The Leading eBooks Store Online
3,725,826 members ⚫ 1,209,635 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Springer Berlin Heidelberg 2007; US$ 126.87
My purpose in writing Interactive Video: Algorithms and Technologies is to respond to an increased demand for a complete scienti?c guide that covers concepts, bene?ts, algorithms and interfaces of the emerging interactive digital video technology. This technology promises an end of the days of dull videos, linear playback, manual video search, and... more...
- Springer Berlin Heidelberg 2006; US$ 91.98
Gaussian linear modelling cannot address current signal processing demands. In moderncontexts,suchasIndependentComponentAnalysis(ICA),progresshasbeen made speci?cally by imposing non-Gaussian and/or non-linear assumptions. Hence, standard Wiener and Kalman theories no longer enjoy their traditional hegemony in the ?eld, revealing the standard computational... more...
- Elsevier Science 2014; US$ 49.95
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company?s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security... more...
- Springer International Publishing 2014; US$ 47.53
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally.... more...
- Springer US 2009; US$ 137.44
This book provides tools and knowledge in a simple way such that the reader is able to implement a particular QRD-RLS algorithm tailored for the application at hand. The material presents not only classical and recent research results but also the expertise of a number of authors that have contributed to the development of this fast converging class... more...
- Springer US 2016; US$ 227.22
Teleservice is a common concept for distributed application services related to the use of telecommunication equipment, PCs, workstations and mainframes. Teleservices represent a diversity of applications related to various user and vendor cultures such as traditional telecommunications services, E-mail services, cooperative work, applications,... more...
- Springer Netherlands 2007; US$ 116.29
The common property among turbo-like code is that they consist of very simple constituent codes that are connected to each other with random or pseudorandom interleavers. The crucial novelty in these codes is the iterative decoding. This means that the constituent codes are decoded separately, which is ef?cient and practically feasible since they are... more...
- CRC Press 2016; US$ 60.00
SC-FDMA for Mobile Communications examines Single-Carrier Frequency Division Multiple Access (SC-FDMA). Explaining this rapidly evolving system for mobile communications, it describes its advantages and limitations and outlines possible solutions for addressing its current limitations. The book explores the emerging trend of cooperative communication... more...
- Springer New York 2013; US$ 38.02
The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop... more...
- Springer New York 2012; US$ 116.29
This book introduces resource-aware data fusion algorithms that generate inferences by combining data from multiple sources?techniques useful in centralized and distributed systems to overcome sensor failure, technological limitations, and coverage problems. more...