The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...
Continue readingThe two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...
Continue readingThis book address current research and development efforts of various issues in the area of algorithms, systems and applications ...
Continue readingThis book constitutes the refereed post-conference proceedings of the 12th International Conference on Wireless Internet, ...
Continue readingThis timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic ...
Continue readingThis volume is organized for professional and academic readers engaged in modem design for wireless optical intensity channels. ...
Continue readingOffers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint ...
Continue readingThis book is organized in topical sections on localization, detection of space/time correlated events, network coding, ZigBee, ...
Continue readingWireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and ...
Continue readingThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThis book It covers WLAN characterization, vehicular networks, WLAN and sensor networks protocols, QoS and routing in ad-hoc ...
Continue readingThis book is organized in topical sections on sensor networks, mesh networks, mobile ad-hoc networks, and cellular networks.
Continue readingThe Network of Excellence on Next Generation Internet (EuroNGI) is a Euro-pean project funded by the European Union within ...
Continue readingThis book illustrates true cross-disciplinary electronic system-level design with examples in algorithm-architecture co-design, ...
Continue readingProvides a summary review of wireless networking, then surveys the security threats unique to the wireless and mobile landscape. ...
Continue readingThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThis book examines from a variety of perspectives the disappearance of moral content and ethical judgment from the models ...
Continue readingWorkflows for e-Science presents an overview of the current state of the art in the field. It brings together research from ...
Continue readingWriting Testbenches Using SystemVerilog offers a clear blueprint of a verification process that aims for first-time success ...
Continue readingJoin the game development revolution today! XNA greatly simplifies the development of your own games, lowering the barrier ...
Continue reading