Microbes produce an extraordinary array of defense systems. These include bacteriocins, a class of antimicrobial molecules ...
WeiterlesenConcise and up-to-date coverage of the most important drugs Integration of experimental and clinical pharmacology with focus ...
WeiterlesenBiometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological ...
WeiterlesenOver the last decade, many industrialized countries shifted from passive unemployment and welfare benefit regimes and traditional ...
WeiterlesenCombines elements of economic and business history to study business ethics from the nineteenth century to today. It concentrates ...
WeiterlesenThis book evaluates, from an economic perspective, various measures introduced in Japan to prevent climate change. Although ...
WeiterlesenThis volume constitutes the refereed post-conference proceedings of the 26th IFIP WG 1.5 International Workshop on Cellular ...
WeiterlesenThis volume presents eight carefully revised texts of selected lectures given by leading researchers of the field at the ...
WeiterlesenCombinatorial commutative algebra is an active area of research with thriving connections to other fields of pure and applied ...
WeiterlesenOne the key aspects of this volume is to cut across the traditional taxonomy of disciplines in the study of alloys. Hence ...
WeiterlesenComplex Orthogonal Space-Time Processing in Wireless Communications incorporates orthogonal space-time processing using STBCs ...
WeiterlesenComputational Methods for Nanoscale Applications: Particles, Plasmons and Waves presents new perspectives on modern nanoscale ...
WeiterlesenThis book constitutes the refereed proceedings of the 22nd International Workshop on Computer Algebra in Scientific Computing, ...
WeiterlesenThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
WeiterlesenThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
WeiterlesenThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
WeiterlesenToday, the development life cycle of 3D User Interfaces (UIs) mostly remains an art more than a principled-based approach. ...
WeiterlesenToday, the development life cycle of 3D User Interfaces (UIs) mostly remains an art more than a principled-based approach. ...
WeiterlesenFew syndromes in psychopathology generate as much popular curiosity and clinical exploration as does obsessive-compulsive ...
WeiterlesenThe aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...
Weiterlesen