Covers a range of topics including rational drug design and drug discovery, medicinal chemistry, in-silico drug design, combinatorial ...
Continue readingThis book has brought together a team of world-renowned experts in all aspects of fuel cell development for both SOFC and ...
Continue readingPain is an unpleasant but very important biological signal for danger. Nociception is necessary for survival and maintaining ...
Continue readingThis book is an in-depth learning and teaching resource for the understanding and programming of TCP/IP networking in Java. ...
Continue readingPresents an overview on mutualistic and pathogenic interactions between fungi and plants. This book offers reviews on fungal ...
Continue readingThis book opens with two general reference chapters, which provide an over-view of current knowledge of gastrointestinal ...
Continue readingThe book addresses recent developments in the ecology, evolution, systematics, physiology, and biodiversity of gall-inducing ...
Continue readingThe Japan Association of Simulation & Gaming (JASAG) and the Science Council of Japan (SCJ) hosted ISAGA 2003, the 34th annual ...
Continue readingThis book constitutes the thoroughly refereed research papers contributed to a research project on the `General Theory of ...
Continue readingMSC (mesenchymal stem cells) have been reported to initiate revascularization after injury, to facilitate engraftment of ...
Continue readingThis book summarizes the results of the collaborative project “GeomInt: Geomechanical integrity of host and barrier rocks ...
Continue readingIn this book Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, ...
Continue readingSupermassive black holes are now believed to play an important role in the evolution of the Universe. Every respectable galaxy ...
Continue reading“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
Continue readingHardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
Continue readingWritten by leaders in the field of heat shock protein immunobiology, the chapters systematically and in a step wise fashion ...
Continue readingSince its discovery nearly 30 years ago, hepatitis delta virus (HDV) has continued to surprise and fascinate. At 1,680 nucleotides ...
Continue readingThe following book presents contributions from the 6th TERAFLOP Workshop which was hosted by Tohoku University in Sendai, ...
Continue readingHop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service ...
Continue readingPathogenic fungi are widely distributed and can infect many organisms, particularly humans, but also other vertebrates and ...
Continue reading