from being an exercise marginal to the institution and its scope of operations, governing sexuality was, in fact, integral to...

unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy