Electronic Books

Total Books: 21 - 40 /119
Coding for Wireless Channels

Accessible introduction to the theoretical foundations of modern coding theoryIncluding numerous applications to wireless ...

Lee mas
Combinatorial Pattern Matching

This book constitutes the refereed proceedings of the 12th Annual Symposium on Combinatorial Pattern Matching, CPM 2001, ...

Lee mas
Combinatorial Pattern Matching

This book presented original research contri- tions on computational pattern matching and analysis, data compression and ...

Lee mas
Combinatorial Pattern Matching

This book presented original research contri- tions on computational pattern matching and analysis, data compression and ...

Lee mas
Combinatorial Pattern Matching (vol. # 4009)

The book presents 33 revised full papers together with 3 invited talks, organized in topical sections on data structures, ...

Lee mas
Communication Systems

Presents main concepts of mobile communication systems, both analog and digitalIntroduces concepts of probability, random ...

Lee mas
Computational Commutative Algebra 2

The main part of this book is a breathtaking passeggiata through the computational domains of graded rings and modules and ...

Lee mas
Computer Safety, Reliability, and Security : 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings

This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...

Lee mas
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...

Lee mas
Cooperation in Wireless Networks: Principles and Applications

Cooperation in Wireless Networks: Principles and Applications covers the underlying principles of cooperative techniques ...

Lee mas
Coordinated Multiuser Communications

Many communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...

Lee mas
Cryptanalytic Attacks on RSA

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...

Lee mas
Cryptographic Hardware and Embedded Systems - CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...

Lee mas
Cryptography and Coding

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...

Lee mas
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

Lee mas
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

Lee mas
Cryptography and Network Security: principles and practices / W. Stallings

Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...

Lee mas
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd Edition / Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan

A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...

Lee mas
CyberParks – The Interface Between People, Places and Technology

This book is about public open spaces, about people, and about the relationship between them and the role of technology in ...

Lee mas
DNA Computing (vol. # 3892)

It is evidence of how well the interdisciplinary nature of the conference has truly matured that the major criterion of quality, ...

Lee mas
Total Books: 21 - 40 /119