The 5th International Conference on Adhoc, Mobile and Wireless Networks (Adhoc-Now 2006) was held during August 17–19, ...
Continue reading
Adaptive Multi-Standard RF Front-Ends investigates solutions, benefits, limitations and costs related to multi-standard operation ...
Continue reading
This book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held ...
Continue reading
Analog Circuit Design contains the contribution of 18 tutorials of the 14th workshop on Advances in Analog Circuit Design. ...
Continue reading
This book reports on the state-of-the-art work developed during the four years of operation of COST Action 279, Analysis ...
Continue readingPositioning objects has been an important topic since it’s needed to locate people, guide them to a certain place, and ...
Continue reading
Welcome to the post proceedings of the First International Conference on Embedded Software and Systems (ICESS 2004), which ...
Continue reading
Enhanced Radio Access Technologies for Next Generation Mobile Communication presents a comphrenhensive overview of the latest ...
Continue reading
Fully-depleted SOI CMOS Circuits and Technology for Ultralow-Power Applications addresses the problem of reducing the supply ...
Continue reading
The Handbook of Networked and Embedded Control Systems, the first of its kind, provides engineers, computer scientists, mathematicians, ...
Continue reading
Keynote Addresses.- Rethinking Computer Architecture Research.- Event Servers for Crisis Management.- DIET: Building Problem ...
Continue reading
The International Workshop on “Human Interaction with Machines” is the sixth in a successful series of workshops that ...
Continue reading
There are a lot of factors that degrade the matching of gains and phases between I/Q signals: the instinct layout mismatch, ...
Continue reading
th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...
Continue reading
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...
Continue reading
This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...
Continue reading
Innovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes a set of rigorously ...
Continue reading
Context-awareness is one of the drivers of the ubiquitous computing paradigm. Well-designed context modeling and context ...
Continue reading
This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue reading
This book provides a solid overview of mobile phone programming targeting both academia and industry. Mobile Phone Programming ...
Continue reading