 |
|
|
|
 Real-Time Database Systems - Architecture and Techniques
In recent years, tremendous research has been devoted to the design of database systems for real-time applications, called real-time database systems (RTDBS), where transactions are associated with deadlines on their completion times, and some of the data objects in the database are associated with temporal constraints on their validity.... |  |  Fundamentals of Sensor Network Programming: Applications and Technology
Sensor processing is a central and an important problem in aerospace/defense, automation,
medical imaging, and robotics, to name only a few areas. A surveillance
system used in aerospace and defense is an example of a sensor processing system.
It uses devices such as infrared sensors, microwave radars, and laser radars that are... |  |  |
|
 Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
The 13th IMA Conference on Cryptography and Coding was held at the Lady
Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This
event was a 25th anniversary celebration of the very successful biennial IMA
conference series. Traditionally, the conference has taken place at the Royal
Agricultural College,... |  |  Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  |
|
| Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 |