A very active field of research is emerging at the frontier of statistical physics, theoretical computer science/discrete mathematics, and coding/information theory.
This book sets up a common language and pool of concepts, accessible to students and rese.
Marc Andreyko
Marc Wileman
Marc Wileman
Marc Wileman
Marc Armengaud
Under the surface of cities and within build environments lay hidden layers that for some play a key role in the urban scenario when others got lost in transformation.
Marc Fehlmann
Der begriff "fluchtgut" bereitet unbehagen, da es f�r ihn im unterschied zur "raubkunst" noch keine international anerkannten richtlinien oder vereinbarungen gibt.
Marc van Oostendorp
Marc Myers
Marc Jolin
Marc Pattenden
Marc Andrus
Marc Parnell
Marc Howard
Marc Cameron
Marc Bernardin
Marc Raboy
Marc R. Nuwer
Marc Keech
Marc Halata
Jean-Marc Lawton
Marc H. Bornstein
Michel Marc Bouchard
Marc Parnell
Marc Parnell
Marc Bradley
Marc DeGeorge
Marc Stein
Marc Aboflan
Marc René Deschenaux
Marc H. Bornstein
Marc Parnell
Marc H. Greenberg
The creation of works of comic art, including graphic novels, comic books, cartoons and comic strips, and political cartoons, is affected, and at times limited, by a diverse array of laws, ranging from copyright law to free speech laws.
Marc Guss
Marc Platt
Marc Wortman
Marc Bernabe
Marc FRANCIOLI
Marc Andre Bernier
Marc Logé
Marc Jedel
Marc Helmold
Marc W. Vinyard
Marc James Léger
Marc Brasof
Marc Loth
Marc Cameron
Marc Cameron
Marc Helmold
Marc Lamont Hill
Jean-Marc Mangiante
Marc Van Bulck
Marc S. Sabatine
Marc Dumas
Marc Hildebrand
Marc de Leeuw
James L. Rainey III
An information security operations involves monitoring, assessing, and defending enterprise information systems.
Charles Inskip
Scott Lanning
This concise but information-packed text helps high school students in upper grade levels and lower division college and university students quickly master the basics of information literacy.
Information Studies Faculty Serene Rock
Jutta Haider
Jutta Haider
Annemaree Lloyd
Johnson, Peter D., Jr.
Mary Meghan Ryan
George Mickhail
Francisco J. García-Peñalvo
Lisa Genova
A fascinating exploration of the intricacies of how we remember, why we forget, and what we can do to protect our memories, from the harvard-trained neuroscientist and bestselling author of still alice.
Stephen H. Gregg
David Vaskevitch
Rik Das
The publication is attempted to address emerging trends in machine learning applications.
Cass R. Sunstein
Sean T. Manion
It takes 17 years on average to bring new medical treatments ideas into evidence-based clinical practice.
Yan Liu
Urban development and migration from rural to urban areas are impacting prime agricultural land and natural landscapes, particularly in the less developed countries.
Information Resources Management
Samantha S.
Chris Armstrong
Tessa G. Leach
Sami Faiz
As metropolises continue to see a growth in population, planners are continually searching for trending methods for utilizing space and seeking the best geographical arrangements for these cities.
Ulrich Trick
Mit 5g hat die entwicklung der mobilfunknetze oder �berhaupt der telekommunikationsnetze stark an fahrt aufgenommen.
Leonid Sokolinsky
Jan vom Brocke
Poonam Tanwar
Thomas Lachmann
invariances in human information processing examines and identifies processing universals and how they are implemented in elementary judgemental processes.
Soumyasanto Sen
Michael Berthold
This open access bookconstitutes the proceedings of the 18th international conference on intelligent data analysis, ida 2020, held in konstanz, germany, in april 2020.
Joel J. P. C. Rodrigues
Sean T. Manion
It takes 17 years on average to bring new medical treatments ideas into evidence-based clinical practice.
Andrew A. Lovett
Environmental applications have long been a core use of gis.
Gurpreet S. Dhillon
Franco Cicirelli
Angelos Stavrou
One of the most compelling problems of the internet is the lack of a comprehensive and unifying approach to dealing with service security and resilience.
Jean Cunningham
To enhance and sustain its lean journey, a company must implement information systems that fully support and enhance the lean initiative.
Ferdinand Ndifor Che
Ian Owens
Mark Van Rijmenam
James Hayes
Penetration testing is the attempt to professionally break in to an organisation's computer systems, with the goal of determining whether the systems are secure.
Shaowen Wang
Xiao Liu
Takanori Ida
Todd Hewlin
Harness your company's incumbent advantages to win the digital disruption game goliath's revenge is the practical guide for how executives and aspiring leaders of established companies can run the silicon valley playbook for themselves and capitalize on digital disruption.
Robert Benefield