Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
WeiterlesenVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
WeiterlesenThis Pivot book is a comparative study of six early colonial public libraries in nineteenth-century Australia, South Africa, ...
WeiterlesenThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
WeiterlesenThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
WeiterlesenVideo summarization is defined as the generation of a summary of extensive video content that comes from all kinds of videos ...
WeiterlesenThe volume includes information and technology to support and improve public policies and government operations, engage citizens, ...
WeiterlesenThe volume includes information and technology to support and improve public policies and government operations, engage citizens, ...
WeiterlesenConstitutes the refereed proceedings of the 5th International Conference on Electronic Government, EGOV 2006, held in Krakow, ...
WeiterlesenThis book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication ...
WeiterlesenThis open access book investigates the inter-relationship between the mind and a potential opportunity to explore the psychology ...
WeiterlesenExtends recent work on entrepreneurship in response to adverse events to explore entrepreneurial responses by people who ...
WeiterlesenThe book begins with introductory chapters on the etiology of intersex conditions, conceptual clarification, legal issues, ...
WeiterlesenBased on a study among higher-educated adult children of lower-class Turkish and Moroccan immigrants in the Netherlands, ...
WeiterlesenWhether they involve excess, a decrease, or complete absence, problems of sexual desire drive women to consult sex therapists, ...
WeiterlesenSharing personal problems and true feeling on social media has a lot of fears and is not likable nowadays, because of bullying, ...
WeiterlesenFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
WeiterlesenThis book is a documentation wide range of disciplines and experience, looking of an inspiring evening of design and discussion.
WeiterlesenThis book constitutes the refereed proceedings of the 8th Asia-Pacific Web Conference, APWeb 2006, held in Harbin, China ...
WeiterlesenThe theory of functional identities (FIs) is a relatively new one - the first results were published at the beginning of ...
Weiterlesen