This book is a modern and interdisciplinary text on nectar and nectaries, prompted by the expansion of knowledge, especially ...
Continue readingNeglected Tropical Diseases and Phytochemicals in Drug Discovery delivers a comprehensive exploration of the drug discovery ...
Continue readingNegor is an eCommerce AI chatbot that increases sales by engaging with the user much like a salesperson when you walk into ...
Continue readingThis book contains a selection of papers presented at the International Seminar "Negotiation and Market Engineering", held ...
Continue readingThis book is focused on the intersection between urban brownfields and the sustainability transitions of metreopolitan areas, ...
Continue readingThe Neoproterozoic Era (1000-542 million years ago) is a geological period of dramatic climatic change and important evolutionary ...
Continue readingNet-Centric Approaches to Intelligence and National Security considers the web architectures and recent developments that ...
Continue readingThis volume of the Netherlands Yearbook of International Law (NYIL) is the fiftieth in the Series, which means that the NYIL ...
Continue readingInvestigates network traffic classification solutions by proposing transport-layer methods to achieve better run and operated ...
Continue readingThis volume 4465 of the Lecture Notes in Computer Science series is a coll- tion of the papers of the NET-COOP 2007. This ...
Continue readingNetwork Models and Optimization: Multiobjective Genetic Algorithm Approach extensively covers algorithms and applications, ...
Continue readingThese proceedings contain the papers presented at the 2005 IFIP International Conference on Network and Parallel Computing ...
Continue readingNetwork-Aware Security for Group Communications fills a growing need in the research community for a reference that describes ...
Continue readingNetwork-Centric Service-Oriented Enterprise (NSCOE) is seen as heralding the next generation of mainstream Enterprise-business ...
Continue readingThe book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
Continue readingThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Continue readingWelcome to Zhangjiajie for the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC 2005). We are ...
Continue readingThis book analyses the global diffusion of social policy as a process driven by multiplex ties between countries in global ...
Continue readingNeural Crest Induction and Differentiation, written by an international panel of recognized leaders in the field, discusses ...
Continue readingThis book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
Continue reading