Observations on the Puberty of the Human Mind by Carey G. Butler ...
Carey G. Butler
Harmonization and Development of Resources and Tools for Italian ...
Roberto Basili & Cristina Bosco & Rodolfo Delmonte & Alessandro Moschitti & Maria Simi
Computer Graphics
Nobuhiko Mukai
The Structural Transformation of the Public Sphere: An Inquiry ...
Jurgen Habermas
Philosophy of Religion: An Introduction
William L. Rowe
Text Mining for Information Professionals - An Uncharted Territory
Manika Lamba & Margam Madhusudhan
Modern Methods in Mathematical Physics: Integral Equations in ...
Vladimir Ryzhov & Tatiana Fedorova & Kirill Safronov & Shaharin Anwar Sulaiman & Samsul Ariffin Abdul Karim
Handbook of Neurotoxicity
Richard M. Kostrzewa
Knowledge-Based Software Engineering: 2022: Proceedings of the ...
Maria Virvou & Takuya Saruwatari & Lakhmi C. Jain
Beyond Edge Computing: Swarm Computing and Ad-Hoc Edge Clouds
Ana Juan Ferrer
Data Science for Entrepreneurship: Principles and Methods for ...
Werner Liebregts & Willem-Jan van Den Heuvel & Arjan van Den Born
Higher Education Computer Science: A Manual of Practical Approaches
Jenny Carter & Michael O'Grady & Clive Rosen
Applications of Computational Intelligence in Management & Mathematics: ...
Madhusudhan Mishra & Nishtha Kesswani & Imene Brigui
Social Edge Computing: Empowering Human-Centric Edge Computing, ...
Dong Wang & Daniel 'Yue' Zhang
Blockchain Scalability
Zibin Zheng & Wuhui Chen & Huawei Huang
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Language Electrified: Principles, Methods, and Future Perspectives ...
Mirko Grimaldi & Elvira Brattico & Yury Shtyrov
The Project Management Office: Setup and Benefits
Gerhard Ortner
Fuzzy Petri Nets for Knowledge Representation, Acquisition and ...
Hua Shi & Hu-Chen Liu
Embedded Machine Learning for Cyber-Physical, IoT, and Edge ...
Sudeep Pasricha & Muhammad Shafique
Product Lifecycle Management (Volume 5): What Happens Across ...
John Stark
Advanced Techniques of Artificial Intelligence in IT Security ...
Marcin Korytkowski
Adversarial Multimedia Forensics
Ehsan Nowroozi