A unique feature of this open access textbook is to provide a comprehensive introduction to the fundamental knowledge in ...
اقرأ المزيدThe authors present new results on issues involving wireless LANs and ad hoc networks; mobile wireless internet and satellite ...
اقرأ المزيدKou and Yesha and their contributors provide comprehensive information on these technologies, including, for example, wireless ...
اقرأ المزيدEnhanced Radio Access Technologies for Next Generation Mobile Communication presents a comphrenhensive overview of the latest ...
اقرأ المزيدConcludes that enhancing police integrity goes well beyond culling out "bad apple" police officers. Police administrators ...
اقرأ المزيدIn ECC for Non-Volatile Memories the authors expose the basics of coding theory needed to understand the application to memories, ...
اقرأ المزيدThis text offers a thorough introduction to the mathematical concepts behind the theory of error-correcting linear codes. ...
اقرأ المزيدThis text offers a thorough introduction to the mathematical concepts behind the theory of error-correcting linear codes. ...
اقرأ المزيدThis book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting ...
اقرأ المزيدThis open access book disseminates some of the results of the European H2020 AiRT Project (Technology transfer of RPAs for ...
اقرأ المزيدThis book is a guide to the implementation of good processes in a .NET environment. Author Marc Holmes focuses on actual ...
اقرأ المزيدThe Facebook API allows web developers to create Facebook applications and access Facebook data from other applications. ...
اقرأ المزيدThe Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
اقرأ المزيدIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
اقرأ المزيدIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
اقرأ المزيدIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
اقرأ المزيدThe expert witness’ job is often described as a balancing act: duty to clients on the one hand, duty to society on the ...
اقرأ المزيدMany would–be software entrepreneurs with expertise in many fields attempt to turn a homegrown application—one developed ...
اقرأ المزيدApplication documents recent approaches and results presented at the International Embedded Systems Symposium (IESS 2005), ...
اقرأ المزيدThis book constitutes the thoroughly refereed research papers contributed to a research project on the `General Theory of ...
اقرأ المزيد