ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • Computer-Aided Intelligent Recognition Techniques and Applications

    ¼öÀÔ
    Sarfraz, Muhammad | Wiley | 2005³â 07¿ù
    286,300¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 14,320¿ø
    Intelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural langu...
  • Handbook of Virtual Humans

    ¼öÀÔ
    Magnenat-Thalmann, Nadia / Thalmann, Daniel | Wiley | 2004³â 11¿ù
    306,670¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 15,340¿ø
    Virtual humans are becoming more and more popular and used in many applications such as the entertainment industry (in both film and games) and medical applications.
  • Virtual Theatres: An Introduction

    ¼öÀÔ
    Virtual Theatres: An Introduction An Introduction [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Giannachi, Gabriella | Routledge | 2004³â 05¿ù
    78,100¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,910¿ø
    An investigation of the interface between theatre, performance and digital arts, this text not only allows for a reinterpretation of what is possible in the world of performance practice, but also demonstrates how "virtuality" has come to represent a major parameter for our understanding and experie...
  • Virtual Theatres

    ¼öÀÔ
    Virtual Theatres An Introduction [ Hardcover ]
    Giannachi, Gabriella | Taylor & Francis Ltd | 2004³â 04¿ù
    147,600¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 7,380¿ø
    "Virtual Theatres" presents the theatre of the 21st century in which everything - even the viewer - can be simulated. Gabriella Giannachi analyses the aesthetic concerns of current computer-arts practices through discussion of a variety of artists and performers.
  • Meeting the Standards in Using ICT for Secondary Teaching

    ¼öÀÔ
    Kennewell, Steve | Routledge | 2004³â 09¿ù
    87,040¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,360¿ø
    This text should prove useful for student and trainee teachers, newly qualified and practising teachers in all subjects at secondary level.
  • Algorithmic Randomness and Complexity

    ¼öÀÔ
    Downey, Rodney G. / Hirschfeldt, Denis R. | Springer | 2010³â 11¿ù
    ±¸¸ÅÇýÅÃ
    English
    265,810¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 13,300¿ø
    Computability and complexity theory are two central areas of research in theoretical computer science. This book provides a systematic, technical development of "algorithmic randomness" and complexity for scientists from diverse fields.
  • Text Mining: Predictive Methods for Analyzing Unstructured Information

    ¼öÀÔ
    Text Mining: Predictive Methods for Analyzing Unstructured Information Predictive Methods For Analyzing Unstructured Information [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Weiss, Sholom M. / Indurkhya, Nitin / Zhang, Tong | Springer | 2004³â 10¿ù
    280,580¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,420¿ø
    The growth of the web can be seen as an expanding public digital library collection. Online digital information extends far beyond the web and its publicly available information. Huge amounts of information are private and are of interest to local communities, such as the records of customers of a b...
  • Guide to Wireless Network Security

    ¼öÀÔ
    Guide to Wireless Network Security [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Vacca, John R. | Springer | 2006³â 06¿ù
    280,580¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,420¿ø
    A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and pr...
  • Abstraction, Refinement and Proof for Probabilistic Systems

    ¼öÀÔ
    Abstraction, Refinement and Proof for Probabilistic Systems [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    McIver, Annabelle / Morgan, Charles Carroll | Springer | 2004³â 11¿ù
    280,580¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,420¿ø
    Illustrates by example the typical steps necessary in computer science to build a mathematical model of any programming paradigm . Presents results of a large and integrated body of research in the area of 'quantitative' program logics.
  • Guide to Assembly Language Programming in Linux

    ¼öÀÔ
    Dandamudi, Sivarama P. | Springer | 2005³â 06¿ù
    234,540¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 11,730¿ø
    Introduces Linux concepts to programmers who are familiar with other operating systems such as Windows XPProvides comprehensive coverage of the Pentium assembly language
  • Human Factors and Voice Interactive Systems

