Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anorectal Malformations in Children
Anorectal Malformations in Children
This multiauthor book is an update on the science and surgery of malformations of the rectum and anus. It carries on Douglas Stephens’ book “Congenital Malformations of the Rectum, Anus, and Genito-urinary Tracts” published in 1963. This first book, which deals exclusively with malformations of the lower end of the digestive and...
The United States and Western Europe since 1945: From "Empire" by Invitation to Transatlantic Drift
The United States and Western Europe since 1945: From "Empire" by Invitation to Transatlantic Drift
`Offers a powerful argument, presents a sophisticated narrative, and is a magisterial, and, indeed, the best synthesis available of transatlantic relations since 1945 - a massive achievement.' Andreas W. Daum, Political Science Quarterly

Based on new and existing research by a world-class scholar, this is the first book in 20
...
One Jump Ahead: Computer Perfection at Checkers
One Jump Ahead: Computer Perfection at Checkers
The new edition of this extraordinary book depicts the creation of the world champion checkers computer program, Chinook. In only two years, Chinook had become a worthy opponent to the world champion, and within four years had defeated all the world's top human players. Jonathan Schaeffer, the originator and leader of the Chinook team, details the...
Vehicular Networks: From Theory to Practice
Vehicular Networks: From Theory to Practice
Cohesively integrating the state of the art in this emerging field, this guide presents many issues involved in vehicular networking, including traffic engineering, human factors studies, and novel computer science research. It covers traffic monitoring and traffic flow modeling, innovative applications enabled by vehicular networks, routing and...
Experimental and Efficient Algorithms: Third International Workshop, WEA 2004, Angra dos Reis, Brazil, May 25-28, 2004, Proceedings (Lecture Notes in Computer Science)
Experimental and Efficient Algorithms: Third International Workshop, WEA 2004, Angra dos Reis, Brazil, May 25-28, 2004, Proceedings (Lecture Notes in Computer Science)

The Third International Workshop on Experimental and E?cient Algorithms (WEA 2004) was held in Angra dos Reis (Brazil), May 25-28, 2004. TheWEAworkshopsaresponsoredbytheEuropeanAssociationforTheo- tical Computer Science (EATCS). They are intended to provide an international forum for researchers in the areas of design, analysis, and...

Semantic Web-Based Information Systems: State-of-the-Art Applications (Advances in Semantic Web and Information Systems, Vol. 1)
Semantic Web-Based Information Systems: State-of-the-Art Applications (Advances in Semantic Web and Information Systems, Vol. 1)
As a new generation of technologies, frameworks, concepts and practices for information systems emerge, practitioners, academicians, and researchers are in need of a source where they can go to educate themselves on the latest innovations in this area. Semantic Web Information Systems: State-of-the-Art Applications establishes value-added...
Understanding and Reducing Landslide Disaster Risk: Volume 4 Testing, Modeling and Risk Assessment (ICL Contribution to Landslide Disaster Risk Reduction)
Understanding and Reducing Landslide Disaster Risk: Volume 4 Testing, Modeling and Risk Assessment (ICL Contribution to Landslide Disaster Risk Reduction)

This book is a part of ICL new book series “ICL Contribution to Landslide Disaster Risk Reduction” founded in 2019. Peer-reviewed papers submitted to the Fifth World Landslide Forum were published in six volumes of this book series. This book contains the followings:

• Five keynote lectures

...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Services and Business Computing Solutions With Xml: Applications for Quality Management and Best Processes
Services and Business Computing Solutions With Xml: Applications for Quality Management and Best Processes
Commercial systems built today are increasingly using XML technologies for storing any amount of text or data.

Services and Business Computing Solutions with XML: Applications for Quality Management and Best Processes collects the latest research for academicians and practitioners that describes the use and synergy between...

Intelligent Tutoring Systems: 10th International Conference, ITS 2010, Pittsburgh, PA
Intelligent Tutoring Systems: 10th International Conference, ITS 2010, Pittsburgh, PA

The 10th International Conference on Intelligent Tutoring Systems, ITS 2010, continued the bi-annual series of top-flight international conferences on the use of advanced educational technologies that are adaptive to users or groups of users. These highly interdisciplinary conferences bring together researchers in the learning sciences,...

Stress Field of the Earth's Crust
Stress Field of the Earth's Crust

This book about rock stress is suitable for students in geosciences and engineering, who need to broaden their horizon about the Stress Field of the Earth´s Crust. The book covers the topic in a way such that geoscience students will be able to grasp the Cauchy Stress Principle without fear of matrix transformations in an exercise....

Security Software Development: Assessing and Managing Security Risks
Security Software Development: Assessing and Managing Security Risks
Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development...
unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy