Free Delivery Over $100
8990 books were found.
The ability of production companies to rapidly develop and deploy effective and efficient control systems is critical... Read More >>
Digital image compression offers a solution to a variety of imaging applications that require a vast amount of... Read More >>
This volume presents high quality research ideas and results from theoretic, algorithmic and application viewpoints.... Read More >>
Queueing network models have been widely applied as a powerful tool for modelling, performance evaluation, and... Read More >>
Space-Time Processing for CDMA Mobile Communications will be an invaluable reference work for engineers and researchers,... Read More >>
Some of our day-to-day situations dealing with self-organization, mobility management, and energy efficient design... Read More >>
Quality of Service in Optical Burst Switched Networks is a broad review and reference for researchers and professionals... Read More >>
Presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques. This book also... Read More >>
Optical communications networks are an essential part of the world wide te- communication infrastructure . The use... Read More >>
We dedicate this book to students 0/ computer science who want to under stand why the radio channel is at the heart... Read More >>
Network Management in Wired and Wireless Networks addresses various open issues related to performance monitoring,... Read More >>
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection... Read More >>
Telecommunications Network Design And Management represents the state-of-the-art of applying operations research... Read More >>
This volume contains selected papers from the conference in the following focus areas: ad hoc networks / hybrid... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
These chapters tackle a number of critical issues in distributed multimedia systems and applications - from VLSI... Read More >>
It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability... Read More >>
This book details the SERENITY approach towards providing security and dependability solutions for dynamic, highly-distributed... Read More >>
Access to Mobile Services focuses on methods for accessing broadcast based M-services from multiple wireless channels.... Read More >>
Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate... Read More >>
Read More >>
2.1 E-Government: e-Governance and e-Democracy The term Electronic Government (e-Government), as an expression,... Read More >>
Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction,... Read More >>
Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security,... Read More >>
Constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies... Read More >>