Security for Wireless Ad Hoc Networks Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature... Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
Handbook of Software Quality Assurance The industry's top guide to software quality -- completely updated!
Practical techniques for mission-critical and commercial software.
Build a great software quality organization.
Prepare for ASQ Software Quality Engineer Certification.
Software quality assurance has never been more challenging -- nor more...
Data Mining: A Knowledge Discovery Approach
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist
Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. First,
“long enough” may, in practice, be “too long” in many applications and thus unacceptable. Second,...
|Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 |