The book aims not only at providing a comprehensive technology and standard reference overview for students, but also useful ...
اقرأ المزيدReservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 6th German Conference on Multiagent Systems Technologies, MATES 2008, ...
اقرأ المزيدMultibody Dynamics is an area of Computational Mechanics which blends together various disciplines such as structural dynamics, ...
اقرأ المزيدThis book summarizes the main scientific results of the Collaborative Research Center on Multifield Problems in Continuum ...
اقرأ المزيدThis book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and ...
اقرأ المزيدThis book constitutes the thoroughly refereed joint post-workshop proceedings of two co-located events: the Second International ...
اقرأ المزيدThis book constitutes the refereed post-conference proceedings of the First International Workshop on Multiple-Aspect Analysis ...
اقرأ المزيدThe 82 revised full papers were carefully reviewed and selected from numerous submissions for inclusion in the book. The ...
اقرأ المزيدThe book includes expert reviews on the advances and current problems associated with the implants and nanodevices along ...
اقرأ المزيدPresents varied clinical applications of nanomaterials in dentistry ranging from diagnostics to therapeutics. it discusses ...
اقرأ المزيدProvides a fundamental overview of natural polysaccharides, their sources, extraction methodologies, and characterizations. ...
اقرأ المزيدThis book contains a selection of papers presented at the International Seminar "Negotiation and Market Engineering", held ...
اقرأ المزيد‘Network’ is a heavily overloaded term, so that ‘network analysis’ means different things to different people. Specific ...
اقرأ المزيدThis useful volume introduces concepts and principles of network performance analysis by example, using the J programming ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Second International Conference on Network-Based Information Systems, ...
اقرأ المزيدThe book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
اقرأ المزيدThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
اقرأ المزيدThe 228 revised full papers presented were carefully reviewed and selected from numerous ordinary paper submissions and 15 ...
اقرأ المزيدThe 228 revised full papers presented were carefully reviewed and selected from numerous ordinary paper submissions and 15 ...
اقرأ المزيد