Free Delivery Over $100
8966 books were found.
Audience and purpose of this book This book presents key concepts in Web caching and is meant to be suited for a... Read More >>
Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference... Read More >>
Integrated network management plays a pivotal role in establishing and maintaining an efficient worldwide information... Read More >>
The proliferation of wireless networks and small portable computing devices has led to the emergence of the mobile... Read More >>
A critical collection of edited-survey research papers spanning the entire range of Roger Needham's distinguished... Read More >>
Most everything in our experience requires management in some form or other: our gardens, our automobiles, our minds,... Read More >>
Information Systems and Data Compression presents a uniform approach and methodology for designing intelligent... Read More >>
A research agenda for collaborative networks Purpose. As recognized experts in their specific areas, different authors... Read More >>
Replication Techniques in Distributed Systems organizes and surveys the spectrum of replication protocols and systems... Read More >>
Bayesian Approach to Image Interpretation will interest anyone working in image interpretation. New ideas introduced... Read More >>
These design objectives are met at high transmission speeds by keeping the basic unit of ATM transmission - the... Read More >>
System-Level Power Optimization for Wireless Multimedia Communication Power Aware Computing focuses on emerging... Read More >>
Frequency Assignment and Network Planning for Digital Terrestrial Broadcasting Systems focuses on Digital Audio... Read More >>
In wireless communication systems, the network keeps track of a user’s location through an up-to-date user profile... Read More >>
This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop... Read More >>
Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences... Read More >>
The programme for the 27 to 29 November 97 in Madrid included invited speakers from leading institutions in the... Read More >>
Offers information on EDF scheduling for real-time systems. This book presents the algorithms and associated analysis,... Read More >>
Protocol verification is a process of checking whether the interactions of protocol entities, according to the... Read More >>
Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which an intranet can be violated... Read More >>
This work addresses the topic of optical networks cross-layer design with a focus on physical-layer-impairment-aware... Read More >>
This volume contains recently extended refereed papers of the 5th International Workshop on Performance Modelling... Read More >>
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure describes a framework for developing... Read More >>