This book is a modern and interdisciplinary text on nectar and nectaries, prompted by the expansion of knowledge, especially ...
Lire la suite
Neglected Tropical Diseases and Phytochemicals in Drug Discovery delivers a comprehensive exploration of the drug discovery ...
Lire la suiteNegor is an eCommerce AI chatbot that increases sales by engaging with the user much like a salesperson when you walk into ...
Lire la suite
This book contains a selection of papers presented at the International Seminar "Negotiation and Market Engineering", held ...
Lire la suiteThis book is focused on the intersection between urban brownfields and the sustainability transitions of metreopolitan areas, ...
Lire la suite
The Neoproterozoic Era (1000-542 million years ago) is a geological period of dramatic climatic change and important evolutionary ...
Lire la suite
Net-Centric Approaches to Intelligence and National Security considers the web architectures and recent developments that ...
Lire la suite
This volume of the Netherlands Yearbook of International Law (NYIL) is the fiftieth in the Series, which means that the NYIL ...
Lire la suite
Investigates network traffic classification solutions by proposing transport-layer methods to achieve better run and operated ...
Lire la suite
This volume 4465 of the Lecture Notes in Computer Science series is a coll- tion of the papers of the NET-COOP 2007. This ...
Lire la suite
Network Models and Optimization: Multiobjective Genetic Algorithm Approach extensively covers algorithms and applications, ...
Lire la suite
These proceedings contain the papers presented at the 2005 IFIP International Conference on Network and Parallel Computing ...
Lire la suite
Network-Aware Security for Group Communications fills a growing need in the research community for a reference that describes ...
Lire la suite
Network-Centric Service-Oriented Enterprise (NSCOE) is seen as heralding the next generation of mainstream Enterprise-business ...
Lire la suite
The book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
Lire la suite
This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Lire la suite
Welcome to Zhangjiajie for the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC 2005). We are ...
Lire la suiteThis book analyses the global diffusion of social policy as a process driven by multiplex ties between countries in global ...
Lire la suite
Neural Crest Induction and Differentiation, written by an international panel of recognized leaders in the field, discusses ...
Lire la suite
This book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
Lire la suite