Explores immune cell receptors that are used in the detection of microbes, either by binding directly to non-self molecules ...
Continue reading
Natural Killer (NK) cells are large granular lymphocytes of the innate immune system. They are widespread throughout the ...
Continue reading
Explores techniques for working in the field of immunogenetics, i.e. fundamental and translational research into the adaptive ...
Continue reading
Covers all aspects of the immunology of fungal infection. Beyond the basics, coverage includes recent developments in innate ...
Continue reading
This volume of Lecture Notes in Computer Science contains the revised versions of the papers presented at the 9th International ...
Continue reading
This volume constitutes the post-proceedings of the 18th International Workshop on Implementation and Applications of Functional ...
Continue reading
More countries are now using Strategic Environmental Assessment (SEA) than ever before. This timely and comprehensive Handbook ...
Continue readingThe book describes the main physical processes and phenomena in pulsed electric breakdown. The knowledge and the control ...
Continue reading
Poker websites. State lotteries. Sports betting. As gambling outlets become easier to find, more—and younger—people are ...
Continue reading
One of the major challenges facing humankind is to provide an equitable standard of living for this and future generations: ...
Continue reading
This is the first book to collect essays from philosophers, mathematicians and computer scientists working at the exciting ...
Continue readingNowadays, when it comes to the purchase decision there is several factors that affect it. It may be the promotion of the ...
Continue reading
Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, ...
Continue reading
The large-scale and almost ubiquitous availability of information has become as much of a curse as it is a blessing. The ...
Continue reading
The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...
Continue reading
The area of Information Technology & Lawyers is a fascinating one. Both from a practical and an academic perspective the ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
Continue reading
Recent studies, indicate that the tumor microenvironment is unique in providing both supportive and inhibitory factors that ...
Continue reading
This book covers various aspects of spatial data modelling specifically regarding three-dimensional (3D) modelling and structuring. ...
Continue reading