This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Mobile Information ...
اقرأ المزيد
                This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
اقرأ المزيد
                Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...
اقرأ المزيد
                This book is based on a seminar held in Dagstuhl Castle, Germany, in January 2004. It presents 19 carefully reviewed and ...
اقرأ المزيد
                This book constitutes the thoroughly refereed post-workshop proceedings of the Second Automotive Software Workshop, ASWSD ...
اقرأ المزيد
                This two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
اقرأ المزيد
                This two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
اقرأ المزيد
                This book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
اقرأ المزيد
                The three volume set LNCS 4232, LNCS 4233, and LNCS 4234 constitutes the refereed proceedings of the 13th International Conference ...
اقرأ المزيد
                This book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
اقرأ المزيد
                New Algorithms, Architectures and Applications for Reconfigurable Computing consists of a collection of contributions from ...
اقرأ المزيد
                The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
اقرأ المزيدThis volume is the proceedings of the workshop “Next Generation Design and Verification Methodologies for Distributed Embedded ...
اقرأ المزيد
                Shows students how to use both the principles of software engineering and the practices of various object-oriented tools, ...
اقرأ المزيد
                New software tools and a sophisticated methodology above RTL are required to answer the challenges of designing an optimized ...
اقرأ المزيد
                This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
اقرأ المزيد
                "Parallel Evolutionary Computation" focuses on the aspects related to the parallelization of evolutionary computations, ...
اقرأ المزيد
                Companies are again searching for ways to improve their processing power without further investment in new hardware and software. ...
اقرأ المزيد
                The material presented in Platform Based Design at the Electronic System Level will help system architects, system integrators, ...
اقرأ المزيدThe task of the system architect is to take the correct early decisions despite the uncertainties. Power-Aware Architecting ...
اقرأ المزيد