The articles in this book describe new developments in the area of structural testing, particularly those based upon the ...
Continue readingThe book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
Continue readingThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingThis volume contains a collection of papers in control theory and applications presented at a conference in honor of Clyde ...
Continue readingNovel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics includes a set of rigorously ...
Continue readingDiscusses recent advances in object detection and recognition using deep learning methods, which have achieved great success ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingPID Control presents a set of coordinated contributions illustrating methods, old and new, that cover the range of process ...
Continue readingThis volume presents a thorough introduction to the theory and operation of drift chambers, one of the most important modern ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingThis book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
Continue readingPractical PID Control covers important issues that arise when a PID controller is to be applied in practical cases. Its focus ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Continue readingPrivacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological ...
Continue readingPrivacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...
Continue readingAdvances in Industrial Control aims to report and encourage the transfer of technology in control engineering. The rapid ...
Continue readingThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Continue readingThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
Continue reading