Free Delivery Over $100
8751 books were found.
Most everything in our experience requires management in some form or other: our gardens, our automobiles, our minds,... Read More >>
A research agenda for collaborative networks Purpose. As recognized experts in their specific areas, different authors... Read More >>
Information Systems and Data Compression presents a uniform approach and methodology for designing intelligent... Read More >>
This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop... Read More >>
Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences... Read More >>
Replication Techniques in Distributed Systems organizes and surveys the spectrum of replication protocols and systems... Read More >>
Bayesian Approach to Image Interpretation will interest anyone working in image interpretation. New ideas introduced... Read More >>
These design objectives are met at high transmission speeds by keeping the basic unit of ATM transmission - the... Read More >>
System-Level Power Optimization for Wireless Multimedia Communication Power Aware Computing focuses on emerging... Read More >>
The programme for the 27 to 29 November 97 in Madrid included invited speakers from leading institutions in the... Read More >>
Frequency Assignment and Network Planning for Digital Terrestrial Broadcasting Systems focuses on Digital Audio... Read More >>
In wireless communication systems, the network keeps track of a user’s location through an up-to-date user profile... Read More >>
This work addresses the topic of optical networks cross-layer design with a focus on physical-layer-impairment-aware... Read More >>
Offers information on EDF scheduling for real-time systems. This book presents the algorithms and associated analysis,... Read More >>
Protocol verification is a process of checking whether the interactions of protocol entities, according to the... Read More >>
Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which an intranet can be violated... Read More >>
Read More >>
This book constitutes the refereed post-proceedings of the Joint International Conference on Pervasive Computing... Read More >>
This book constitutes the proceedings of the 6th International Conference on Social Computing, Behavioral-Cultural... Read More >>
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure describes a framework for developing... Read More >>
Separate discussion has been included on wireless cellular networks performance and on the simulation of networks.... Read More >>
The core support for the Center came from a National Science Foun- tion State/Industry/University Cooperative Research... Read More >>
Contributes to the debate on whether there is a convergence of all communications, including real-time communications... Read More >>