The 5th International Conference on Adhoc, Mobile and Wireless Networks (Adhoc-Now 2006) was held during August 17–19, ...
اقرأ المزيدAdaptive Multi-Standard RF Front-Ends investigates solutions, benefits, limitations and costs related to multi-standard operation ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held ...
اقرأ المزيدAnalog Circuit Design contains the contribution of 18 tutorials of the 14th workshop on Advances in Analog Circuit Design. ...
اقرأ المزيدThis book reports on the state-of-the-art work developed during the four years of operation of COST Action 279, Analysis ...
اقرأ المزيدPositioning objects has been an important topic since it’s needed to locate people, guide them to a certain place, and ...
اقرأ المزيدWelcome to the post proceedings of the First International Conference on Embedded Software and Systems (ICESS 2004), which ...
اقرأ المزيدEnhanced Radio Access Technologies for Next Generation Mobile Communication presents a comphrenhensive overview of the latest ...
اقرأ المزيدFully-depleted SOI CMOS Circuits and Technology for Ultralow-Power Applications addresses the problem of reducing the supply ...
اقرأ المزيدThe Handbook of Networked and Embedded Control Systems, the first of its kind, provides engineers, computer scientists, mathematicians, ...
اقرأ المزيدKeynote Addresses.- Rethinking Computer Architecture Research.- Event Servers for Crisis Management.- DIET: Building Problem ...
اقرأ المزيدThe International Workshop on “Human Interaction with Machines” is the sixth in a successful series of workshops that ...
اقرأ المزيدThere are a lot of factors that degrade the matching of gains and phases between I/Q signals: the instinct layout mismatch, ...
اقرأ المزيدth This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...
اقرأ المزيدThe ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...
اقرأ المزيدInnovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes a set of rigorously ...
اقرأ المزيدContext-awareness is one of the drivers of the ubiquitous computing paradigm. Well-designed context modeling and context ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
اقرأ المزيدThis book provides a solid overview of mobile phone programming targeting both academia and industry. Mobile Phone Programming ...
اقرأ المزيد