This book is designed to serve as an up-to-date reference on the use of cone-beam computed tomography for the purpose of ...
Lee masThe focus of this book is to bring the assertion discussion up to a higher level and introduce a process for creating effective, ...
Lee masBuild and program MINDSTORM NXT robots with Daniele Benedettelli, one of the world's most respected NXT robot builders. ...
Lee masThis excellent text recognises that efforts towards improving development outcomes must work in concert with strategies which ...
Lee masTakes you through all the basic steps of character design for games and animation, from brainstorming and references to the ...
Lee masHow do scientists use analogies and other processes to break away from old theories and generate new ones? This book documents ...
Lee masThis paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...
Lee masCrimean-Congo hemorrhagic fever (CCHF) is a tick-borne disease associated with severe hemorrhagic manifestations. CCHF has ...
Lee masFighting crime breeds emotional responses which often lead to counter-productive government policy. To allow a rational analysis ...
Lee masCriminal Profiling: Principles and Practice provides a compendium of original scientific research on constructing a criminal ...
Lee masThis book explores the issue of legitimate criminalization in a modern, liberal society. Coverage provides a comparative ...
Lee masThis book, Crisis and Legitimacy in Atlantic American Narratives of Piracy: 1678-1865, examines literary and visual representations ...
Lee masThis text brings together differing geographic perspectives in modelling and analysis in order to highlight infrastructure ...
Lee masThis book discusses the most current issues in head and neck cancer with a focus on current trends such as biomarkers, precision ...
Lee masReviews the state-of-the-art knowledge with emphasis on multidisciplinary decision and management of head and neck cancer. ...
Lee masThe book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...
Lee masThe book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...
Lee masFocuses on methods and techniques for crowd simulation, filling the gap in the professional literature. This survey covers ...
Lee masCryogenic refrigerators operating with refrigerant mixtures were developed under classified and proprietary programs for ...
Lee masRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
Lee mas