This book provides a detailed and up-to-date account of the relevant literature on the legibility of different kinds of typefaces, ...
Continue readingWhen EU leaders signed the Lisbon Treaty in late 2007, it seemed that the constitutional process in Europe was close to fruition. ...
Continue readingThis book offers unique insight into how and where ideas and instruments of quantification have been adopted, and how they ...
Continue readingScience has development from a self-evident public good to being highly valued in other contexts for different reasons: strengthening ...
Continue readingCosta and Zolo share the conviction that a proper understanding of the rule of law today requires referring to a global problematic ...
Continue readingThis book provides a critical account of the third sector and its future in Europe. It offers an original conceptualization ...
Continue readingThis book intends to help understand and apply principles and rules better. Its target is to keep the distinction between ...
Continue readingBoth, the English and the German Administrative legal systems are increasingly faced with the question of how to balance ...
Continue readingThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThis book reports on methods and technologies to describe, evaluate and control uncertainty in mechanical engineering applications. ...
Continue readingThis monograph provides an overview of the everyday lives of undocumented migrants, thereby focusing on housing, employment, ...
Continue readingThe book focuses in-depth at the most significant event in transportation planning--the Federal-Aid Highway Act of 1962; ...
Continue readingThis Brief describes a reality based approach to use-of-force training in law enforcement, an area of growing importance. ...
Continue readingThis book provides the first critical history of the controversy over whether to cull wild badgers to control the spread ...
Continue readingNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Continue readingIn this book, seventeen scholars discuss how contemporary Scandinavian art and media have become important arenas to articulate ...
Continue readingThe First International Workshop on Web Information Systems Engineering for Electronic Businesses and Governments (E-BAG ...
Continue readingThis book constitutes the joint refereed proceedings of six workshops held in conjunction with the 8th International Conference ...
Continue reading