|
|
Universal Design: Principles and Models
As the baby boom generation ages, it is crucial that designers understand all they can about bringing this group, as well as all others, design that will offer function, aesthetics, and quality of life. Full of examples and illustrated with pictures of good design, Universal Design: Principles and Models details how the principles of... | | What's New About Crop Plants: Novel Discoveries of the 21st Century
Until recently, breeding efforts in mass produced food crops centered on high yield production, yet sacrificed flavor, taste, and other qualities. Now, more emphasis is being placed on the enhancement of nutritional and medicinal properties as well as from an environmental impact and sustainability standpoint. This volume looks at the use of... | | Spatial Cloud Computing: A Practical Approach
An exploration of the benefits of cloud computing in geoscience research and applications as well as future research directions, Spatial Cloud Computing: A Practical Approach discusses the essential elements of cloud computing and their advantages for geoscience. Using practical examples, it details the geoscience requirements of cloud... |
|
|
Handbook of Finite Fields (Discrete Mathematics and Its Applications)
Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the book uses a uniform style and... | | Innovation, Communication and Engineering
This volume represents the proceedings of the 2013 International Conference on Innovation, Communication and Engineering (ICICE 2013). This conference was organized by the China University of Petroleum (Huadong/East China) and the Taiwanese Institute of Knowledge Innovation, and was held in Qingdao, Shandong, P.R. China, October 26 - November... | | Iris Biometric Model for Secured Network Access
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a... |
|
|
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 |