The 5th International Conference on Adhoc, Mobile and Wireless Networks (Adhoc-Now 2006) was held during August 17–19, ...
WeiterlesenAdaptive Multi-Standard RF Front-Ends investigates solutions, benefits, limitations and costs related to multi-standard operation ...
WeiterlesenThis book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held ...
WeiterlesenAnalog Circuit Design contains the contribution of 18 tutorials of the 14th workshop on Advances in Analog Circuit Design. ...
WeiterlesenThis book reports on the state-of-the-art work developed during the four years of operation of COST Action 279, Analysis ...
WeiterlesenPositioning objects has been an important topic since it’s needed to locate people, guide them to a certain place, and ...
WeiterlesenWelcome to the post proceedings of the First International Conference on Embedded Software and Systems (ICESS 2004), which ...
WeiterlesenEnhanced Radio Access Technologies for Next Generation Mobile Communication presents a comphrenhensive overview of the latest ...
WeiterlesenFully-depleted SOI CMOS Circuits and Technology for Ultralow-Power Applications addresses the problem of reducing the supply ...
WeiterlesenThe Handbook of Networked and Embedded Control Systems, the first of its kind, provides engineers, computer scientists, mathematicians, ...
WeiterlesenKeynote Addresses.- Rethinking Computer Architecture Research.- Event Servers for Crisis Management.- DIET: Building Problem ...
WeiterlesenThe International Workshop on “Human Interaction with Machines” is the sixth in a successful series of workshops that ...
WeiterlesenThere are a lot of factors that degrade the matching of gains and phases between I/Q signals: the instinct layout mismatch, ...
Weiterlesenth This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...
WeiterlesenThe ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...
WeiterlesenThis book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...
WeiterlesenInnovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes a set of rigorously ...
WeiterlesenContext-awareness is one of the drivers of the ubiquitous computing paradigm. Well-designed context modeling and context ...
WeiterlesenThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
WeiterlesenThis book provides a solid overview of mobile phone programming targeting both academia and industry. Mobile Phone Programming ...
Weiterlesen