техническая литература
First book to discuss the analysis of structural steel connections by Finite Element Analysis—which provides fast, efficient, and flexible checking of these vital structural components The analysis of steel structures is complex—much more so than the…
First book to discuss the analysis of structural steel connections by Finite Element Analysis—which provides fast, efficient, and flexible checking of these vital structural components The analysis of steel structures is complex—much more so than the…
A realistic and comprehensive review of joint approaches to machine learning and signal processing algorithms, with application to communications, multimedia, and biomedical engineering systems Digital Signal Processing with Kernel Methods reviews th…
A realistic and comprehensive review of joint approaches to machine learning and signal processing algorithms, with application to communications, multimedia, and biomedical engineering systems Digital Signal Processing with Kernel Methods reviews th…
This book concerns a new paradigm in the field of UHF RFID systems: the positive exploitation of nonlinear signals generated by the chips integrated into the RFID tags. After having recalled the main principles in RFID technology and its current chal…
This book concerns a new paradigm in the field of UHF RFID systems: the positive exploitation of nonlinear signals generated by the chips integrated into the RFID tags. After having recalled the main principles in RFID technology and its current chal…
Going beyond classic networking principles and architectures for better wireless performance Written by authors with vast experience in academia and industry, Wireless Mesh Networks provides its readers with a thorough overview and in-depth understan…
Going beyond classic networking principles and architectures for better wireless performance Written by authors with vast experience in academia and industry, Wireless Mesh Networks provides its readers with a thorough overview and in-depth understan…
Group communication technologies enable users to form different types of mobile groups and to interact in real time with the participants of these groups. This book provides an in-depth overview of Multimedia Group Communications in the mobile domain…
Group communication technologies enable users to form different types of mobile groups and to interact in real time with the participants of these groups. This book provides an in-depth overview of Multimedia Group Communications in the mobile domain…
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems. Learn how to programme the mobile devices of the future! The importance of mobile systems programming has emerged over the recent years as a new domain in software developme…
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems. Learn how to programme the mobile devices of the future! The importance of mobile systems programming has emerged over the recent years as a new domain in software developme…
The importance of copepods in aquaculture has long been recognized, especially in the larval rearing of many marine fishes. This timely publication provides a single source of information on copepod biology, culture methods and practical use in marin…
The importance of copepods in aquaculture has long been recognized, especially in the larval rearing of many marine fishes. This timely publication provides a single source of information on copepod biology, culture methods and practical use in marin…
A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of battlefield surveillance, practical use of this tech…
A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of battlefield surveillance, practical use of this tech…
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this te…
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this te…
Multiple User Interfaces allow people using mobile phones, lap tops, desk tops, palm tops or PDAs to access and read information from their central server or the internet in a coherent and consistent way and to communicate effectively with other user…
Multiple User Interfaces allow people using mobile phones, lap tops, desk tops, palm tops or PDAs to access and read information from their central server or the internet in a coherent and consistent way and to communicate effectively with other user…
Location-based Services (LBSs) are mobile services for providing information that has been created, compiled, selected or filtered under consideration of the users’ current locations or those of other persons or mobile devices. Typical examples are r…
Location-based Services (LBSs) are mobile services for providing information that has been created, compiled, selected or filtered under consideration of the users’ current locations or those of other persons or mobile devices. Typical examples are r…
Professionals quickly discover that, although the technical specifications for GPRS cover all parts of the engineering functions in detail and depth, they are lacking in one important feature; the conceptual framework within which the specifications …
Professionals quickly discover that, although the technical specifications for GPRS cover all parts of the engineering functions in detail and depth, they are lacking in one important feature; the conceptual framework within which the specifications …
An introduction to theories and applications in wireless broadband networks As wireless broadband networks evolve into future generation wireless networks, it's important for students, researchers, and professionals to have a solid understanding of t…
An introduction to theories and applications in wireless broadband networks As wireless broadband networks evolve into future generation wireless networks, it's important for students, researchers, and professionals to have a solid understanding of t…
The new era of powerful, mobile computing and sensing devices having ever larger memories and personal databases brings to light a number of difficult problems in software, interface design, search, organization of information, and methods for inferr…
The new era of powerful, mobile computing and sensing devices having ever larger memories and personal databases brings to light a number of difficult problems in software, interface design, search, organization of information, and methods for inferr…
Fully revised and updated version of the successful «Advanced Wireless Communications» Wireless communications continue to attract the attention of both research community and industry. Since the first edition was published significant research and i…
Fully revised and updated version of the successful «Advanced Wireless Communications» Wireless communications continue to attract the attention of both research community and industry. Since the first edition was published significant research and i…
Revisions to 5th Edition by: Zhili Sun, University of Surrey, UK New and updated edition of this authoritative and comprehensive reference to the field of satellite communications engineering Building on the success of previous editions, Satellite Co…
Revisions to 5th Edition by: Zhili Sun, University of Surrey, UK New and updated edition of this authoritative and comprehensive reference to the field of satellite communications engineering Building on the success of previous editions, Satellite Co…
The Second Edition of this critically-acclaimed text continues the standard of excellence set in the first edition by providing a thorough introduction to the fundamentals of telecommunication networks without bogging you down in complex technical ja…
The Second Edition of this critically-acclaimed text continues the standard of excellence set in the first edition by providing a thorough introduction to the fundamentals of telecommunication networks without bogging you down in complex technical ja…
Next Generation Networks (NGN) provide ubiquitous connectivity with pervasive accessibility to service, application, content and information. NGN will bring tremendous advantages to companies and individuals, in terms of access to information, educat…
Next Generation Networks (NGN) provide ubiquitous connectivity with pervasive accessibility to service, application, content and information. NGN will bring tremendous advantages to companies and individuals, in terms of access to information, educat…
All you need to know about Storage Area Networks The amount of data of an average company doubles every year. Thus, companies who own 1TB of data today will own 32TB in five years. Storage networks help to tame such data quantities and to manage this…
All you need to know about Storage Area Networks The amount of data of an average company doubles every year. Thus, companies who own 1TB of data today will own 32TB in five years. Storage networks help to tame such data quantities and to manage this…
How to solve security issues and problems arising in distributed systems. Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new…
How to solve security issues and problems arising in distributed systems. Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new…