What is a proof for? What is the characteristic use of a proof as a computation, as opposed to its use as an experiment? ...
Lee masThe technology used to create such digital content has quickly become accessible to the masses, such as “DEEPFAKE.” Deep ...
Lee masIn this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
Lee masIn Democracy in an Age of Globalisation, Otfried Höffe develops a comprehensive analysis of the demands, which the process ...
Lee masScientific knowledge and the ‘experts’ that represent it no longer command the unquestioned authority and public trust ...
Lee masThe book deals with the complex relationship between intergenerational justice and demographic change and is characterized ...
Lee masThis study addresses these issues. Part I addresses the situation among hunters and gatherers, traditional farmers and classical ...
Lee masThis book demystifies the models we use to simulate present and future climates, allowing readers to better understand how ...
Lee masThis book presents an approach to postmortem human identification using dental image processing based on dental features ...
Lee masThe objective of the volume is to bring together, in one collection, the most innovative dental anthropological research ...
Lee masThis book describes methods for research on and research through design. It posits that ethnography is an appropriate method ...
Lee masThis book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, ...
Lee masThis book was stimulated by the third CWUAAT workshop, held in Cambridge, England in April 2006; the contributors representing ...
Lee masThis book could well be the most comprehensive collection to date of integrated ideas on the elicitation, representation, ...
Lee masDesigning Human Interface in Speech Technology bridges a gap between the needs of the technical engineer and cognitive researchers ...
Lee masDesigning Inclusive Futures reflects the need to explore, in a coherent way, the issues and practicalities that lie behind ...
Lee masIt is a diagram of clarification, containing hundreds of examples of work by those who favor the communication of information ...
Lee masAim of this book is, after the definition of the field of investigation concerning sustainable regeneration trough topics ...
Lee masThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Lee masThe research papers included in the AmI.d proceedings are devoted to both theoretical and applied research, cover the most ...
Lee mas