She argues with her mother. She occasionally skips class. And she alternately crushes on two totally different boys. But Chloe King is by no means your typical teenager. The girl can scale buildings
Dr. Sherwin Nuland, author of the National Book Award-winning How We Die, once again combines knowledge, compassion, and elegance of expression to shed light on the workings of our bodies from the per
Two renowned investment advisors and authors of the bestseller The Great Reckoning bring to light both currents of disaster and the potential for prosperity and renewal in the face of radical changes
International Trade Subsidy Rules and Tax and Financial Export Incentives is an inquiry into the interrelations between international trade subsidy rules and the use of tax and financial export incent
Taking readers to the cutting edge of physics, mathematics, and computer science, Julian Brown tells the dramatic story of the groundbreaking efforts to create a fundamentally new kind of computer tha
Students studying computer animation and computer games have to be familiar with geometry, matrices, vectors, rotation transforms, quaternions, curves and surfaces, and as computer graphics software b
This handbook is specially designed to meet the needs of both Chinese and English readers, researchers, and translators who are interested in Chinese culture. The Chinese cultural terms included in th
This book constitutes the refereed proceedings of the 4th International Conference on Computer Vision/Computer Graphics Collaboration Techniques, MIRAGE 2009, held in Rocquencourt, France, in May 2009
WHAT'S CHINESE NEW YEAR WITHOUT A DRAGON? The third-grade classes at Nancy's school are learning about Chinese culture, and they'll celebrate the Chinese New Year with a special parade. The highlight
This book constitutes the refereed proceedings of the Seventh Chinese Semantic Web Symposium and the Second Chinese Web Science Conference, CSWS 2013, held in Shanghai, China in August 2013. The 14 re
This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and sim
This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 2008, in Karlsruhe, Germany, in memory of
This book constitutes the refereed proceedings of the 28th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2002, held in Cesky Krumlov, Czech Republic in June 2002.The 36 re
This manual of diagnosis and therapy is brilliantly organized for study and reference. It might even be called the "Merck Manual" of Chinese herbal medicine, for it makes the principles and practices
A plain-English cookbook provides more than sixty delicious recipes using the traditional healing foods of Chinese natural medicine, along with important information about their effects, the use of he
The Chinese approach to health and healing is a rich and complex tradition, encompassing disease prevention, diagnosis, and treatment of the full spectrum of illnesses, as well as offering a holistic
The title of this book is a pun on the use of the preposition “onto” with the aim of recalling “Ontology”, the term commonly adopted in the computer science community to indicate the study of the form
The subject of this book is an analysis of the business models developed or adopted by Chinese small and medium sized enterprises (SMEs), specifically those that are successfully listed on China’s cap
A computer file survives the raid on Osama bin Laden in the hands of his last courier and it launches a mission across the Middle East, Europe, Canada and into New England to kill four American soldie
The 1980s and 1990s experienced a proliferation of schools implementing Computer-Based Learning (CBL) and/or Computer-Based Training (CBT) because of today's technological growth. As Technology Educat
This is a short novel by science fiction, in which an aggressive computer virus that is transmitted over the Internet affects the behaviour of those who come into contact with it when working with com
This is a short novel by science fiction, in which an aggressive computer virus that is transmitted over the Internet affects the behaviour of those who come into contact with it when working with com
Hugh Wilkie is an officer of the Colonial Fleet. The only person alive able to meld his mind with the HCSIS computer. A system capable of not just controlling a Dread Naught but mankind s last hope in
This book is designed for the serious student of Chinese medicine. Both the beginner and advanced practitioner will find this information useful from school to everyday clinical practice. The first se
Sid, a young computer scientist who is passionate about his profession, yearns to also serve his country. Helped by his professor, Sid accepts a job at the CIA where he can do both. But the forces of
Sid, a young computer scientist who is passionate about his profession, yearns to also serve his country. Helped by his professor, Sid accepts a job at the CIA where he can do both. But the forces of
By the year 2050, great advances have been made in the realm of computer science, but the most sophisticated computer ever to have been built is about to be revealed to the world. The brainchild of Pr
By the year 2050, great advances have been made in the realm of computer science, but the most sophisticated computer ever to have been built is about to be revealed to the world. The brainchild of Pr
The sixteen sutras in this book are English translations of texts selected from the Chinese Buddhist Canon. Thirteen of them have never before been published in book form. The translator's introductio
Survival. It's the primary instinct built into every living thing. Computer programmer Ian Daniels has designed his latest masterpiece, the Survivor Program. Able to boost the creativity and cunning,
Survival. It's the primary instinct built into every living thing. Computer programmer Ian Daniels has designed his latest masterpiece, the Survivor Program. Able to boost the creativity and cunning,
Data analysis and machine learning are research areas at the intersection of computer science, artificial intelligence, mathematics and statistics. They cover general methods and techniques that can b
Here is the inimitable Master Sheng Yen at his best, illuminating the ancient texts of the Chinese Zen tradition to show how wonderfully practical they really are, even for us today. The texts, writt
By 1886 many of Eliza Jane McCully's neighbors are concerned that the growing immigrant Chinese population is threatening their comfortable way of life. But it is a young Chinese boy named Wah Chung w
Hurt No More No one who works at a computer or drives a car will be surprised to learn that neck pain is on the rise. About 70 million people in the United States have had neck pain, and the incidenc
The ancient Chinese regarded the written word as a transformative force able to move heaven and earth and unite the reader with the source of all things, the Tao. The power of writing, especially poet
EVERYTHING YOU THINK YOU KNOW IS WRONG...That was the strange message left on Cory Maddox's e-mail--just at the moment when years of work on a revolutionary subspace computer system was about to pay o
Of particular interest for its application to business strategizing, this edition of the well-known ancient Chinese classic I Ching (The Book of Changes) guides readers through the intricacies of gr