Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Ten Lost Tribes: A World History
The Ten Lost Tribes: A World History

The legendary story of the ten lost tribes of Israel has resonated among both Jews and Christians down through the centuries: the compelling idea that some core group of humanity was "lost" and exiled to a secret place, perhaps someday to return triumphant. In this fascinating book, Zvi Ben-Dor Benite shows for the first time the...

HTML, XHTML, and CSS: Introductory (Shelly Cashman)
HTML, XHTML, and CSS: Introductory (Shelly Cashman)
The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact that our previous HTML books have been so well received. With each new edition of our HTML books, we have made signifi cant improvements based on the comments made by instructors and students. The HTML, XHTML, and CSS, Sixth...
Fundamentals of Wireless Communication Engineering Technologies
Fundamentals of Wireless Communication Engineering Technologies

A broad introduction to the fundamentals of wireless communication engineering technologies

Covering both theory and practical topics, Fundamentals of Wireless Communication Engineering Technologies offers a sound survey of the major industry-relevant aspects of wireless communication engineering technologies. Divided...

A Life-Course Perspective on Migration and Integration
A Life-Course Perspective on Migration and Integration

Over the last four decades the sociological life course approach with its focus on the interplay of structure and agency over time life course perspective has become an important research perspective in the social sciences. Yet, while it has successfully been applied to almost all fields of social inquiry it is much less used in research...

Chemical Reactor Modeling: Multiphase Reactive Flows
Chemical Reactor Modeling: Multiphase Reactive Flows
This book is based on lectures regularly taught in the fourth and fifth years graduate courses in transport phenomena and chemical reactor modeling, and in a post graduate course in modern reactor modeling at the Norwegian University of Science and Technology, Department of Chemical Engineering, Trondheim, Norway. The objective...
Fundamentals of Voice-Quality Engineering in Wireless Networks
Fundamentals of Voice-Quality Engineering in Wireless Networks

Network operators are faced with the challenge of maximizing the quality of voice transmissions in wireless communications without impairing speech or data transmission. This book provides a comprehensive survey of voice quality algorithms, features, interactions, and trade-offs, at the device and system level. Using a practitioner rather...

EPUB 3 Best Practices: Optimize Your Digital Books
EPUB 3 Best Practices: Optimize Your Digital Books

Ready to take your ebooks to the next level with EPUB 3? This concise guide includes best practices and advice to help you navigate the format’s wide range of technologies and functionality. EPUB 3 is set to turn electronic publishing on its head with rich multimedia reading experiences and scripted interactivity, but this...

Modern Software Review: Techniques and Technologies
Modern Software Review: Techniques and Technologies
The overall objective and mission the proposed book is to provide:
• An understanding of the critical factors affecting software review
perfomance.
• Practical guidelines for software reviews.

Readers will gain a deep understanding of current software review literature
and theoretical models for analysis
...
Intelligent Agents V. Agents Theories, Architectures, and Languages: 5th International Workshop, ATAL'98, Paris, France, July 4-7, 1998, Proceedings
Intelligent Agents V. Agents Theories, Architectures, and Languages: 5th International Workshop, ATAL'98, Paris, France, July 4-7, 1998, Proceedings
This book is the fifth in the successful line of Intelligent Agents volumes published in LNAI. It is based on the fifth workshop on Agent Theories, Architectures, and Languages (ATAL'98) held during the Agents World conference in Paris in July 1998. The 25 revised full papers included were selected from a total of 90 submissions during two rounds...
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Average-Case Complexity (Foundations and Trends(R) in Theoretical Computer Science)
Average-Case Complexity (Foundations and Trends(R) in Theoretical Computer Science)
Average-Case Complexity is a thorough survey of the average-case complexity of problems in NP. The study of the average-case complexity of intractable problems began in the 1970s, motivated by two distinct applications: the developments of the foundations of cryptography and the search for methods to "cope" with the intractability of...
Computable Models of the Law: Languages, Dialogues, Games, Ontologies (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Computable Models of the Law: Languages, Dialogues, Games, Ontologies (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Information technology has now pervaded the legal sector, and the very modern concepts of e-law and e-justice show that automation processes are ubiquitous. European policies on transparency and information society, in particular, require the use of technology and its steady improvement.

Some of the revised papers presented in this book...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy