What is a proof for? What is the characteristic use of a proof as a computation, as opposed to its use as an experiment? ...
Continue readingThe technology used to create such digital content has quickly become accessible to the masses, such as “DEEPFAKE.” Deep ...
Continue readingIn this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
Continue readingIn Democracy in an Age of Globalisation, Otfried Höffe develops a comprehensive analysis of the demands, which the process ...
Continue readingScientific knowledge and the ‘experts’ that represent it no longer command the unquestioned authority and public trust ...
Continue readingThe book deals with the complex relationship between intergenerational justice and demographic change and is characterized ...
Continue readingThis study addresses these issues. Part I addresses the situation among hunters and gatherers, traditional farmers and classical ...
Continue readingThis book demystifies the models we use to simulate present and future climates, allowing readers to better understand how ...
Continue readingThis book presents an approach to postmortem human identification using dental image processing based on dental features ...
Continue readingThe objective of the volume is to bring together, in one collection, the most innovative dental anthropological research ...
Continue readingThis book describes methods for research on and research through design. It posits that ethnography is an appropriate method ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, ...
Continue readingThis book was stimulated by the third CWUAAT workshop, held in Cambridge, England in April 2006; the contributors representing ...
Continue readingThis book could well be the most comprehensive collection to date of integrated ideas on the elicitation, representation, ...
Continue readingDesigning Human Interface in Speech Technology bridges a gap between the needs of the technical engineer and cognitive researchers ...
Continue readingDesigning Inclusive Futures reflects the need to explore, in a coherent way, the issues and practicalities that lie behind ...
Continue readingIt is a diagram of clarification, containing hundreds of examples of work by those who favor the communication of information ...
Continue readingAim of this book is, after the definition of the field of investigation concerning sustainable regeneration trough topics ...
Continue readingThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Continue readingThe research papers included in the AmI.d proceedings are devoted to both theoretical and applied research, cover the most ...
Continue reading