The articles in this book describe new developments in the area of structural testing, particularly those based upon the ...
Lee masThe book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
Lee masThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masThis volume contains a collection of papers in control theory and applications presented at a conference in honor of Clyde ...
Lee masNovel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics includes a set of rigorously ...
Lee masDiscusses recent advances in object detection and recognition using deep learning methods, which have achieved great success ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masPID Control presents a set of coordinated contributions illustrating methods, old and new, that cover the range of process ...
Lee masThis volume presents a thorough introduction to the theory and operation of drift chambers, one of the most important modern ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masThis book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...
Lee masThis book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
Lee masPractical PID Control covers important issues that arise when a PID controller is to be applied in practical cases. Its focus ...
Lee masThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Lee masPrivacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological ...
Lee masPrivacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...
Lee masAdvances in Industrial Control aims to report and encourage the transfer of technology in control engineering. The rapid ...
Lee masThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lee masThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
Lee mas