Advises you to consider the influence of a particular site's geology, wind conditions, and seismicity. Using this contextual ...
Lee masThe book brings in diverse perspectives on ubiquitous information environments, from computer-supported collaborative work, ...
Lee masWhat is human flourishing in an age of machine intelligence, when many claim that the world's most complex problems can ...
Lee masJuniorCoders is an innovative educational platform designed to introduce programming and robotics concepts to kids and beginners. ...
Lee masOffers exclusive insights into the revolutionary strategies behind one of the top ten largest architecture firms in the world. ...
Lee masThis book describes the voting procedures by which majority rule may be replaced by a more consensual system of governance. The ...
Lee masThe integration of analytic models into information systems provides the basis for developing intelligent decision support ...
Lee masAim of this book is, after the definition of the field of investigation concerning sustainable regeneration trough topics ...
Lee masAsks designers and academic practitioners to describe their own work through an ecological lens, and then to articulate design ...
Lee masExplores the link between the food-water-energy nexus and sustainability, and the extraordinary value that small tweaks to ...
Lee masEmphasizes new ways of designing for a sustainable city and urban environment. From several angles the future of our urbanism ...
Lee masThis book explores wind-adaptive architectural design blending the parametric design with digital simulations and suggests ...
Lee masThe highly contagious SARS CoV-2 pathogen has challenged health systems around the world as they struggle to detect and monitor ...
Lee masThis book explains how to optimize clinical conditions for detection of the earliest visible signs of dental caries and how ...
Lee masThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lee masThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lee masThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Lee masThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Lee masThis book consitutes the refereed proceedings of the First International Workshop on Machine Learning held in Sheffield, ...
Lee masExplore software lifecycle best practices Use DevSecOps methodologies to facilitate software development and delivery Understand ...
Lee mas