Microbes are in our midst soon after birth. Thankfully, the number of harmless (and often beneficial) microbes far outnumber ...
Continue readingExamines the role that antioxidants play in a variety of health and disease situations. The book discusses antioxidants’ ...
Continue readingSummarizes antiviral drug design and discovery approaches Provides the latest update in the field of antiviral therapeutics Includes ...
Continue readingIn Anxiety Disorders: A Pocket Guide for Primary Care, distinguished clinicians combine over a century of experience into ...
Continue readingThe present volume gives a comprehensive overview on the current state of basic and clinical research on Anxiety and Anxiolytic ...
Continue readingThis volume contains the proceedings of the 26th International Conference on Application and Theory of Petri Nets and Other ...
Continue readingThis book constitutes the refereed proceedings of the 29th International Conference on Applications and Theory of Petri Nets ...
Continue readingThis book constitutes the refereed proceedings of the 8th Iberoamerican Conference on Applications and Usability of Interactive ...
Continue readingThe purpose of this book is to provide a medium for such an exchange of expertise and concerns. In order to achieve the goal, ...
Continue readingEvolutionary computation (EC) techniques are e?cient nature-inspired pl- ning and optimization methods based on the principles ...
Continue readingThis book constitutes the refereed joint proceedings of seven workshops on evolutionary computing, EvoWorkshops 2006, held ...
Continue readingThe book is organized in topical sections on fuzzy set theory, fuzzy information access and retrieval, fuzzy machine learning, ...
Continue readingThe book is organized in topical sections on fuzzy set theory, fuzzy information access and retrieval, fuzzy machine learning, ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the Third International Symposium on Applications ...
Continue readingThis volume contains a broad specturm of both research and applications in both supply chain management and e-business. Several ...
Continue readingIn this book, anyone who can operate a PC, standard software and the Internet will learn to understand the biological basis ...
Continue readingthis book provides the average person working in the materials field with a more balanced perspective of the role that computational ...
Continue readingThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
Continue readingThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...
Continue reading