Divided into the three main sections of synthesis, analysis and drug development, this handbook covers all stages of the drug development process, including large-scale synthesis and purification of chirally pure pharmaceuticals.
The two editors from academia and a major pharmaceutical company have assembled an experienced,...
"Biophysical Chemistry is an outstanding book that delivers both fundamental and complex biophysical principles, along with an excellent overview of the current biophysical research areas, in a manner that makes it accessible for mathematically and non-mathematically inclined readers." (Journal of Chemical Biology,...
This book focuses on interactive segmentation techniques, which have been extensively studied in recent decades. Interactive segmentation emphasizes clear extraction of objects of interest, whose locations are roughly indicated by human interactions based on high level perception. This book will first introduce classic graph-cut segmentation...
An Integrated Technology for Delivering Better Software—Cheaper and Faster!
This book presents an integrated technology, Design for Trustworthy Software (DFTS), to address software quality issues upstream such that the goal of software...
"Finally, a book taking a critical look at quantitative finance models, illuminating both their flawed fantasy assumptions as well as the uncritical use of such models on Wall Street, in many cases, leading to billion dollar losses. Pablo Triana knows both the financial...
Food webs have now been addressed in empirical and theoretical research for more than 50 years. Yet, even elementary foundational issues are still hotly debated. One difficulty is that a multitude of processes need to be taken into account to understand the patterns found empirically in the structure of food webs and communities.
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...
Robert Sedgewick has thoroughly rewritten and substantially expanded and updated his popular work to provide current and comprehensive coverage of important algorithms and data structures. Christopher Van Wyk and Sedgewick have developed new C++ implementations that both express the methods in a concise and direct manner, and...
Randomization has become a standard approach in algorithm design. Efficiency
and simplicity are the main features of randomized algorithms that
often made randomization a miraculous springboard for solving complex problems
in various applications. Especially in the areas of communication, cryptography,
data management, and discrete...
In Computational Finance Using C and C# George Levy raises computational finance to the next level using the languages of both standard C and C#. The inclusion of both these languages enables readers to match their use of the book to their firms internal software and code requirements. Levy also provides derivatives pricing information for: ...
Magnetic Resonance (MR) imaging produces images of the human tissues in a noninvasive manner, revealing the structure, metabolism, and function of tissues and organs. The impact of this image technique in diagnostic radiology is impressive, due to its versatility and flexibility in joining high-quality anatomical images with functional...
USE EXCEL 2010 TO GAIN DEEPER INSIGHTS, MAKE SMARTER DECISIONS, AND EARN MORE PROFITS
Using real-world examples, Carlberg helps you put Excel’s features and functions to work and get the power of quantitative analysis behind your management...