Eficacy and Vulnerability: Judith Butler on Reiteration and ...
Catherine Mills
Beowulf and Lejre
John D. Niles
Chinese Computational Linguistics and Natural Language Processing ...
Yang Liu & Maosong Sun & Zhiyuan Liu & Ting Liu & Xiaojie Wang
Pattern Analysis, Intelligent Security and the Internet of Things
Ajith Abraham & Azah Kamilah Muda & Yun-Huoy Choo
The Oxford History of Christian Worship
Geoffrey Wainwright
Wenn Grenzen keine sind: Management und Bergsteigen
Fredmund Malik