103 Trigonometry Problems contains highly-selected problems and solutions used in the training and testing of the USA International ...
اقرأ المزيدWalter Charleton (1619-1707) has been widely depicted as a natural philosopher whose intellectual career mirrored the intellectual ...
اقرأ المزيدAccess Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations ...
اقرأ المزيدThe book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved ...
اقرأ المزيدThe Third International Conference on Advanced Data Mining and Applications (ADMA) organized in Harbin, China continued the ...
اقرأ المزيدBiometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets ...
اقرأ المزيدBiometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets ...
اقرأ المزيدThis book presents a comprehensive treatment of biometrics and offers coverage of the entire gamut of topics in the field, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held ...
اقرأ المزيدthis year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
اقرأ المزيدThis book, inspired by the ICME 13 topic study group “Affect, beliefs and identity in mathematics education”, presents ...
اقرأ المزيدThis book is the based on the work of many people, and while I discuss many of them in the general context of this book in ...
اقرأ المزيدThis volume explores the various ways in which selfhood was approached and conceptualised in antiquity. They also describe ...
اقرأ المزيدThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
اقرأ المزيدThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...
اقرأ المزيدVarious aspects of numerical analysis for equations arising in boundary integral equation methods have been the subject of ...
اقرأ المزيدLeading architect Reinier de Graaf De Graaf punctures the myths behind the debates on what contemporary architecture is, ...
اقرأ المزيدICARIS 2006 is the ?fth instance of a series of conferences dedicated to the comprehension and the exploitation of immunological ...
اقرأ المزيدAuthentication system has become a hot topic in the field of security, one of the most interested methods of authentication ...
اقرأ المزيد