The men and women in these spare, Kafkaesque stories are engaged in struggles that are no less brutal because they are fought by proxy. In Graham Swift's taut prose, these quiet combative relationship
Defining the limits of computer technology, the authors make a compelling case that binary logic will always be inferior to human intuitive ability. A stunning reaffirmation of human intelligence.
MAVA Math: Enhanced Skills, primarily for students in grades 6 through 8, is the 4th in the MAVA Math series, written by a math educator with 4 degrees and decades of experience. The 460-page book pro
This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to
This second Volume in the book Series on Nuclear Non-Proliferation in International Lawdiscusses the legal interpretation and implementation of verification and compliance with the Treaty of the Non-P
This volume presents papers on the use of micro-XRF core scanners in palaeoenvironmental research. It contains a broad ranging view of instrument capability and points to future developments that will
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps ar
This book is intended for students of computational systems biology with only a limited background in mathematics. Typical books on systems biology merely mention algorithmic approaches, but without o
Conflict over natural resources has made Africa the focus of international attention, particularly during the last decade. From oil in Nigeria and diamonds in the Democratic Republic of Congo, to land
This multi-disciplinary, multi-jurisdictional collection offers the first ever full-scale analysis of legal fictions. Its focus is on fictions in legal practice, examining and evaluating their roles i
This book covers the issues related to human resource management (HRM) in an international context. It gives perspectives and future direction in International HRM research. The chapters explore the m
This book provides an interdisciplinary collection of views on the ethical challenges and opportunities of workplaces in the Internet of things. Current developments within Ubiquitous computing (ubico
Two new volumes of Methods in Enzymology continue the legacy of this premier serial with quality chapters authored by leaders in the field.Circadian Rhythms and Biological Clocks Part A and Part B is
This book presents selected articles that discuss important issues related to entrepreneurship in Brazil, Russia, India and China as well as contributions from authors whose countries have a tradition
This edited book presents the most recent theory, research and practice on information and technology literacy as it relates to the education of young children. Because computers have made it so easy
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Symposium on Computer Music Modeling and Retrieval, CMMR 2013, held in Marseille, France, in October
Meshfree methods, particle methods, and generalized finite element methods have witnessed substantial development since the mid 1990s. The growing interest in these methods is due in part to the fact
This book constitutes the refereed proceedings of the 11th International Workshop on Algorithms and Models for the Web Graph, WAW 2014, held in Beijing, China, in December 2014.The 12 papers presented
This Brief explores the role of social crime prevention as a crime reduction strategy in the developing world. "Social crime prevention" focuses on the social and economic factors th
?Chapters in this book recognize the more than forty years of sustained and distinguished lifetime achievement in mathematics education research and development of Jeremy Kilpatrick. Including contrib
This book examines the health/fitness interaction in an historical context. Beginning in primitive hunter-gatherer communities, where survival required adequate physical activity, it goes on to consid
With ever increasing computational resources and improvements in algorithms, new opportunities are emerging for lattice gauge theory to address key questions in strongly interacting systems, such as n
There is a triple threat to human health and well-being in the Asian air. First, we are going to see an increase in tobacco-attributable deaths as more and more people smoke. Much of this mortality, a
The book reports on the latest theories on artificial neural networks, with a special emphasis on bio-neuroinformatics methods. It includes twenty-three papers selected from among the best contributio
This book constitutes the refereed proceedings of the 15th International Conference on Verification, Model Checking and Abstract Interpretation, VMCAI 2014, held in San Diego, CA, USA, in January 2013
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in Sept
This book constitutes the refereed proceedings of the workshops co-located with the 4th International Joint Conference on Ambient Intelligence, AmI 2013, held in Dublin, Ireland, in December 2013. The
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in S
This book constitutes the post-proceedings of the 5th International ICST Conference on Mobile Networks and Management, MONAMI 2013, held in Cork, Ireland, in September 2013. The 18 revised full papers
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Cloud Computing and Services Science, CLOSER 2012, held in Porto, Portugal, in April 2012. The 15 pa
This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie, China, in July 2013. The 24 revised full papers presented were carefully
This book constitutes the refereed proceedings of the Seventh Chinese Semantic Web Symposium and the Second Chinese Web Science Conference, CSWS 2013, held in Shanghai, China in August 2013. The 14 re
Proceedings of the First Symposium on Aviation Maintenance and Management collects selected papers from the conference of ISAMM 2013 in China held in Xi’an on November 25-28, 2013. The book presents s
In this book, density functional theory (DFT) is introduced within the overall context of quantum chemistry. DFT has become the most frequently used theory in quantum chemistry calculations. However,
Exploring the history and role of reduction in the philosophy of science and of mind, this volume offers a new framework in which various notions of reduction can be defined, and offers a a powerful e
The second international symposium on Pectins and Pectinases was organised by Wageningen University and Research Centre and was held in Rotterdam, May 6-10, 2001. This fruitful meeting was attended by
The first year of developing a new sales territory is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on product, grab a customer list, start calling f