Free Delivery Over $100
15219 books were found.
The mathematical paradigms that underlie deep learning typically start out as hard-to-read academic papers, often... Read More >>
Read More >>
This book is about software product lines (SPLs) designed and developed taking UML diagrams as the primary basis,... Read More >>
This book constitutes the refereed proceedings of the 8th European Lean Educator Conference ELEC 2022, which took... Read More >>
This open access book constitutes the refereed proceedings of the 23rd International Conference on Software Business,... Read More >>
Internet of Things: Architectures for Enhanced Living Environments, Volume 133 presents interesting chapters on... Read More >>
Revised for a new second edition, Intermediate C Programming provides a stepping-stone for intermediate-level students... Read More >>
This bestselling study guide explains the basic steps of software testing and how to perform effective tests in... Read More >>
This two-volume set CCIS 1981 and 1982 constitutes the refereed post-conference proceedings of the Third International... Read More >>
In today’s fast-paced world, Android development is a rapidly evolving field that requires regular updates to keep... Read More >>
Starting with its history and evolution, it explores the many facets of exception handling, such as its syntax,... Read More >>
This book constitutes the revised selected papers of the 15th International Conference, MEDES 2023, Heraklion, Crete,... Read More >>
This book is a guide to designing and conducting studies that examine the usability of health information technology... Read More >>
This book aims at meeting the challenge of getting along with today’s unprecedented rate of innovation supported... Read More >>
This book constitutes the revised selected papers of the 6th Ibero-American Congress on Smart Cities, ICSC-Cities... Read More >>
Numerous methods exist to model and analyze the different roles, responsibilities, and process levels of information... Read More >>
In order to perform effective analysis of today’s information security systems, numerous components must be taken... Read More >>