Author: Institute of Electrical and Electronics Engineers (New York, NY). Region 3
Publisher:
ISBN: 9780780383678
Category : Electric engineering
Languages : en
Pages : 436
Book Description
Proceedings of the IEEE SoutheastCon 2004
Author: Institute of Electrical and Electronics Engineers (New York, NY). Region 3
Publisher:
ISBN: 9780780383678
Category : Electric engineering
Languages : en
Pages : 436
Book Description
Publisher:
ISBN: 9780780383678
Category : Electric engineering
Languages : en
Pages : 436
Book Description
Proceedings of the IEEE SoutheastCon 2004
2004 IEEE Southeastcon
Author:
Publisher:
ISBN: 9780780383678
Category : Electrical engineering
Languages : en
Pages : 436
Book Description
Publisher:
ISBN: 9780780383678
Category : Electrical engineering
Languages : en
Pages : 436
Book Description
Southeastcon 2004
Author: Institute of Electrical and Electronics Engineers, Inc. Staff
Publisher:
ISBN:
Category :
Languages : en
Pages :
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages :
Book Description
Advanced Computing
Author: Natarajan Meghanathan
Publisher: Springer Science & Business Media
ISBN: 3642178804
Category : Computers
Languages : en
Pages : 511
Book Description
This volume constitutes the third of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 46 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on soft computing, such as AI, Neural Networks, Fuzzy Systems, etc.; distributed and parallel systems and algorithms; security and information assurance; ad hoc and ubiquitous computing; wireless ad hoc networks and sensor networks.
Publisher: Springer Science & Business Media
ISBN: 3642178804
Category : Computers
Languages : en
Pages : 511
Book Description
This volume constitutes the third of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 46 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on soft computing, such as AI, Neural Networks, Fuzzy Systems, etc.; distributed and parallel systems and algorithms; security and information assurance; ad hoc and ubiquitous computing; wireless ad hoc networks and sensor networks.
Towards Autonomous Robotic Systems
Author: Manuel Giuliani
Publisher: Springer
ISBN: 3319967282
Category : Computers
Languages : en
Pages : 500
Book Description
This book constitutes the refereed proceedings of the 19th Annual Conference on Towards Autonomous Robotics, TAROS 2018, held in Bristol, UK, in July 2018. The 38 full papers presented together with 14 short papers were carefully reviewed and selected from 68 submissions. The papers focus on presentation and discussion of the latest results and methods in autonomous robotics research and applications. The conference offers a friendly environment for robotics researchers and industry to take stock and plan future progress.
Publisher: Springer
ISBN: 3319967282
Category : Computers
Languages : en
Pages : 500
Book Description
This book constitutes the refereed proceedings of the 19th Annual Conference on Towards Autonomous Robotics, TAROS 2018, held in Bristol, UK, in July 2018. The 38 full papers presented together with 14 short papers were carefully reviewed and selected from 68 submissions. The papers focus on presentation and discussion of the latest results and methods in autonomous robotics research and applications. The conference offers a friendly environment for robotics researchers and industry to take stock and plan future progress.
My Life and Work
Author: Dr. Matthew N. O. Sadiku
Publisher: Trafford Publishing
ISBN: 1490790640
Category : Biography & Autobiography
Languages : en
Pages : 210
Book Description
In this book, Dr. Matthew N. O. Sadiku has shared the amazing story of how he rose from his humble beginnings in Nigeria. He described how he was raised in a Muslim home. After his conversion to Christianity, his drive led him to relocate to the United States for advanced degrees. He has provided a text that is lively from beginning to the end. The book provides a good understanding of his life, thought, and work. You will learn about what it takes to be a mover and shaker for God as you see Sadiku traverse the nation, rising to success in the academic and publishing worlds. The book is an essential reading for those interested in the genesis of greatness.
Publisher: Trafford Publishing
ISBN: 1490790640
Category : Biography & Autobiography
Languages : en
Pages : 210
Book Description
In this book, Dr. Matthew N. O. Sadiku has shared the amazing story of how he rose from his humble beginnings in Nigeria. He described how he was raised in a Muslim home. After his conversion to Christianity, his drive led him to relocate to the United States for advanced degrees. He has provided a text that is lively from beginning to the end. The book provides a good understanding of his life, thought, and work. You will learn about what it takes to be a mover and shaker for God as you see Sadiku traverse the nation, rising to success in the academic and publishing worlds. The book is an essential reading for those interested in the genesis of greatness.
Cryptology and Network Security
Author: Yvo Desmedt
Publisher: Springer Science & Business Media
ISBN: 3540308490
Category : Business & Economics
Languages : en
Pages : 359
Book Description
This book constitutes the refereed proceedings of the 4th International Conference on Cryptology and Network Security, CANS 2005, held in Xiamen, China in December 2005. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on cryptanalysis, intrusion detection and viruses, authentication and signature, signcryption, e-mail security, cryptosystems, privacy and tracing, information hiding, firewalls, denial of service and DNS security, and trust management.
Publisher: Springer Science & Business Media
ISBN: 3540308490
Category : Business & Economics
Languages : en
Pages : 359
Book Description
This book constitutes the refereed proceedings of the 4th International Conference on Cryptology and Network Security, CANS 2005, held in Xiamen, China in December 2005. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on cryptanalysis, intrusion detection and viruses, authentication and signature, signcryption, e-mail security, cryptosystems, privacy and tracing, information hiding, firewalls, denial of service and DNS security, and trust management.
Information Security Practice and Experience
Author: Xinyi Huang
Publisher: Springer
ISBN: 3319063200
Category : Computers
Languages : en
Pages : 591
Book Description
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.
Publisher: Springer
ISBN: 3319063200
Category : Computers
Languages : en
Pages : 591
Book Description
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.