Microbes produce an extraordinary array of defense systems. These include bacteriocins, a class of antimicrobial molecules ...
Continue readingConcise and up-to-date coverage of the most important drugs Integration of experimental and clinical pharmacology with focus ...
Continue readingBiometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological ...
Continue readingOver the last decade, many industrialized countries shifted from passive unemployment and welfare benefit regimes and traditional ...
Continue readingCombines elements of economic and business history to study business ethics from the nineteenth century to today. It concentrates ...
Continue readingThis book evaluates, from an economic perspective, various measures introduced in Japan to prevent climate change. Although ...
Continue readingThis volume constitutes the refereed post-conference proceedings of the 26th IFIP WG 1.5 International Workshop on Cellular ...
Continue readingThis volume presents eight carefully revised texts of selected lectures given by leading researchers of the field at the ...
Continue readingCombinatorial commutative algebra is an active area of research with thriving connections to other fields of pure and applied ...
Continue readingOne the key aspects of this volume is to cut across the traditional taxonomy of disciplines in the study of alloys. Hence ...
Continue readingComplex Orthogonal Space-Time Processing in Wireless Communications incorporates orthogonal space-time processing using STBCs ...
Continue readingComputational Methods for Nanoscale Applications: Particles, Plasmons and Waves presents new perspectives on modern nanoscale ...
Continue readingThis book constitutes the refereed proceedings of the 22nd International Workshop on Computer Algebra in Scientific Computing, ...
Continue readingThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue readingToday, the development life cycle of 3D User Interfaces (UIs) mostly remains an art more than a principled-based approach. ...
Continue readingToday, the development life cycle of 3D User Interfaces (UIs) mostly remains an art more than a principled-based approach. ...
Continue readingFew syndromes in psychopathology generate as much popular curiosity and clinical exploration as does obsessive-compulsive ...
Continue readingThe aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...
Continue reading