The articles in this book describe new developments in the area of structural testing, particularly those based upon the ...
اقرأ المزيدThe book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
اقرأ المزيدThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدThis volume contains a collection of papers in control theory and applications presented at a conference in honor of Clyde ...
اقرأ المزيدNovel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics includes a set of rigorously ...
اقرأ المزيدDiscusses recent advances in object detection and recognition using deep learning methods, which have achieved great success ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدPID Control presents a set of coordinated contributions illustrating methods, old and new, that cover the range of process ...
اقرأ المزيدThis volume presents a thorough introduction to the theory and operation of drift chambers, one of the most important modern ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
اقرأ المزيدPractical PID Control covers important issues that arise when a PID controller is to be applied in practical cases. Its focus ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
اقرأ المزيدPrivacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological ...
اقرأ المزيدPrivacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...
اقرأ المزيدAdvances in Industrial Control aims to report and encourage the transfer of technology in control engineering. The rapid ...
اقرأ المزيدThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
اقرأ المزيد