Home | Amazing | Today | Tags | Publishers | Years | Search 
The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications
The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications

A practical overview of OMA specifications and how they enable mobile multimedia services & much more …!

The Open Mobile Alliance (OMA) is an industry forum, which develops open specifications to help in the creation of applications and services to be deployed over converged networks. The alliance is...

Unconventional Computation: 7th International Conference, UC 2008, Vienna, Austria, August 25-28, 2008, Proceedings
Unconventional Computation: 7th International Conference, UC 2008, Vienna, Austria, August 25-28, 2008, Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Unconventional Computation, UC 2008, held in Vienna, Austria, in August 2008.

The 16 revised full papers presented together with 4 invited papers were carefully reviewed and selected for inclusion in the book. The papers are devoted to all aspects of...

Digital Compensation for Analog Front-Ends: A New Approach to Wireless Transceiver Design
Digital Compensation for Analog Front-Ends: A New Approach to Wireless Transceiver Design
The desire to build lower cost analog front-ends has triggered interest in a new domain of research. Consequently the joint design of the analog front-end and of the digital baseband algorithms has become an important field of research. It enables the wireless systems and chip designers to more effectively trade the communication performance with...
Encyclopedia Of Chemistry (Science Encyclopedia)
Encyclopedia Of Chemistry (Science Encyclopedia)
Students beginning their study of chemistry are faced with understanding many terms that are puzzling and unrelated to contexts that make them understandable. Others may seem familiar, but in chemistry they have meanings that are not quite the same as when used in popular discourse. In science, terms need to have definite and specific meanings. One...
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
Force Microscopy: Applications in Biology and Medicine
Force Microscopy: Applications in Biology and Medicine
A complete examination of the uses of the atomic force microscope in biology and medicine

This cutting-edge text, written by a team of leading experts, is the first detailed examination of the latest, most powerful scanning probe microscope, the atomic force microscope (AFM). Using the AFM, in combination with...

Biomedical Imaging (Principles and Applications in Engineering, 10)
Biomedical Imaging (Principles and Applications in Engineering, 10)
Containing chapters carefully selected from CRC’s best-selling engineering handbooks, volumes in the Principles and Applications in Engineering series provide convenient, economical references sharply focused on particular engineering topics and subspecialties. Culled from the Biomedical Engineering Handbook,...
Wireless Positioning Technologies and Applications (Technology and Applications)
Wireless Positioning Technologies and Applications (Technology and Applications)
At last--here's a comprehensive book that puts full details on all short-range wireless-positioning methods at your command for instant access and use. This one-stop resource surveys each technique's theory of operation, advantages and disadvantages, applicability in different domains, implementation procedures, and accuracy to help you select the...
Java 2 Micro Edition: Professional Developer's Guide
Java 2 Micro Edition: Professional Developer's Guide

The ultimate guide to programming handheld and embedded devices

Can Java be used effectively on small computing devices? Absolutely, says expert Eric Giguère, as he introduces Java™ 2 Micro Edition (J2ME)–the new release from Sun Microsystems designed specifically to run on small computing devices like cellular...

Developments in Language Theory: 12th International Conference, DLT 2008, Kyoto, Japan, September 16-19, 2008, Proceedings
Developments in Language Theory: 12th International Conference, DLT 2008, Kyoto, Japan, September 16-19, 2008, Proceedings
This book constitutes the refereed proceedings of the 12th International Conference on Developments in Language Theory, DLT 2008, held in Kyoto, Japan, September 2008.

The 36 revised full papers presented together with 6 invited papers were carefully reviewed and selected from 102 submissions. All important issues in language theory are...

The Future of Mobile Communications: Awaiting the Third Generation
The Future of Mobile Communications: Awaiting the Third Generation
The aim of this book is to investigate the prospects for mobile communications in the new millennium. In effect, this boils down to a key issue: Will the so-called third generation of mobile (alternatively, wireless or cellular) technology turn out to be a success or a failure? This is no minor issue since telecommunications is one of the...
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy