The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...
Lire la suiteThe two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...
Lire la suiteThis book address current research and development efforts of various issues in the area of algorithms, systems and applications ...
Lire la suiteThis book constitutes the refereed post-conference proceedings of the 12th International Conference on Wireless Internet, ...
Lire la suiteThis timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic ...
Lire la suiteThis volume is organized for professional and academic readers engaged in modem design for wireless optical intensity channels. ...
Lire la suiteOffers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint ...
Lire la suiteThis book is organized in topical sections on localization, detection of space/time correlated events, network coding, ZigBee, ...
Lire la suiteWireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and ...
Lire la suiteThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteThis book It covers WLAN characterization, vehicular networks, WLAN and sensor networks protocols, QoS and routing in ad-hoc ...
Lire la suiteThis book is organized in topical sections on sensor networks, mesh networks, mobile ad-hoc networks, and cellular networks.
Lire la suiteThe Network of Excellence on Next Generation Internet (EuroNGI) is a Euro-pean project funded by the European Union within ...
Lire la suiteThis book illustrates true cross-disciplinary electronic system-level design with examples in algorithm-architecture co-design, ...
Lire la suiteProvides a summary review of wireless networking, then surveys the security threats unique to the wireless and mobile landscape. ...
Lire la suiteThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteThis book examines from a variety of perspectives the disappearance of moral content and ethical judgment from the models ...
Lire la suiteWorkflows for e-Science presents an overview of the current state of the art in the field. It brings together research from ...
Lire la suiteWriting Testbenches Using SystemVerilog offers a clear blueprint of a verification process that aims for first-time success ...
Lire la suiteJoin the game development revolution today! XNA greatly simplifies the development of your own games, lowering the barrier ...
Lire la suite