This two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
Continue readingThis book constitutes the thoroughly refereed joint post-workshop proceedings of two co-located events: the Second International ...
Continue readingMultiobjective Evolutionary Algorithms and Applications provides comprehensive treatment on the design of multiobjective ...
Continue readingMultiplicative invariant theory, as a research area in its own right within the wider spectrum of invariant theory, is of ...
Continue readingThis book introduces a statistical theory for extracting information from signals that have di?erent sampling rates. This ...
Continue readingThe first part is devoted to graphical techniques. The second part deals with multivariate random variables and presents ...
Continue readingMusculoskeletal Ultrasound: Anatomy and Technique tackles the fundamentals of ultrasound, from physics, artifact recognition ...
Continue readingWhether you might want to undertake building an over-the-top dome observatory yourself or not, you are sure to enjoy this ...
Continue readingThis book discusses and goes into detail on a number of topics: the molecular basis of nutrient exchange between arbuscular ...
Continue readingThe use of social media as a business tool is dominated by falsehoods, fictions and fabrications. In Myths of Social Media, ...
Continue readingThis book surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together ...
Continue readingNanomaterials are a fast developing field of research and applications lie in many separate domains, such as in hi-tech (optics, ...
Continue readingRecent advances have pushed the limits of lithography firmly into the sub-100 nm domain, with smallest feature sizes around ...
Continue readingThe newly discovered advanced oxidation technology using nanoscale zero-valent iron, which is reported in this book, could ...
Continue readingIt offers important insights into three areas. First, it explores how constitutions reflect the transfer of powers from domestic ...
Continue readingThis book, inspired by the ICME 13 Thematic Afternoon on “European Didactic Traditions”, consists of 17 chapters, in ...
Continue readingNLP techniques may substantially enhance most phases of the information system lifecycle, starting with requirement analysis, ...
Continue readingModern applications are both data and computationally intensive and require the storage and manipulation of voluminous traditional ...
Continue readingPart One explores the pattern of national differences in the exercise of state power in a variety of industrialized and developing ...
Continue readingNet-Centric Approaches to Intelligence and National Security considers the web architectures and recent developments that ...
Continue reading