This book constitutes the refereed proceedings of the Sixth International Conference on Unconventional Computation, UC 2007,organized ...
Lire la suiteThis book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
Lire la suiteThe book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
Lire la suiteThis book offers a comprehensive summary of experiments that are especially suited to reveal the order-parameter symmetry ...
Lire la suiteGrasping and manipulation skills are at the core of the development of modern robotic systems. With the introduction of robotics ...
Lire la suiteUndergraduate Algebra is a text for the standard undergraduate algebra course. It concentrates on the basic structures and ...
Lire la suiteMany animators and designers would like to supplement their Maya learning with a less-technical, more helpful book. This ...
Lire la suiteThis textbook, like Rayleigh’s classic Theory of Sound, focuses on experiments and on approximation techniques rather than ...
Lire la suiteDescribes how the new artificial intelligence technology, neural network, totally changes our everyday life. It first describes ...
Lire la suiteThis book outlines key terms of China’s school leadership in Chinese political and legal, financial, administrative, and ...
Lire la suiteCreates the vital link between urban design theory and praxis and opens the required methodological gateway to a new and ...
Lire la suiteThe knowledge contained in this book sets you apart from other designers by enabling you to: Contribute more effectively ...
Lire la suiteThis book is about competitive advantage and how it is created at the company level. Our theoretical starting point is that ...
Lire la suitethe present book deals with the morphological prerequisites and structural changes on which the individual phenomena are ...
Lire la suiteCovers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...
Lire la suiteThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Lire la suiteThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
Lire la suiteOur time is characterized by an explosion of information and by an accel- ation of knowledge. A book cannot compete with ...
Lire la suitepresents the core information of an introductory nutrition course for majors, with active learning that prepares students ...
Lire la suiteAction planning has always played a central role in Artificial Intelligence. Given a description of the current situation, ...
Lire la suite