She argues with her mother. She occasionally skips class. And she alternately crushes on two totally different boys. But Chloe King is by no means your typical teenager. The girl can scale buildings
Dr. Sherwin Nuland, author of the National Book Award-winning How We Die, once again combines knowledge, compassion, and elegance of expression to shed light on the workings of our bodies from the per
Two renowned investment advisors and authors of the bestseller The Great Reckoning bring to light both currents of disaster and the potential for prosperity and renewal in the face of radical changes
International Trade Subsidy Rules and Tax and Financial Export Incentives is an inquiry into the interrelations between international trade subsidy rules and the use of tax and financial export incent
"A Gecko in the Machine....Postcards from the Bahamas" covers a period from the emigration by the author and his wife with Habu, their German Shepherd dog to their newly built home on the island of Ex
Bob's just moved in near his granddad. He finds everything boring until he discovers a time machine in his granddad's attic. Bob and his new friend, Tom, are sent on a mission to stop Bob's evil great
Bob's just moved in near his granddad. He finds everything boring until he discovers a time machine in his granddad's attic. Bob and his new friend, Tom, are sent on a mission to stop Bob's evil great
This book presents revised reviewed versions of lectures given during the Machine Learning Summer School held in Canberra, Australia, in February 2002.The lectures address the following key topics in
The legendary story of Harley-Davidson's rise to power--not only as an international industry leader but as an American cultural icon.How did the Harley-Davidson motorcycle, originally a machine for c
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the
Data analysis and machine learning are research areas at the intersection of computer science, artificial intelligence, mathematics and statistics. They cover general methods and techniques that can b
Just the fax, ma'am. Alissa Lindley didn't mean to take it out on the fax machine. But when your not-yet-ex-husband knocks up his girlfriend and your divorce is going worse than the next World War --
An airplane crashes, killing eighty-seven passengers. A cancer patient receives a fatal dose of radiation from a machine designed to be foolproof. The ATMs at a New York bank debit customers twice the
In a time of uncertainty, humanity has touched the stars and claimed vast worlds under the unified Nations of Earth. Yet beneath the heels of the Mother World, the colonists grow too strong. Soon afte
How will autonomous agents, emergent systems, and chaos theory change the way we live and work in the twenty-first century? As today's manufacturing and production systems grow increasingly complex, t
The amount of data in medical databases doubles every 20 months, and physicians are at a loss to analyze them. Also, traditional methods of data analysis have difficulty to identify outliers and patte
This is a story of a high school boy that is tromped on first by his stepfather, and then others along they way. He decided to champion the underdogs in today's society. In the beginning, he takes on
Defining the limits of computer technology, the authors make a compelling case that binary logic will always be inferior to human intuitive ability. A stunning reaffirmation of human intelligence.
This book enables you to unleash the entertainment potential of your Windows 10 PC, tablet, or phone—or any combination of the three! Learn how to stream movies and TV shows, manage your media collect
This book includes the original, peer reviewed research from the 3rd International Conference on Intelligent Technologies and Engineering Systems (ICITES2014), held in December, 2014 at Cheng Shiu Uni
This book presents state-of-the-art research and case studies on new approaches to the design, construction and planning of our cities. Emphasis is placed on the role of alternative and renewable ener
This book tells the story of the four missions to maintain Hubble's successful operation. Between 1997 and 2009 these repaired, serviced and upgraded the instruments on the telescope to maintain its s
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps ar
This volume provides researchers and scholars with a broad overview of the contributions of social psychologists and sociologists to the study of sexual attraction, sexual relationships and sexual exp
Conflict over natural resources has made Africa the focus of international attention, particularly during the last decade. From oil in Nigeria and diamonds in the Democratic Republic of Congo, to land
This book divides Antarctica into eight ice-free regions and provides information on the soils of each region. Soils have been studied in Antarctica for nearly 100 years. Although only 0.35% (45,000 k
This book provides an interdisciplinary collection of views on the ethical challenges and opportunities of workplaces in the Internet of things. Current developments within Ubiquitous computing (ubico
Steve August is lucky to get a job at the world-famous Angion Laboratory in Boston, headed by George MacGregor, a prominent scientist turned entrepreneur. The young neurosurgical resident never expect
Steve August is lucky to get a job at the world-famous Angion Laboratory in Boston, headed by George MacGregor, a prominent scientist turned entrepreneur. The young neurosurgical resident never expect
This edited book presents the most recent theory, research and practice on information and technology literacy as it relates to the education of young children. Because computers have made it so easy
PIC32 Microcontrollers and the Digilent chipKIT: Introductory to Advanced Projects will teach you about the architecture of 32-bit processors and the hardware details of the chipKIT development boards
This book constitutes the refereed proceedings of the 11th International Workshop on Algorithms and Models for the Web Graph, WAW 2014, held in Beijing, China, in December 2014.The 12 papers presented
This book examines the role of The International Maritime Organization (IMO) in the prevention and control of pollution of the marine environment from vessels with a particular reference to the curren
This Brief explores the role of social crime prevention as a crime reduction strategy in the developing world. "Social crime prevention" focuses on the social and economic factors th
Optics and photonics offer new and vibrant approaches to meeting the challenges of the 21st century concerning energy conservation, education, agriculture, personal health and the environment. One of
Linked Open Data (LOD) is a pragmatic approach for realizing the Semantic Web vision of making the Web a global, distributed, semantics-based information system. This book presents an overview on the