Iris Biometric Model for Secured Network Access
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a...
Time-Dependent Problems and Difference Methods
Praise for the First Edition
". . . fills a considerable gap in the numerical analysis literature by providing a self-contained treatment . . . this is an important work written in a clear style . . . warmly recommended to any graduate student or researcher in the field of the numerical solution of partial...
Wireless Communications: Algorithmic Techniques
This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems,...
|Result Page: Previous 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 Next |