|
|
|
|
|
|
Security for Wireless Ad Hoc NetworksWireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature... | | Handbook of Research on Virtual Workplaces and the New Nature of Business PracticesAt one time, the office was a physical place, and employees congregated in the same location to work together on projects. The advent of the Internet and the World Wide Web, however, not only made the unthinkable possible, it forever changed the way persons view both the office and work. The Handbook of Research on Virtual Workplaces and the New... | | Database Performance Tuning and OptimizationThe book provides comprehensive coverage of database performance tuning and optimization using Oracle 8i as the RDBMS. The chapters contain both theoretical discussions dealing with principles and methodology as well as actual SQL scripts to implement the methodology. The book combines theory with practice so as to make it useful for DBAs and... |
|
A Subject Guide to Quality Web Sites
The Web is always moving, always changing. As some Web sites come, others go, but the most effective sites have been well established. A Subject Guide to Quality Web Sites provides a list of key web sites in various disciplines that will assist researchers with a solid starting point for their queries. The sites included in this collection... | | Diagrammatic Reasoning in AI
This book is really the end product of over a decade of work, on and off, on
diagrammatic reasoning in artificial intelligence (AI). In developing this book, I
drew inspiration from a variety of sources: two experimental studies, the development
of two prototype systems, an extensive literature review and analysis in
AI,... | | Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these... |
|
|
Result Page: 150 149 148 147 146 145 144 143 142 141 140 |