Home | Amazing | Today | Tags | Publishers | Years | Search 
Cytokine Inhibitors
Cytokine Inhibitors

Compiling an up-to-date and detailed survey of the role cytokines play in cell-to-cell communication, development, and differentiation, this comprehensive reference highlights the medical advantages of cytokine inhibition and pursues novel methods of discovery for more potent and specific blocking agents.

Investigates the
...

Lettering & Type: Creating Letters and Designing Typefaces
Lettering & Type: Creating Letters and Designing Typefaces

No component of graphic design has attracted as much interest or inspired as much innovation in recent years as lettering and type. These fundamentals of design, once the exclusive domain of professional typographers, have become an essential starting point for anyone looking for a fresh way to communicate. Practical information about...

EPUB 3 Best Practices: Optimize Your Digital Books
EPUB 3 Best Practices: Optimize Your Digital Books

Ready to take your ebooks to the next level with EPUB 3? This concise guide includes best practices and advice to help you navigate the format’s wide range of technologies and functionality. EPUB 3 is set to turn electronic publishing on its head with rich multimedia reading experiences and scripted interactivity, but this...

Minimally Invasive Spine Surgery: A Surgical Manual
Minimally Invasive Spine Surgery: A Surgical Manual

Don’t miss it! The second, completely revised and expanded edition of the successful surgical manual on minimally invasive spine surgery includes 51 chapters (including more than 20 new chapters) covering all current minimally invasive techniques in spine surgery. A complete survey of all microsurgical and endoscopic techniques with a...

Interactive Segmentation Techniques: Algorithms and Performance Evaluation (SpringerBriefs in Electrical and Computer Engineering)
Interactive Segmentation Techniques: Algorithms and Performance Evaluation (SpringerBriefs in Electrical and Computer Engineering)

This book focuses on interactive segmentation techniques, which have been extensively studied in recent decades. Interactive segmentation emphasizes clear extraction of objects of interest, whose locations are roughly indicated by human interactions based on high level perception. This book will first introduce classic graph-cut segmentation...

Plasmonics: From Basics to Advanced Topics (Springer Series in Optical Sciences)
Plasmonics: From Basics to Advanced Topics (Springer Series in Optical Sciences)

This book deals with all aspects of plasmonics, basics, applications and advanced developments. Plasmonics is an emerging field of research dedicated to the resonant interaction of light with metals. The light/matter interaction is strongly enhanced at a nanometer scale which sparks a keen interest of a wide scientific community and offers...

The Aramaeans in Ancient Syria (Handbook of Oriental Studies)
The Aramaeans in Ancient Syria (Handbook of Oriental Studies)

The historical and cultural role of the Aramaeans in ancient Syria can hardly be overestimated. Thus The Aramaeans in Ancient Syria gives precise and up-to-date information on different aspects of Aramaean culture. To that end, history, society, economy and law, language and script, literature, religion, art and architecture of the...

Computer Algebra in Scientific Computing: 15th International Workshop, CASC 2013, Berlin, Germany, September 9-13, 2013, Proceedings (Lecture Notes in Computer Science)
Computer Algebra in Scientific Computing: 15th International Workshop, CASC 2013, Berlin, Germany, September 9-13, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the proceedings of the 14th International Workshop on Computer Algebra in Scientific Computing, CASC 2013, held in Berlin, Germany, in September 2013. The 33 full papers presented were carefully reviewed and selected for inclusion in this book.

The papers address issues such as polynomial algebra; the solution...

Introduction to Information Security: A Strategic-Based Approach
Introduction to Information Security: A Strategic-Based Approach

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical...

Resource Management for Device-to-Device Underlay Communication (SpringerBriefs in Computer Science)
Resource Management for Device-to-Device Underlay Communication (SpringerBriefs in Computer Science)

Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system...

Performance Evaluation Software: Moving Object Detection and Tracking in Videos (SpringerBriefs in Computer Science)
Performance Evaluation Software: Moving Object Detection and Tracking in Videos (SpringerBriefs in Computer Science)

Performance Evaluation Software: Moving Object Detection and Tracking in Videos introduces a software approach for the real-time evaluation and performance comparison of the methods specializing in moving object detection and/or tracking (D&T) in video processing. Digital video content analysis is an important item for...

Circuit Double Cover of Graphs (London Mathematical Society Lecture Note Series)
Circuit Double Cover of Graphs (London Mathematical Society Lecture Note Series)

The famous Circuit Double Cover conjecture (and its numerous variants) is considered one of the major open problems in graph theory owing to its close relationship with topological graph theory, integer flow theory, graph coloring and the structure of snarks. It is easy to state: every 2-connected graph has a family of circuits covering every...

Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy