The new ICE Specification for Piling and Embedded Retaining Walls is designed to be used as the new technical specification ...
Continue reading
This book is designed to assess how well students are prepared for study, work and life in a digital world. The study measures ...
Continue reading
Astronomy in Rome has always been there, but a little hidden: it was in the palaces, in the churches or, better, above the ...
Continue reading
Provides dental assisting and dental hygiene students with complete coverage of head and neck anatomy, plus detailed discussions ...
Continue readingUpdates the classic work on texture analysis theory and methods without abandoning the foundational essentials of this landmark ...
Continue reading
German and European immigration policies have only recently begun to cope with the inevitable: growing labor demand in the ...
Continue reading
This volume is the 8th in a series of impact books resulting from the activities of the scientific program "Response of ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the 13th International Conference on Implementation and ...
Continue reading
Inconsistency arises in many areas in advanced computing. Often inconsistency is unwanted, for example in the specification ...
Continue reading
This book presents a strong philosophical, theoretical and practical argument for the mainstreaming of indigenous knowledge ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
The nineteenth biennial International Conference on Information Processing in Medical Imaging (IPMI) was held July 11–15, ...
Continue reading
The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...
Continue reading
This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Continue reading
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...
Continue reading
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Continue reading
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
Continue reading
Information Systems Action Research is organized into three parts: (1) The first part focuses on the methodological issues ...
Continue reading
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Continue reading
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Continue reading