    ¼öÀÔ
    Human Factors and Voice Interactive Systems [ Hardcover, 2nd Edition, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Gardner-Bonneau, Daryle / Blanchard, Harry E. | Springer | 2007³â 12¿ù
    280,580¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,420¿ø
    The second edition of Human Factors and Voice Interactive Systems, in addition to updating chapters from the first edition, adds in-depth information on current topics of major interest to speech application developers. These topics include use of speech technologies in automobiles, speech in mobile...
  • A Classical Introduction to Cryptography: Applications for Communications Security

    ¼öÀÔ
    A Classical Introduction to Cryptography: Applications for Communications Security Applications for Communications Security [ Hardcover ]
    Vaudenay, Serge | Springer | 2005³â 10¿ù
    218,900¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 10,950¿ø
    Introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory ...
  • Bioinformatics and Computational Biology Solutions Using R and Bioconductor

    ¼öÀÔ
    Dudoit, Sandrine(EDT) | Springer-Verlag New York Inc. | 2005³â 09¿ù
    344,000¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 17,200¿ø
    Bioconductor is a widely used open source and open development software project for the analysis and comprehension of data arising from high-throughput experimentation in genomics and molecular biology. Bioconductor is rooted in the open source statistical computing environment R. This volume's cove...
  • Multi-Agent Programming: Languages, Platforms and Applications

    ¼öÀÔ
    Multi-Agent Programming: Languages, Platforms and Applications Languages, Platforms and Applications [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Bordini, Rafael H. / Dastani, Mehdi / Dix, Jurgen | Springer | 2005³â 07¿ù
    280,580¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,420¿ø
    Multi-Agent Programming is an essential reference for anyone interested in the most up-to-date developments in MAS programming. While previous research has focused on the development of formal and informal approaches to analyze and specify Multi-Agent Systems, this book focuses on the development of...
  • Web Content Delivery

    ¼öÀÔ
    Web Content Delivery [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Tang, Xueyan / Xu, Jianliang / Chanson, Samuel T. | Springer | 2005³â 09¿ù
    280,580¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,420¿ø
    The concept of content delivery has become increasingly more important due to rapidly growing demands for efficient distribution and fast access of information from the Internet. The content can be diverse and broad-ranging, and the desire to facilitate ubiquitous information access demands varied n...
  • Agent Intelligence Through Data Mining

    ¼öÀÔ
    Agent Intelligence Through Data Mining [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Symeonidis, Andreas L. / Mitkas, Pericles A. | Springer | 2005³â 06¿ù
    280,580¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,420¿ø
    This book addresses the use of data mining for smarter, more efficient agents, as well as the challenge of generating intelligence from data while transferring it to a separate, possibly autonomous, software entity.
  • Security in E-Learning

    ¼öÀÔ
    Security in E-Learning [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Weippl, Edgar R. | Springer | 2005³â 07¿ù
    280,580¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,420¿ø
    As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.
  • Software Process Modeling

    ¼öÀÔ
    Software Process Modeling [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Acuna, Silvia T. / Juristo, Natalia | Springer | 2005³â 02¿ù
    280,580¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,420¿ø
    This?book brings together experts to discuss relevant results in software process modeling, and expresses their personal view of this field. It is designed for a professional audience of researchers and practitioners in industry, and graduate-level students.
  • Computer Security in the 21st Century

    ¼öÀÔ
    Computer Security in the 21st Century [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Lee, D. T. / Shieh, S. P. / Tygar, J. Doug | Springer | 2005³â 05¿ù
    278,940¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,370¿ø
    Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
  • A Platform-Centric Approach to System-On-Chip (Soc) Design

    ¼öÀÔ
    A Platform-Centric Approach to System-On-Chip (Soc) Design [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Madisetti, Vijay / Arpnikanondt, Chonlameth | Springer | 2004³â 12¿ù
    280,580¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,420¿ø
    The platform-centric SoC method is aimed at the design of today¡¯s SoC systems with emphasis on real-time, embedded systems. The approach provides a guideline and an SoC design environment that promotes an integration of state-of-the-art tools and techniques necessary for the development of the syst...
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
EQUUS9