Sie haben keine Artikel im Warenkorb.

Springer US


This fully updated edition targets not only those assays directly involved in the discovery of GPCR-active compounds but also those involved in cell-based experiments designed to study physiological responses. Whether coming from academia or industry, or being an experienced researcher or a newcomer to the field, the reader will find accessible methods and protocols that cover the latest developments on receptor purification, molecular biology, recombinant engineering, and analytical techniques that enable the real time monitoring of the complex GPCR signaling cascade and identification of potential drug targets. Written for the highly successful Methods in Molecular Biology series, chapters include introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls.

Authoritative and up-to-date, G Protein-Coupled Receptor Screening Assays: Methods and Protocols, Second Edition aims to provide the tools necessary to contribute to the advancement of GPCR research and discovery and ultimately lead to the availability of innovative and more efficient drugs.
CHF 142.00

This edited book collects state-of-the-art research related to large-scale data analytics that has been accomplished over the last few years. This is among the first books devoted to this important area based on contributions from diverse scientific areas such as databases, data mining, supercomputing, hardware architecture, data visualization, statistics, and privacy.

There is increasing need for new approaches and technologies that can analyze and synthesize very large amounts of data, in the order of petabytes, that are generated by massively distributed data sources. This requires new distributed architectures for data analysis. Additionally, the heterogeneity of such sources imposes significant challenges for the efficient analysis of the data under numerous constraints, including consistent data integration, data homogenization and scaling, privacy and security preservation. The authors also broaden reader understanding of emerging real-world applications in domains such as customer behavior modeling, graph mining, telecommunications, cyber-security, and social network analysis, all of which impose extra requirements for large-scale data analysis.

Large-Scale Data Analytics is organized in 8 chapters, each providing a survey of an important direction of large-scale data analytics or individual results of the emerging research in the field. The book presents key recent research that will help shape the future of large-scale data analytics, leading the way to the design of new approaches and technologies that can analyze and synthesize very large amounts of heterogeneous data. Students, researchers, professionals and practitioners will find this book an authoritative and comprehensive resource.

CHF 59.00

A review of the literature pertaining to the neurobehavioral pharmacology of abusable drugs, this is the only book to survey each of the eleven classes of addictive drugs from the perspectives of neurological, behavioral, and clinical pharmacology. Designed to serve as a companion text to the DSM-IV manual, the Handbook provides comprehensive information about each drug and drug class having abuse potential with respect to their pharmaceutical mechanisms and actions.

CHF 177.00
Although our Moon and the planets have not changed much in the five years since the first edition of this book was published, the technology allowing you to photograph them has changed dramatically. And the costs for equipment have come down significantly, opening all kinds of possibilities to the amateur and practical astronomer. With this practical guide to taking quality shots in your own backyard, with all the light pollution found in cities and towns today and using only very basic equipment, you will be amazed at what you can accomplish. Whether you want to dazzle friends or contribute to the scientific understanding of a particular body, whether you are a fan of solar photography or craters on the Moon, the rings of Saturn, or the bands of clouds that color Jupiter, in this book you will find help and support, and clear explanations of how best to proceed. This is a hobby you can stay with for a lifetime and keep on improving. You can get fancier equipment or just learn how to better post process your snaps. Either way, you can benefit from the knowledge and experience the authors of this book share. Don't waste more time wishing you could capture the beauty found in the heavens! Read how, and get started now!
CHF 41.50

Recent years have seen an explosive growth in the use of new database applications such as CAD/CAM systems, spatial information systems, and multimedia information systems. The needs of these applications are far more complex than traditional business applications. They call for support of objects with complex data types, such as images and spatial objects, and for support of objects with wildly varying numbers of index terms, such as documents. Traditional indexing techniques such as the B-tree and its variants do not efficiently support these applications, and so new indexing mechanisms have been developed. As a result of the demand for database support for new applications, there has been a proliferation of new indexing techniques. The need for a book addressing indexing problems in advanced applications is evident. For practitioners and database and application developers, this book explains best practice, guiding the selection of appropriate indexes for each application. For researchers, this book provides a foundation for the development of new and more robust indexes. For newcomers, this book is an overview of the wide range of advanced indexing techniques. Indexing Techniques for Advanced Database Systems is suitable as a secondary text for a graduate level course on indexing techniques, and as a reference for researchers and practitioners in industry.

CHF 177.00

In 1960, Dr. Van R. Potter and Dr. Henry Pitot (at McCardle Laboratory in Madison, Wisconsin), Dr. Tetsuo Ono (then at McCardle Laboratory and now at the Japanese Foundation for Cancer Research in Tokyo, Japan) and Dr. Harold P. Morris (then at the National Cancer Institute and now at Howard University, Washington, D. C. ) decided that an experimental cancer model would be an invaluable tool to examine neoplastic changes in cells. Since they were study­ ing the various highly specific metabolic processes which are unique to liver tissues, they determined that a transplantable liver cancer model would be the ideal system to work with. This system would provide for comparison of normal liver tissue of the non-tumor bear­ ing animal, the tumor bearing animal's (host) liver and the liver cancer. Dr. Morris undertook a series of rat studies employing several chemicals known to cause liver cancer. Soon the first Morris hepatomas (#3683, 3924A, 5123) were being studied by several labs. During the next 18 years, Dr. Morris developed and transplanted numerous strains of hepatomas of which no two were identical. These tumors ranged from the very slowly-growing, highly differentiated cancer tissues, e. g. , 96l8A which is a diploid tumor containing gly­ cogen and a "nearly normal" complement of enzymes, to a large group of rapidly-growing, poorly differentiated cancer tissues, e. g.

CHF 59.00

What is the scientific status and the "truth value" of the concept of defense mechanisms? Among contemporary psychologists, three types of answers to this question may be expected. Some would wholeheartedly endorse the theoretical, clinical, and research value of this notion; others would reject it outright. Between these two extremes, a large number of observers, perhaps the majority, would suspend their judgment. Their attitude, compounded of hope and doubt, would capitalize on defense as an interesting and promising concept. At the same time, these psy­ chologists would express skepticism and disappointment over its clinical limitations, theoretical ambiguity, and research failures. The present volume is primarily addressed to the audience of hopeful skeptics-those who have not given up on the notion of defense, yet have been frustrated by the difficulties of incorporating it into the modern, streamlined structure of psychology. To this end, we have brought together theoretical and empirical contributions germane to defense together with reports about their applications to clinical and personality assessment, especially in relation to psychopathology, psychosomatics, and psycho­ therapeutic intervention.

CHF 130.00

CHF 118.00

Inverse problems are the problems that consist of finding an unknown property of an object or a medium from the observation or a response of this object or a medium to a probing signal. Thus the theory of inverse problems yields a theoretical basis for remote sensing and non-destructive evaluation. For example, if an acoustic plane wave is scattered by an obstacle, and one observes the scattered field from the obstacle, or in some exterior region, then the inverse problem is to find the shape and material properties of the obstacle. Such problems are important in the identification of flying objects (airplanes, missiles etc.) objects immersed in water (submarines, fish) and in many other situations.

This book presents the theory of inverse spectral and scattering problems and of many other inverse problems for differential equations in an essentially self-contained way. An outline of the theory of ill-posed problems is given, because inverse problems are often ill-posed. There are many novel features in this book. The concept of property C, introduced by the author, is developed and used as the basic tool for a study of a wide variety of one- and multi-dimensional inverse problems, making the theory easier and shorter.

New results include

recovery of a potential from I-function and applications to classical and new inverse scattering and spectral problems,

study of inverse problems with"incomplete data",

study of some new inverse problems for parabolic and hyperbolic equations,

discussion of some non-overdetermined inverse problems,

a study of inverse problems arising in the theory of ground-penetrating radars,

development of DSM (dynamical systems method) for solving ill-posed nonlinear operator equations,

comparison of the Ramm's inversion method for solving fixed-energy inverse scattering problem with the method based on the Dirichlet-to-Neumann map,

derivation of the range of applicability and error estimates for Born's inversion,

a study of some integral geometry problems, including tomography,

inversion formulas for the spherical means,

proof of the invertibility of the steps in the Gel'fand-Levitan and Marchenko inversion procedures,

derivation of the inversion formulas and stability estimates for the multidimensional inverse scattering problems with fixed-energy noisy discrete data,

new uniqueness and stability results in obstacle inverse scattering,

formulation and a solution of an inverse problem of radiomeasurements,

methods for finding small inhomogeneities from surface scattering data.

