This book is designed to serve as an up-to-date reference on the use of cone-beam computed tomography for the purpose of ...
Continue reading
The focus of this book is to bring the assertion discussion up to a higher level and introduce a process for creating effective, ...
Continue reading
Build and program MINDSTORM NXT robots with Daniele Benedettelli, one of the world's most respected NXT robot builders. ...
Continue readingThis excellent text recognises that efforts towards improving development outcomes must work in concert with strategies which ...
Continue reading
Takes you through all the basic steps of character design for games and animation, from brainstorming and references to the ...
Continue reading
How do scientists use analogies and other processes to break away from old theories and generate new ones? This book documents ...
Continue readingThis paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...
Continue reading
Crimean-Congo hemorrhagic fever (CCHF) is a tick-borne disease associated with severe hemorrhagic manifestations. CCHF has ...
Continue reading
Fighting crime breeds emotional responses which often lead to counter-productive government policy. To allow a rational analysis ...
Continue reading
Criminal Profiling: Principles and Practice provides a compendium of original scientific research on constructing a criminal ...
Continue reading
This book explores the issue of legitimate criminalization in a modern, liberal society. Coverage provides a comparative ...
Continue reading
This book, Crisis and Legitimacy in Atlantic American Narratives of Piracy: 1678-1865, examines literary and visual representations ...
Continue reading
This text brings together differing geographic perspectives in modelling and analysis in order to highlight infrastructure ...
Continue reading
This book discusses the most current issues in head and neck cancer with a focus on current trends such as biomarkers, precision ...
Continue reading
Reviews the state-of-the-art knowledge with emphasis on multidisciplinary decision and management of head and neck cancer. ...
Continue reading
The book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...
Continue reading
The book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...
Continue reading
Focuses on methods and techniques for crowd simulation, filling the gap in the professional literature. This survey covers ...
Continue reading
Cryogenic refrigerators operating with refrigerant mixtures were developed under classified and proprietary programs for ...
Continue reading
RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
Continue reading