Free Delivery Over $100
8990 books were found.
From the usage of mobile phones – either as simple telephone or for data transmissions – over the new form of telephone... Read More >>
Market-Oriented Technology Management develops fundamentals of technology cycles, technology acquisition, core technology... Read More >>
Network participants are required to observe predefined steps called security protocols, whose proof of correctness... Read More >>
He then offers the design of a scalable framework for nature-inspired routing algorithms, and he examines a practical... Read More >>
Wireless sensor networks are being employed in a variety applications ra- ing from medical to military, and from... Read More >>
This book covers computational methods, computer arithmetic algorithms, and design improvement techniques for implementing... Read More >>
To help in closing this communication gap between the group of protocol verifiers and the group of protocol implementors,... Read More >>
Social Networks and the Semantic Web offers valuable information to practitioners developing social-semantic software... Read More >>
QoS is an important subject which occupies a central place in overall packet network technologies. The second explains... Read More >>
This is especially so for video conferencing, thin-client computing and Internet cafes.CryptoGraphics: Exploiting... Read More >>
Distributed retrieval of multimedia documents, especially the long duration documents, is an imperative step in... Read More >>
Random Number Generation . . . . . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . .... Read More >>
Among the search tools currently on the Web, search engines are the most well known thanks to the popularity of... Read More >>
Read More >>
The broad scope of Cloud Computing is creating a technology, business, sociolo- cal, and economic renaissance. Cloud... Read More >>
Provides a comprehensive look at the development of actor-network theory itself, as well as case studies of its... Read More >>
Usually, the following information is required for the forwarding decision: the node's own geographical position,... Read More >>
In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic... Read More >>
Bandwidth Extension of Speech Signals describes the theory and methods for quality enhancement of clean speech signals... Read More >>
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field,... Read More >>
The IPSec may be used in three different security - mains: Virtual private networks, Application-level security,... Read More >>
Explores the optimization potential of cross-layer design approaches for wireless ad hoc and sensor network performance,... Read More >>
Constitutes the refereed proceedings of the 7th Annual Mediterranean Ad Hoc Networking Workshop held in Spain on... Read More >>
The carefully selected contributions report on research, development and real-world experiences of virtual education... Read More >>
The Home Networking Conference 2007 provided an international technical forum for experts from industry and academia... Read More >>