Constitutes the refereed proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island, ...
اقرأ المزيدThis book presents different approaches in IP traffic theory and classifies them, especially towards applications in the ...
اقرأ المزيدGives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
اقرأ المزيدProceedings of the Baroda Workshop IWNMS 2004, held in Baroda, India, 10-14 February, 2004 Researchers and graduate students ...
اقرأ المزيدThis book analyses Iberian expansion by using knowledge accumulated in recent years to test some of the most important theories ...
اقرأ المزيدIdentifying, Assessing, and Treating Conduct Disorder at School bridges the gap between science and practice, providing school ...
اقرأ المزيدThis volume, dedicated to medical students who live the exciting moment of initiation into the medical profession, is structured ...
اقرأ المزيدAfter hundreds of years, science has come out of the ivory tower and entered society. Today science is not done with laboratory ...
اقرأ المزيدThis book provides an in-depth look into the background of rule of law problems and the open defiance of EU law in East ...
اقرأ المزيدIllustrated C# 2005 presents the C# programming language in a unique visual manner. The book uses three techniques to achieve ...
اقرأ المزيدThe unique, visual format of Illustrated C# 2008 has been specially created by author and teacher of development methods, ...
اقرأ المزيدThis two-volume set LNCS 12131 and LNCS 12132 constitutes the refereed proceedings of the 17th International Conference on ...
اقرأ المزيدIt was our great pleasure to host the 4th International Conference on Image and Video Retrieval (CIVR) at the National University ...
اقرأ المزيدThis volume contains the proceeding of the 5th International Conference on - age and Video Retrieval (CIVR), July 13–15, ...
اقرأ المزيدThis is one of the first books to deal with imaging of pathology of the entire visual system. It is divided into two parts, ...
اقرأ المزيدExplores immune cell receptors that are used in the detection of microbes, either by binding directly to non-self molecules ...
اقرأ المزيدThis book will provide the readers in the areas of vaccinology, virology, bacteriology, epidemiology, immunology and mucosal ...
اقرأ المزيدNatural Killer (NK) cells are large granular lymphocytes of the innate immune system. They are widespread throughout the ...
اقرأ المزيدImmunoinformatics is an emerging subdiscipline of bioinformatics. It utilizes mathematics, information science, computer ...
اقرأ المزيدThis book addresses two aspects— Impact of research: How is the research on ICTs in the Global South playing a role in ...
اقرأ المزيد