The 5th International Conference on Adhoc, Mobile and Wireless Networks (Adhoc-Now 2006) was held during August 17–19, ...
Continue readingAdaptive Multi-Standard RF Front-Ends investigates solutions, benefits, limitations and costs related to multi-standard operation ...
Continue readingThis book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held ...
Continue readingAnalog Circuit Design contains the contribution of 18 tutorials of the 14th workshop on Advances in Analog Circuit Design. ...
Continue readingThis book reports on the state-of-the-art work developed during the four years of operation of COST Action 279, Analysis ...
Continue readingPositioning objects has been an important topic since it’s needed to locate people, guide them to a certain place, and ...
Continue readingWelcome to the post proceedings of the First International Conference on Embedded Software and Systems (ICESS 2004), which ...
Continue readingEnhanced Radio Access Technologies for Next Generation Mobile Communication presents a comphrenhensive overview of the latest ...
Continue readingFully-depleted SOI CMOS Circuits and Technology for Ultralow-Power Applications addresses the problem of reducing the supply ...
Continue readingThe Handbook of Networked and Embedded Control Systems, the first of its kind, provides engineers, computer scientists, mathematicians, ...
Continue readingKeynote Addresses.- Rethinking Computer Architecture Research.- Event Servers for Crisis Management.- DIET: Building Problem ...
Continue readingThe International Workshop on “Human Interaction with Machines” is the sixth in a successful series of workshops that ...
Continue readingThere are a lot of factors that degrade the matching of gains and phases between I/Q signals: the instinct layout mismatch, ...
Continue readingth This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...
Continue readingThe ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...
Continue readingThis book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...
Continue readingInnovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes a set of rigorously ...
Continue readingContext-awareness is one of the drivers of the ubiquitous computing paradigm. Well-designed context modeling and context ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue readingThis book provides a solid overview of mobile phone programming targeting both academia and industry. Mobile Phone Programming ...
Continue reading