Explores immune cell receptors that are used in the detection of microbes, either by binding directly to non-self molecules ...
Continue readingNatural Killer (NK) cells are large granular lymphocytes of the innate immune system. They are widespread throughout the ...
Continue readingExplores techniques for working in the field of immunogenetics, i.e. fundamental and translational research into the adaptive ...
Continue readingCovers all aspects of the immunology of fungal infection. Beyond the basics, coverage includes recent developments in innate ...
Continue readingThis volume of Lecture Notes in Computer Science contains the revised versions of the papers presented at the 9th International ...
Continue readingThis volume constitutes the post-proceedings of the 18th International Workshop on Implementation and Applications of Functional ...
Continue readingMore countries are now using Strategic Environmental Assessment (SEA) than ever before. This timely and comprehensive Handbook ...
Continue readingThe book describes the main physical processes and phenomena in pulsed electric breakdown. The knowledge and the control ...
Continue readingPoker websites. State lotteries. Sports betting. As gambling outlets become easier to find, more—and younger—people are ...
Continue readingOne of the major challenges facing humankind is to provide an equitable standard of living for this and future generations: ...
Continue readingThis is the first book to collect essays from philosophers, mathematicians and computer scientists working at the exciting ...
Continue readingNowadays, when it comes to the purchase decision there is several factors that affect it. It may be the promotion of the ...
Continue readingWelcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, ...
Continue readingThe large-scale and almost ubiquitous availability of information has become as much of a curse as it is a blessing. The ...
Continue readingThe 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...
Continue readingThe area of Information Technology & Lawyers is a fascinating one. Both from a practical and an academic perspective the ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingThis book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
Continue readingRecent studies, indicate that the tumor microenvironment is unique in providing both supportive and inhibitory factors that ...
Continue readingThis book covers various aspects of spatial data modelling specifically regarding three-dimensional (3D) modelling and structuring. ...
Continue reading