Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Embodied Conceptualization or Neural Realization: A Corpus-Driven Study of Mandarin Synaesthetic Adjectives (Frontiers in Chinese Linguistics)
Embodied Conceptualization or Neural Realization: A Corpus-Driven Study of Mandarin Synaesthetic Adjectives (Frontiers in Chinese Linguistics)
This book focuses on linguistic synaesthesia in a hitherto less-studied language – Mandarin Chinese – and adopts a corpus-driven approach to support the analysis and argumentation. The study identifies directional tendencies and underlying mechanisms for Mandarin synaesthetic adjectives. By doing so, it not only provides an...
Algorithms
Algorithms
This book is intended to survey the most important algorithms in use on
computers today and to teach fundamental techniques to the growing number
of people who are interested in becoming serious computer users. It is appropriate
for use as a textbook for a second, third or fourth course in computer
science: after students have
...
Windows Server 2003 Security : A Technical Reference
Windows Server 2003 Security : A Technical Reference

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the...

Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage...

Sensor Technology Handbook
Sensor Technology Handbook
The first decade of the 21st century has been labeled by some as the “Sensor Decade.”
With a dramatic increase in sensor R&D and applications over the past 15 years, sensors
are certainly poised on the brink of a revolution similar to that experienced in
microcomputers in the 1980s. Just in automobiles alone, sensing
...
Inside Direct3D (Dv-Mps Inside)
Inside Direct3D (Dv-Mps Inside)

With the introduction of Microsoft Windows 95, game developers had the opportunity to develop Windows-based games that were far more powerful than was possible with earlier versions of Windows. Even with this capability, however, accessing the multimedia hardware consistently and efficiently was no easy task—that is, until Microsoft...

Government Data Centers: Meeting Increasing Demands
Government Data Centers: Meeting Increasing Demands
As repositories of the nation’s environmental data, U.S. government data centers are constantly evolving. The data they collect, disseminate, and archive are critical to assessing the state of the earth and our effect on it. As the data record grows, so does our understanding of the environment. However, because of the increasing amount and...
Geometric Fundamentals of Robotics (Monographs in Computer Science)
Geometric Fundamentals of Robotics (Monographs in Computer Science)
Geometric Fundamentals of Robotics provides an elegant introduction to the geometric concepts that are important to applications in robotics. This second edition is still unique in providing a deep understanding of the subject: rather than focusing on computational results in kinematics and robotics, it includes significant state-of-the...
Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
Computational Approaches to Morphology and Syntax (Oxford Surveys in Syntax & Morphology)
Computational Approaches to Morphology and Syntax (Oxford Surveys in Syntax & Morphology)
"This book should undoubtedly be of great interest to students and researchers of morphology, syntax, computational linguistics, and natural language processing. The book provides an excellent systematics overivew of the current state-of-the-art of the field. The book includes extensive descriptions of the formal characterization of...
Biology Demystified (TAB Demystified)
Biology Demystified (TAB Demystified)
Guide to understanding basic and applied scientific information, for those who've had not formal training in biology. Includes more than 150 illustrations, a pronunciation guide, self-tests, and reviews. Softcover. DLC: Biology.

UNDERSTAND BIOLOGY -- WITHOUT DISSECTING ANYTHING!

If you're years removed...

unlimited object storage image
Result Page: 564 563 562 561 560 559 558 557 556 555 554 553 552 551 550 549 548 547 546 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy