Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Dissemination in Wireless Computing Environments (Advances in Database Systems)
Data Dissemination in Wireless Computing Environments (Advances in Database Systems)
In our increasingly mobile world the ability to access information on demand at any time and place can satisfy people's information needs as well as confer on them a competitive advantage. The emergence of battery-operated, low-cost and portable computers such as palmtops and PDAs, coupled with the availability and exploitation of wireless...
Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there...
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

Supporting People with Dementia Using Pervasive Health Technologies (Advanced Information and Knowledge Processing)
Supporting People with Dementia Using Pervasive Health Technologies (Advanced Information and Knowledge Processing)

Information and communication technologies can provide new paradigms in healthcare provision. In particular, new Pervasive Healthcare technologies can revolutionise the dynamics of healthcare, enabling people to remain at home for longer with lower costs to health and welfare organisations. This book reveals how pervasive healthcare technologies...

Transforming E-business Practices and Applications: Emerging Technologies and Concepts
Transforming E-business Practices and Applications: Emerging Technologies and Concepts

Transforming E-Business Practices and Applications: Emerging Technologies and Concepts presents the latest issues and technologies evolving from business transactions and support. A defining body of research by noted international scholars, this book is an excellent resource for researchers, educators, and professionals and a valuable...

Web Wisdom: How To Evaluate and Create Information Quality on the Web, Second Edition
Web Wisdom: How To Evaluate and Create Information Quality on the Web, Second Edition

Mobile technologies, faster connection speeds, and the 24/7 connectivity that has lead to the development of social media have created an explosion of Internet use in the ten years since the initial publication of Web Wisdom: How To Evaluate and Create Information Quality on the Web. A decade ago, these technologies and...

Fully-Depleted SOI CMOS Circuits and Technology for Ultralow-Power Applications
Fully-Depleted SOI CMOS Circuits and Technology for Ultralow-Power Applications

The most important issue confronting CMOS technology is the power explosion of chips arising from the scaling law. Fully-depleted (FD) SOI technology provides a promising low-power solution to chip implementation. Ultralow-power VLSIs, which have a power consumption of less than 10 mW, will be key components of terminals in the coming...

Mobile Multimedia Processing: Fundamentals, Methods, and Applications
Mobile Multimedia Processing: Fundamentals, Methods, and Applications

Whereas the mobile device has become ubiquitous in people's daily life not only as a cellular phone but also as a media player, a mobile computing device, and a personal assistant, it is particularly important to address challenges timely in applying advanced pattern recognition, signal, information and multimedia processing techniques,...

Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency...

Internet Networks: Wired, Wireless, and Optical Technologies (Devices, Circuits, and Systems)
Internet Networks: Wired, Wireless, and Optical Technologies (Devices, Circuits, and Systems)

In the not too distant future, internet access will be dominated by wireless networks. With that, wireless edge using optical core next-generation networks will become as ubiquitous as traditional telephone networks. This means that telecom engineers, chip designers, and engineering students must prepare to meet the challenges and...

Computer Evidence: Collection and Preservation
Computer Evidence: Collection and Preservation

As computers and data systems continue to evolve, they expand into every facet of our personal and business lives. Never before has our society been so information and technology driven. Because computers, data communications, and data storage devices have become ubiquitous, few crimes or civil disputes do not involve them in some way. This...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy