Free Delivery Over $100
6935 books were found.
This text describes modern embedded processing systems using the Field Programmable Gate Array. This new paradigm... Read More >>
Read More >>
Supplying comprehensive coverage of Wireless Sensor Networks (WSNs), this book covers the latest advances in WSN... Read More >>
Coverage includes important breakthroughs in various aspects of GSC, including multi-core architectures, interconnection... Read More >>
This book describes research performed in the context of trust/distrust propagation and aggregation, and their use... Read More >>
Domain decomposition methods are iterative methods for solving the often very large linearor nonlinear systems of... Read More >>
This trend is supported by the fact that: a) many algorithms and programs are highly parallel in their structure,... Read More >>
The three-volume set LNCS 8009-8011 constitutes the refereed proceedings of the 7th International Conference on... Read More >>
SC-FDMA for Mobile Communications examines Single-Carrier Frequency Division Multiple Access (SC-FDMA). Explaining... Read More >>
Research and development of logic synthesis and verification have matured considerably over the past two decades.... Read More >>
The Engineering of Complex Real-Time Computer Control Systems brings together in one place important contributions... Read More >>
The book will be mostly reference and part cookbook. Careful descriptions of the hardware and software abstractions,... Read More >>
FORTE 2001, formerly FORTE/PSTV conference, is a combined conference of FORTE (Formal Description Techniques for... Read More >>
Identifies the nuts and bolts of engineering secure systems, and also provides an effective framework for specifying... Read More >>
Cognitive science arose in the 1950s when it became apparent that anumber of disciplines, including psychology,... Read More >>
Offers a snapshot of motivations and methodologies for our collective attempts to transform our lives and enable... Read More >>
We do try to convince the reader that there is a mathematical basis consisting of theories of bounds of linear functions... Read More >>
Includes the developments in: security protocols; secure software engineering; mobile agent security; e-commerce... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on... Read More >>
This book constitutes the refereed proceedings of the 5th International Conference on Reversible Computation, RC... Read More >>
Although several books and academic courses discuss data management and networking, few of them focus on the convergence... Read More >>