As digital communications networks grow in use and size throughout the world, the need for accurate, reliable test and measurement procedures has increased tremendously. This unique handbook provides the only comprehensive coverage of all the methodologies, data, and reference material necessary to master network instrumentation. In this...
There are continuous efforts focussed on improving road traffic safety worldwide. Numerous vehicle safety features such as driver assistance systems have been invented. Many driver assistance features rely on radar-based sensors, but are highly-priced. Realization of low-cost radar front-end circuits would enable their implementation in less...
This book is about computer facial models, computer-generated facial images, and facial animation. In particular, it addresses the principles of creating face models and the manipulation or control of computer-generated facial attributes. In addition, various sections in the book describe and explain the development of specific computer...
When I decided to do a sabbatical with Symantec Research Labs Europe in the
beautiful French Riviera, I was asked to work on a project about Voice over IP
(VoIP) security. The goal of the VAMPIRE Project1 was to understand the threats
and vulnerabilities of VoIP systems, and to inform the direction of further research
efforts....
Launched on October 23, 2001, the iPod has become the icon of the decade.
You don’t need much imagination to see why. Imagine no longer needing
to take CDs or DVDs with you when you travel — your favorite music and
videos fit right in your pocket and you can leave your precious content library
at home. With the iPhone and...
OpenGL, which has been bound in C, is a seasoned graphics library for scientists and
engineers. As we know, Java is a rapidly growing language becoming the de facto
standard of Computer Science learning and application development platform as
many undergraduate computer science programs are adopting Java in place of C/C++.
Released by...
The ubiquitous nature of the Internet is dramatically revolutionizing the manner in which
organizations and individuals share information. Developed out of necessity during the cold
war, the Internet was created as a means to help governmental institutions and collegiate
institutions send documents and research materials electronically...
An important aspect of teaching a course in compiler writing is to illustrate
the key theoretical concepts normally taught in such a course. A frequently used
strategy for achieving this goal is to have a student design a simple programming
language and implement a compiler for this language. Many texts in compiler
writing do not,...
This book describes a use case–driven UML-based method for the modeling and
design of software architectures, including object-oriented software architectures,
client/server software architectures, service-oriented architectures, componentbased
software architectures, concurrent and real-time software architectures, and
software...
In the late 1960s racer and businessman Gordon Spice familiarized himself with the Nürburgring using a rented BMW 2002. He went through a couple of sets of tires and three sets of brake pads during the exercise and covered the cost of such consumables by charging folks to ride with him! The rental company was somewhat puzzled by the fact...
Since the dawn of computing, the quest for a better understanding of Nature has been a driving force for technological development. Groundbreaking achievements by great scientists have paved the way from the abacus to the supercomputing power of today. When trying to replicate Nature in the computer’s silicon test tube, there is need...
This book is about constraint programming, an alternative approach to programming which relies on a combination of techniques that deal with reasoning and computing. It has been successfully applied in a number of fields including molecular biology, electrical engineering, operations research and numerical analysis. The central notion is that...