๐ Autumn reading time! Let our AI Librarian find your perfect cozy read ๐ซ
Explore the literary world of this author
Wireless technologies and applications are becoming one of the fastest growing and most promising areas in recent years. To accommodate data transmiss...
Scoring Functions, Algorithms and Evaluation
Covers the fundamentals and techniques of multiple biological sequence alignment and analysis, and shows readers how to choose the appropriate sequenc...
Li Gonglin and Northern Song Buddhist Culture
Drawing from previously untapped Buddhist sources, this book contextualizes Li Gonglin's Buddhist faith and art through the Chan environment in his ho...
Earthen levees are extensively used to protect the population and infrastructure from periodic floods and high water due to storm surges. The causes o...
Summary: A compilation of articles that reviews the current design methodology and analytical models of wireless networks....
Abstract:...
Performance Modelling, Analysis and Enhancement
Recent years have witnessed tremendous growth in the population of mobile users demanding high performance, reliability and quality-of-service (QoS). ...
This comprehensive reference views Chinaโs welfare system through a cultural-historical lens to integrate its complex story into the global study of...
Wireless Local Area Network (LAN) and Bluetooth are two phenomena in wireless networks. They have become very successful in the current market and are...
Management, Performance, and Applications
Although wireless sensor networks (WSNs) have been employed across a range of applications, there are few books available that cover the required algo...
Next generation wireless and mobile communication systems are rapidly evolving to satisfy the demands of various network users. Due to the great succe...
Practice and Experience
In the not too distant future, every researcher and professional in science and engineering fields will have to understand parallel and distributed co...
Evaluation, Improvement and Practice
The field of parallel and distributed computing is undergoing changes at a breathtaking pace. Networked computers are now omnipresent in virtually eve...
With the advance of wireless networks, building reliable and secured network connections is becoming extremely important. On the other hand, ad hoc ne...
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full ut...
How the enabling technologies in 5G as an integral or as a part can seamlessly fuel the IoT revolution is still very challenging. This book presents t...
Wireless Sensor Networks Security
Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor netw...
Globalization, Community and Power of Place
...
Five Hundred Years of Chinese Painting
Catalogue accompanies an exhibition held at the Herbert F. Johnson Museum of Art, Cornell University, Ithaca, New York, Apr. 10-June 13, 2010....