You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Volume II of Handbook of Growth Factors presents a stimulating discussion of the best-characterized polypeptide growth factors, including insulin, insulin-like growth factors, epidermal growth factor, fibroblast growth factors, neurotrophic growth factors, and transforming growth factors. The structure and function of each growth factor is discussed, as well as its receptor and postreceptor mechanism of action and its role in neoplastic processes. Regulatory peptides with growth factor-like properties such as bombesin, angiotensin, endothelin, atrial natriuretic factor, vasoactive intestinal peptide, and bradykinin are examined in depth. Factors related to the growth of organs such as the prostate, the heart, and the mammary gland are also covered.
This book constitutes the refereed proceedings of the 5th International Conference on Image Analysis and Recognition, ICIAR 2008, held in Póvoa do Varzim, Portugal, in June 2008. The 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. The papers are organized in topical sections on image restoration and enhancement, image and video segmentation, non-linear image processing, image and video coding and encryption, indexing and retrieval, computer vision, feature extraction and classification, shape representation and matching, object recognition, character recognition, texture and motion analysis, tracking, biomedical image analysis, biometrics, face recognition, and a special session on recent advances in multimodal biometric systems and applications.
This book presents the design and development of an access control architecture for the Internet of Things (IoT) systems. It considers the significant authentication and authorization issues for large-scale IoT systems, in particular, the need for access control, identity management, delegation of access rights and the provision of trust within such systems. It introduces a policy-based access control approach for the IoT that provides fine-grained access for authorized users to services while protecting valuable resources from unauthorized access. Further, the book discusses an identity-less, asynchronous and decentralized delegation model for the IoT leveraging the advantage of blockchain technology. It also presents an approach of attribute-based identity and examines the notion of trust in an IoT context by considering the uncertainty that exists in such systems. Fully explaining all the techniques used, the book is of interest to engineers, researchers and scientists working in the field of the wireless sensor networks, IoT systems and their access control management.
Architecture of Network Systems explains the practice and methodologies that will allow you to solve a broad range of problems in system design, including problems related to security, quality of service, performance, manageability, and more. Leading researchers Dimitrios Serpanos and Tilman Wolf develop architectures for all network sub-systems, bridging the gap between operation and VLSI.This book provides comprehensive coverage of the technical aspects of network systems, including system-on-chip technologies, embedded protocol processing and high-performance, and low-power design. It develops a functional approach to network system architecture based on the OSI reference model, which is ...
Transactions on HiPEAC aims at the timely dissemination of research contributions in computer architecture and compilation methods for high-performance embedded computer systems. Recognizing the convergence of embedded and general-purpose computer systems, this journal publishes original research on systems targeted at specific computing tasks as well as systems with broad application bases. The scope of the journal therefore covers all aspects of computer architecture, code generation and compiler optimization methods of interest to researchers and practitioners designing future embedded systems. This second issue contains 15 papers carefully reviewed and selected out of 31 submissions and is divided into two sections. The first section contains extended versions of the top five papers from the 2nd International Conference on High-Performance Embedded Architectures and Compilers (HiPEAC 2007) held in Ghent, Belgium, in January 2007. The second section consists of ten papers covering topics such as microarchitecture, memory systems, code generation, and performance modeling.
The 21st century is associated with a number of environmental, social, and economic challenges spanning from globalization and migration to climate change, global health, urbanization, and natural hazards. These challenges of the modern age command our immediate reaction towards an equal society. There is an urgent need for scientists, researchers, and politicians to take the reins by providing immediate solutions to tackle this harsh reality. The need for a more human approach has recently led to what we call humanitarian engineering. Modern Challenges and Approaches to Humanitarian Engineering provides relevant theoretical frameworks and the latest empirical research findings in this area. It discusses the most recent challenges and approaches in the field of humanitarian engineering and presents research, case studies, and innovative models. Covering topics such as contact tracing apps, scientific production, and sustainable management, this book is an essential resource for engineers, government officials, scientists, activists, humanitarians, emergency management agencies, students and educators of higher education, researchers, and academicians.
This book constitutes the refereed proceedings of the 19th International Conference on Architecture of Computing Systems, ARCS 2006, held in March 2006. The 32 revised full papers presented together with two invited and keynote papers were carefully reviewed and selected from 174 submissions. The papers are organized in topical sections on pervasive computing, memory systems, architectures, multiprocessing, energy efficient design, power awareness, network protocols, security, and distributed networks.
This book constitutes the refereed proceedings of the 6th International Workshop on Systems, Architectures, Modeling, and Simulation, SAMOS 2006, held in Samos, Greece on July 2006. The 47 revised full papers presented together with 2 keynote talks were thoroughly reviewed and selected from 130 submissions. The papers are organized in topical sections on system design and modeling, wireless sensor networks, processor design, dependable computing, architectures and implementations, and embedded sensor systems.