Free Delivery Over $100
8990 books were found.
Topics and features: uses an in-depth bottom-up approach to the topic of microcontroller design using the Microchip... Read More >>
""Future Internet"" is a worldwide hot topic. This book presents and discusses the ongoing initiatives and experimental... Read More >>
On behalf of the NDT 2010 conference, the Program Committee and Charles University in Prague, Czech Republic, we... Read More >>
2010 was the first time that the International Conference on Software Process was held autonomously and not co-located... Read More >>
Constitutes the proceedings of the 11th International Conference, WAIM 2010 which was held in Jiuzhaigou, China,... Read More >>
Constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea,... Read More >>
The parts dealing with modeling and models for network simulations are split into a wireless section and a section... Read More >>
BASYS 2010, which was held in Valencia, Spain, proposed new approaches in automation where synergies between people,... Read More >>
Constitutes the refereed post conference proceedings of the 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International... Read More >>
COOP 2010 is the 9th edition of the International Conference on Designing Cooperative Systems, being the second... Read More >>
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and... Read More >>
Constitutes the proceedings of the 18th International Conference on Case-Based Reasoning, held in Alessandria, Italy,... Read More >>
Constitutes the proceedings of the 9th International Conference on Artificial Evolution, held in Strasbourg, France,... Read More >>
These new failure models cover dependent failures (for instance, failure correlation by geographic proximity) and... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals,... Read More >>
Table of Contents: Why User-Centered / The Early Days: Visual Query Systems / Beyond Querying / More Advanced Applications... Read More >>
Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware... Read More >>
More specifically, each chapter articulates some of the challenges and opportunities for using brain sensing in... Read More >>
Constitutes the proceedings of the conference on Haptics: Generating and Perceiving Tangible Sensations, held in... Read More >>
Constitutes the refereed proceedings of the 37th International Colloquium on Automata, Languages and Programming,... Read More >>
Constitutes the refereed proceedings of the 22nd International Conference on Computer Aided Verification, CAV 2010,... Read More >>
Constitutes the proceedings of the conference on Haptics: Generating and Perceiving Tangible Sensations ,held in... Read More >>