Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Handbook of Combinatorics
  • Language: en
  • Pages: 1283

Handbook of Combinatorics

  • Type: Book
  • -
  • Published: 1995-12-11
  • -
  • Publisher: Elsevier

None

Progress in Medicinal Chemistry
  • Language: en
  • Pages: 359

Progress in Medicinal Chemistry

  • Type: Book
  • -
  • Published: 1992-03-02
  • -
  • Publisher: Elsevier

The 29th volume of the series presents yet again, an exemplary survey of a wide range of current topics in medicinal chemistry and pharmacology. Eight expert reviews emphasize the relationships between chemical structure and pharmacological activity. These detailed discussions of some of the most exciting developments in the field today, will prove of great value to future research. The book begins with a study of anti-inflammatory activities of 5-lipoxygenase inhibitors, followed by an overview of the antiarrhythmic therapeutic possibilities offered by Class III electrophysiological agents. Structures and activities of some opioid ligands are surveyed, and the investigation into pharmacologically active pyridazine derivatives is continued. Dopamine D2 receptor agonists offer exciting therapeutic potential, as do ondansetron and related 5-HT 3 antagonists. The herbal origin of many modern drugs is yet again reflected in a survey of the herb feverfew. The volume concludes, as it began, with enzyme inhibition - in this case concerning synthetic inhibitors of interstitial collagenases.

Information Theoretic Security
  • Language: en
  • Pages: 260

Information Theoretic Security

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions. There were nine invited speeches to the conference. The topics covered are secure and reliable communication; quantum information and communication; networks and devices; multiparty computation; information hiding and tracing; coding theory and security; quantum computation; foundation; and encryption.

Integer Programming and Combinatorial Optimization
  • Language: en
  • Pages: 464

Integer Programming and Combinatorial Optimization

  • Type: Book
  • -
  • Published: 2019-05-02
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 20th International Conference on Integer Programming and Combinatorial Optimization, IPCO 2019, held in Ann Arbor, MI, USA, in May 2019. The 33 full versions of extended abstracts presented were carefully reviewed and selected from 114 submissions. The conference is a forum for researchers and practitioners working on various aspects of integer programming and combinatorial optimization. The aim is to present recent developments in theory, computation, and applications in these areas.

Handbook of Combinatorics Volume 1
  • Language: en
  • Pages: 1121

Handbook of Combinatorics Volume 1

  • Type: Book
  • -
  • Published: 1995-12-11
  • -
  • Publisher: Elsevier

Handbook of Combinatorics, Volume 1 focuses on basic methods, paradigms, results, issues, and trends across the broad spectrum of combinatorics. The selection first elaborates on the basic graph theory, connectivity and network flows, and matchings and extensions. Discussions focus on stable sets and claw free graphs, nonbipartite matching, multicommodity flows and disjoint paths, minimum cost circulations and flows, special proof techniques for paths and circuits, and Hamilton paths and circuits in digraphs. The manuscript then examines coloring, stable sets, and perfect graphs and embeddings and minors. The book takes a look at random graphs, hypergraphs, partially ordered sets, and matroids. Topics include geometric lattices, structural properties, linear extensions and correlation, dimension and posets of bounded degree, hypergraphs and set systems, stability, transversals, and matchings, and phase transition. The manuscript also reviews the combinatorial number theory, point lattices, convex polytopes and related complexes, and extremal problems in combinatorial geometry. The selection is a valuable reference for researchers interested in combinatorics.

Advances in Information and Computer Security
  • Language: en
  • Pages: 383

Advances in Information and Computer Security

  • Type: Book
  • -
  • Published: 2010-11-01
  • -
  • Publisher: Springer

The Fifth International Workshop on Security (IWSEC 2010) was held at Kobe InternationalConferenceCenter,Kobe,Japan,November22–24,2010. Thewo- shop was co-organized by CSEC, a special interest group concerned with the computer security of the Information Processing Society of Japan (IPSJ) and ISEC,atechnicalgroupconcernedwiththe informationsecurityofTheInstitute of Electronics, Information and Communication Engineers (IEICE). The exc- lentLocalOrganizingCommitteewasledbytheIWSEC2010GeneralCo-chairs, Hiroaki Kikuchi and Toru Fujiwara. This year IWSEC 2010 had three tracks, the Foundations of Security (Track I), Security in Networks and Ubiquitous Computing Systems (Track II), and Security i...

Process-Spray
  • Language: en
  • Pages: 1030

Process-Spray

  • Type: Book
  • -
  • Published: 2016-08-01
  • -
  • Publisher: Springer

This book describes the latest research on producing functional particles using spray processes. The authors detail micro level elementary processes and phase boundaries, process analysis scaling and modeling, and macro level process functions and particle properties. They include numerical simulations and particulars of experiments for deriving process conditions for particle production.

Handbook of Combinatorics Volume 1
  • Language: en
  • Pages: 1124

Handbook of Combinatorics Volume 1

  • Type: Book
  • -
  • Published: 1995-12-11
  • -
  • Publisher: Elsevier

Handbook of Combinatorics, Volume 1 focuses on basic methods, paradigms, results, issues, and trends across the broad spectrum of combinatorics. The selection first elaborates on the basic graph theory, connectivity and network flows, and matchings and extensions. Discussions focus on stable sets and claw free graphs, nonbipartite matching, multicommodity flows and disjoint paths, minimum cost circulations and flows, special proof techniques for paths and circuits, and Hamilton paths and circuits in digraphs. The manuscript then examines coloring, stable sets, and perfect graphs and embeddings and minors. The book takes a look at random graphs, hypergraphs, partially ordered sets, and matroids. Topics include geometric lattices, structural properties, linear extensions and correlation, dimension and posets of bounded degree, hypergraphs and set systems, stability, transversals, and matchings, and phase transition. The manuscript also reviews the combinatorial number theory, point lattices, convex polytopes and related complexes, and extremal problems in combinatorial geometry. The selection is a valuable reference for researchers interested in combinatorics.

Combinatorial Optimization
  • Language: en
  • Pages: 596

Combinatorial Optimization

This well-written textbook on combinatorial optimization puts special emphasis on theoretical results and algorithms with provably good performance, in contrast to heuristics. The book contains complete (but concise) proofs, as well as many deep results, some of which have not appeared in any previous books.

Information Security and Cryptology
  • Language: en
  • Pages: 536

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2011-07-08
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.