|
|
|
|
|
Cognitive Radio Architecture: The Engineering Foundations of Radio XMLAn exciting new technology, described by the one who invented it
This is the first book dedicated to cognitive radio, a promising new technology that is poised to revolutionize the telecommunications industry with increased wireless flexibility. Cognitive radio technology integrates computational intelligence into software-defined radio... | | Professional Android Sensor Programming
ANDROIDS ARE ALIVE. THEY CAN LOCATE THEMSELVES, see, listen, and understand speech. They can sense radio signals and detect orientation, movement, and environmental properties. Can your computer do all of that?
The availability of sensors is one feature Android devices have that makes them different from other computers. Without... | | Practical Unix & Internet Security, 3rd EditionThis new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication... |
|
|
| | Trusted Computing Platforms: Design and ApplicationsMany scenarios in modern computing give rise to a common problem: why should Alice trust computation that’s occurring at Bob’s machine? (The computer security field likes to talk about “Alice” and “Bob” and protection against an “adversary” with certain abilities.) What if Bob, or... | | Introduction to Computational Genomics: A Case Studies ApproachWhere did SARS come from? Have we inherited genes from Neanderthals? How do plants use their internal clock? The genomic revolution in biology enables us to answer such questions. But the revolution would have been impossible without the support of powerful computational and statistical methods that enable us to exploit genomic data. Many... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |