Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيد
Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
اقرأ المزيد
This book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...
اقرأ المزيد
This book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...
اقرأ المزيد
This book describes the principles of working with soil as a construction material, including two basic ways of treating ...
اقرأ المزيد
The book introduces innovative models and algorithms for the evaluation of WCDMA/UMTS network performance. The author established ...
اقرأ المزيد
the author also explains the uses and rationale behind a plethora of technologies, most notably several industry-standard ...
اقرأ المزيد
A unique feature of this open access textbook is to provide a comprehensive introduction to the fundamental knowledge in ...
اقرأ المزيد
The authors present new results on issues involving wireless LANs and ad hoc networks; mobile wireless internet and satellite ...
اقرأ المزيد
Kou and Yesha and their contributors provide comprehensive information on these technologies, including, for example, wireless ...
اقرأ المزيد
Enhanced Radio Access Technologies for Next Generation Mobile Communication presents a comphrenhensive overview of the latest ...
اقرأ المزيد
Concludes that enhancing police integrity goes well beyond culling out "bad apple" police officers. Police administrators ...
اقرأ المزيد
In ECC for Non-Volatile Memories the authors expose the basics of coding theory needed to understand the application to memories, ...
اقرأ المزيد
This text offers a thorough introduction to the mathematical concepts behind the theory of error-correcting linear codes. ...
اقرأ المزيد
This text offers a thorough introduction to the mathematical concepts behind the theory of error-correcting linear codes. ...
اقرأ المزيد
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting ...
اقرأ المزيد
This open access book disseminates some of the results of the European H2020 AiRT Project (Technology transfer of RPAs for ...
اقرأ المزيد
This book is a guide to the implementation of good processes in a .NET environment. Author Marc Holmes focuses on actual ...
اقرأ المزيد
The Facebook API allows web developers to create Facebook applications and access Facebook data from other applications. ...
اقرأ المزيد
The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
اقرأ المزيد