The articles in this book describe new developments in the area of structural testing, particularly those based upon the ...
WeiterlesenThe book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
WeiterlesenThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
WeiterlesenThis volume contains a collection of papers in control theory and applications presented at a conference in honor of Clyde ...
WeiterlesenNovel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics includes a set of rigorously ...
WeiterlesenDiscusses recent advances in object detection and recognition using deep learning methods, which have achieved great success ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
WeiterlesenPID Control presents a set of coordinated contributions illustrating methods, old and new, that cover the range of process ...
WeiterlesenThis volume presents a thorough introduction to the theory and operation of drift chambers, one of the most important modern ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...
WeiterlesenThis book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
WeiterlesenPractical PID Control covers important issues that arise when a PID controller is to be applied in practical cases. Its focus ...
WeiterlesenThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
WeiterlesenPrivacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological ...
WeiterlesenPrivacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...
WeiterlesenAdvances in Industrial Control aims to report and encourage the transfer of technology in control engineering. The rapid ...
WeiterlesenThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
WeiterlesenThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
Weiterlesen