CHF 177.00

Observing the Messier Objects with a Small Telescope contains descriptions and photographs of the 103 Messier objects, with instructions on how to find them without a computerized telescope or even setting circles. The photographs show how the objects appear through a 127mm Maksutov (and other instruments, where applicable). The visual appearance of a Messier object is often very different from what can be imaged with the same telescope, and a special feature of this book is that it shows what you can see with a small telescope.

It will also contain binocular descriptions of some objects.

Messier published the final version of his catalog in 1781 (it contains 103 different objects), a catalog so good that it is still in common use today, well over two centuries later. In making a catalog of all the 'fixed' deep-sky objects that observers might confuse with comets, Messier had succeeded in listing all the major interesting deep-sky objects that today are targets for amateur astronomers.

Messier's telescope (thought to be a 4-inch) was, by today's amateur standards, small. It also had rather poor optics by modern standards. Thus - and despite the fact that he was a master observer - all the things Messier saw can be found and observed by any observer using a commercial 127 mm (5-inch) telescope. Observing the Messier Objects with a Small Telescope lets the reader follow in Messier's footsteps by observing the Messier objects more or less as the great man saw them himself!

CHF 59.00

Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are:
-To present methods and techniques that will help business achieve the desired level of integrity in information systems and data;
-To present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity;
-To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.
The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002.

CHF 118.00
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today's often missi- critical databases no longer contain only data used for day-to-day processing by organization; as new applications are being added, it is possible for organizations to collect and store vast amounts of data quickly and ef ciently and to make the data readily accessible to the public, typically through Web-based applications. Unfor- nately, if security threats related to the integrity, availability, and privacy of the data are not properly resolved, databases remain vulnerable to malicious attacks and - cidental misuse. Such incidents, in turn, may translate into nancial losses or losses whose values are obviously high but dif cult to quantify, e. g. , the loss of the public's trust in the data management infrastructure and services offered by an organization. In assembling this handbook, we have had a twofold objective: rst, to provide a comprehensive summary of the results of research and development activities in various aspects of database security up to this point, and second, to point toward directions for future work in this important and fruitful eld of research.
CHF 130.00

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: . what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; . what is the status quo of research and development in this area; . where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: . Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. . Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. . Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

CHF 118.00

A variety of biological and social science data come in the form of cross-classified tables of counts, commonly referred to as contingency tables. Until recent years the statistical and computational techniques available for the analysis of cross-classified data were quite limited. This book presents some of the recent work on the statistical analysis of cross-classified data using longlinear models, especially in the multidimensional situation.

CHF 59.00

From his unique perspective, renowned statistician and educator Frederick Mosteller describes many of the projects and events in his long career. From humble beginnings in western Pennsylvania to becoming the founding chairman of Harvard University's Department of Statistics and beyond, he inspired many statisticians, scientists, and students with his unabashed pragmatism, creative thinking, and zest for both learning and teaching. This candid account offers fresh insights into the qualities that made Mosteller a superb teacher, a prolific scholar, a respected leader, and a valued advisor.

A special feature of the book is its chapter-length insider accounts of work on the pre-election polls of 1948, statistical aspects of the Kinsey report on sexual behavior in the human male, mathematical learning theory, authorship of the disputed Federalist papers, safety of anesthetics, and a wide-ranging examination of the Coleman report on equality of educational opportunity.

This volume is a companion to Selected Papers of Frederick Mosteller (Springer, 2006) and A Statistical Model: Frederick Mosteller's Contributions to Statistics, Science, and Public Policy (Springer-Verlag, 1990).

Frederick Mosteller (1916-2006) was Roger I. Lee Professor of Mathematical Statistics at Harvard University. His manuscript was unfinished at his death and has been updated.

CHF 118.00

Advances for In-Vehicle and Mobile Systems: Challenges for International Standards is organized to bring together the most active scholars working on the latest techniques, standards, and emerging deployment on "living in the age of wireless communications and smart vehicular systems." The objective is to incorporate speech, dialog, video, image, vehicular sensory data, and wireless communication modalities to model the total behavior of the driver and use that model towards personalization of the vehicle to provide a more comfortable and safer driving experience. The format of this work centers on four themes: driver and driving environment recognition, telecommunication applications, noise reduction, and dialog in vehicles.

Advances for In-Vehicle and Mobile Systems: Challenges for International Standards is appropriate for researchers, engineers, and professionals working in signal processing technologies, next generation vehicle design, and networks for mobile platforms.

CHF 118.00