熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 26 筆, 頁數 1 / 1
呈現:
Will and Responsibility: Legal Thinking of Artificial Intelligence
This book explores the authors’ legal thinking on artificial intelligence (AI), a topic of burgeonin... more |
|||
Designs from Linear Codes (Second Edition)
Since the publication of the first edition of this monograph, a generalisation of the Assmus-Mattson... more |
|||
The Prehistoric Maritime Frontier of Southeast China: Indigenous Bai Yue and Their Oceanic Dispersal
This open access book presents multidisciplinary research on the cultural history, ethnic connectivi... more |
|||
The Prehistoric Maritime Frontier of Southeast China: Indigenous Bai Yue and Their Oceanic Dispersal
This open access book presents multidisciplinary research on the cultural history, ethnic connectivi... more |
|||
Raise the Bottles
|
|||
A Platform with No Timetable
From portraits of ordinary people, to modern-day folk tales, to heartfelt contemplations on the Taiw... more |
|||
Cloud Computing and Big Data: Technologies and Applications
This book addresses topics related to cloud and Big Data technologies, architecture and applications... more |
|||
Early Navigation in the Asia-Pacific Region: A Maritime Archaeological Perspective
1. A Summary Study on Shipwrecks of the Pre-contact Period and the Development of Regional Maritime ... more |
|||
Structure and Modeling of Complex Petroleum Mixtures
Molecular Simulation for Petroleum Related Applications.- Molecular Structure and Association Behavi... more |
|||
Communication and Networking: International Conference, FGCN 2010, Held As Part of the Future Generation Information Technology
Welcome to the proceedings of the 2010 International Conference on Future Gene- tion Communication a... more |
|||
Ubiquitous Intelligence and Computing: 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings
This volume contains the proceedings of UIC 2008, the 5th International C- ference on Ubiquitous Int... more |
|||
Autonomic and Trusted Computing: 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings
This book constitutes the refereed procedings of the 5th International Conference on Autonomic and T... more |
|||
The Taste of Apples
From the preeminent writer of Taiwanese nativist fiction and the leading translator of Chinese liter... more |
|||
Prehistoric Maritime Cultures and Seafaring in East Asia
This book focuses on prehistoric East Asian maritime cultures that pre-dated the Maritime Silk Road,... more |
|||
Archaeology of Manila Galleon Seaports and Early Maritime Globalization
This book focuses on the archaeological and historical research on the seaport heritage of galleon n... more |
|||
Prehistoric Maritime Cultures and Seafaring in East Asia
This book focuses on prehistoric East Asian maritime cultures that pre-dated the Maritime Silk Road,... more |
|||
Archaeology of Manila Galleon Seaports and Early Maritime Globalization
This book focuses on the archaeological and historical research on the seaport heritage of galleon n... more |
|||
Early Navigation in the Asia-Pacific Region: A Maritime Archaeological Perspective
1. A Summary Study on Shipwrecks of the Pre-contact Period and the Development of Regional Maritime ... more |
|||
Structure and Modeling of Complex Petroleum Mixtures
Molecular Simulation for Petroleum Related Applications.- Molecular Structure and Association Behavi... more |
|||
Advanced Voltage Quality Controller for New Power Distribution Systems
|
|||
Mobile Edge Computing in 5G Communication Systems
首先從移動邊緣計算產生的背景及歷史出發,闡述移動邊緣計算的基本概念,並結合5G網路發展及運營商轉型的現狀,探討移動邊緣計算的發展方向;接著講述與移動邊緣計算相關的關鍵使能技術;然後對移動邊緣計算的部署... more |
|||
Traditional Chinese Toggles: Counterweights and Charms
|
|||
Jurisdictional Conflicts between the WTO and Regional Trade Agreements
|
|||
Exquisite Fabrics: Traditional Weaving and Embroidery Patterns in China
woven and embroidered designs catalogued in Exquisite Fabrics, a survey by Gao Chunming, combine consummate mechanical and...... more |
|||
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in ... more |
|||
The Taste of Apples
|