Free Delivery Over $100
362934 books were found.
What started as a legal framework to guarantee the freedom to copy, modify, and share software has grown into something... Read More >>
Fault tree analysis is key tool in risk analysis. It is a widely used industry standard with applications in amongst... Read More >>
This textbook provides a comprehensive introduction to the concepts and ideas of data fusion. It is an extensively... Read More >>
color: #002060;"">This book features peer-reviewed papers from the 2nd International Conference on 6G Communications... Read More >>
This book presents selected papers from the 20th International Conference on Intelligent Information Hiding and... Read More >>
David Busch's Nikon Z5 II Guide to Digital Photography is your all-in-one comprehensive resource and reference for... Read More >>
This book features high-quality research papers presented at the International Conference of Mechanical and Robotic Engineering... Read More >>
Operational research helps in optimizing resource allocation, production processes, and logistics, while data science... Read More >>
This book explores the integration of machine learning algorithms with bioenergy conversion processes, providing... Read More >>
This book reports the successful optimization of the Compact Mupn Solenoid (CMS) tau trigger algorithm for the Run-3... Read More >>
mso-fareast-language: EN-IN;"">The first of the two volumes, the book highlights the multidisciplinary nature of... Read More >>
This book contains select peer-reviewed proceedings from the International Conference on VLSI, Communication, and... Read More >>
This book includes selected papers presented at International Conference on Data Science & Artificial Intelligence... Read More >>
This book offers a critical re-examination of cultural design, highlighting the distinct cognitive framework for... Read More >>
This volume on visual commonsense reasoning, part of a comprehensive three-volume series, presents a computational... Read More >>
This volume contains the selected proceedings of the International Conference on Information Security, Privacy,... Read More >>
This book explores the concept, architecture, and applications of distributed edge IoT, showcasing how it enhances... Read More >>
color: rgb(66, 66, 66);"">As organizations strive to balance innovation with accountability, this second volume... Read More >>
color: rgb(66, 66, 66);"">Volume III addresses the societal dimension of the honorable merchant, applying ethical... Read More >>
The petroleum refining industry stands at a critical juncture in its evolution. After more than a century of technological... Read More >>
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret... Read More >>
mso-fareast-font-family: 'Times New Roman';"">LLM Integration: Seamlessly combine RAG with state-of-the-art language... Read More >>
The book presents a collection of peer-reviewed articles from the International Conference on Advances and Applications... Read More >>
This book presents original, peer-reviewed select articles from the International Conference on Cognitive & Intelligent... Read More >>