 |
|
 Multicarrier Techniques for 4G Mobile CommunicationsAt recent major international conferences on wireless communications, there have been several sessions on beyond third generation (3G) or fourth generation (4G) mobile communications systems, where modulation/demodulation and multiplexing/multiple access schemes related to multicarrier techniques have drawn a lot of attention.... |  |  Outsourcing Information Security (Computer Security Series)This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book... |  |  QoS in Integrated 3G NetworksThis book is intended to provide a self-contained general understanding of the factors that determine quality of service (QoS) in a third-generation (3G) mobile network that interacts with other fixed networks. Since QoS is an end-end quantity, and the mobile networks interact both with each other and with fixed networks, the discussion includes... |
|
|
 |  |  Organic And Inorganic Nanostructures (Atrech House Mems)Providing you with a comprehensive and up-to-date understanding of organic and inorganic nanostructures, this cutting-edge resource covers all aspects of this fast-growing area of nanotechnology. The book explores the technology, structure, and electrical and optical properties of organic/inorganic nanostructures, as well as their application in... |  |  Defense and Detection Strategies against Internet WormsThis is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,... |
|
 Information Operations PlanningInformation operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with... |  |  Text Mining for Biology And BiomedicineUniv. of Manchester, UK. Text provides bioinformatic practitioners with full range of text mining techniques to help address challenges in mining biology and biomedical texts. Includes methods of natural language processing (NLP) and their application in the biological domain; various lexical, terminological, and ontological resources; and... |  |  Information Warfare and Organizational Decision-MakingOrganizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because... |
|
| Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |