Professional WebGL Programming: Developing 3D Graphics for the ...
Andreas Anyuru
Hitler's Secret Backers (1933, 1986)
Sidney Warburg
Cold War Counterfeit Spies: Tales of Espionage - Genuine or ...
Nigel West
The Routledge Handbook of the Philosophy of Evil
Thomas Nys & Stephen de Wijze
Men of the Bible
Dwight L. Moody
Fuzzy Control of Queuing Systems
Runtong Zhang & Yannis A. Phillis & Vassilis S. Kouikoglou
Natural Language Processing and Chinese Computing: 7th CCF International ...
Min Zhang & Vincent Ng & Dongyan Zhao & Sujian Li & Hongying Zan
Services Computing
Liang-Jie Zhang & Jia Zhang & Hong Cai
Multidimensional Mining of Massive Text Data
Chao Zhang & Jiawei Han
Text Data Management and Analysis: A Practical Introduction ...
Chengxiang Zhai & Sean Massung
Core Data: Apple's API for Persisting Data on Mac OS X
Marcus S. Zarra
Three-Dimensional Model Analysis and Processing
Faxin Yu & Zheming Lu & Hao Luo & Pinghui Wang
Spatial Database Systems: Design, Implementation and Project ...
Albert K. W. Yeung & G. Brent Hall
Data and Knowledge Engineering: Third International Conference, ...
Yang Xiang & Mukaddim Pathan & Xiaohui Tao & Hua Wang
Internet and Distributed Computing Systems: 5th International ...
Edge Computing and IoT: Systems, Management and Security: Second ...
Kaishun Wu & Lu Wang & Yanjiao Chen
Semantic Web: Implications for Technologies and Business Practices
Michael Workman
The Linux Command Line: A Complete Introduction
William E. Shotts, Jr.
Knowledge Representation in the Social Semantic Web
Katrin Weller
Semantic Methods for Execution-Level Business Process Modeling: ...
Ingo M. Weber
Podman in Action: Secure, Rootless Containers for Kubernetes, ...
Daniel Walsh
Advances in Natural Language Processing: 4th International Conference, ...
José Luis Vicedo & Particio Martínez-Barco & Rafael Munoz & Maximiliano Saiz Noeda
Monitoring With Prometheus
James Turnbull