|
|
|
|
LEADER |
05311nam a22004935i 4500 |
001 |
978-3-662-47669-7 |
003 |
DE-He213 |
005 |
20151121052307.0 |
007 |
cr nn 008mamaa |
008 |
150611s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662476697
|9 978-3-662-47669-7
|
024 |
7 |
|
|a 10.1007/978-3-662-47669-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK1-9971
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.382
|2 23
|
245 |
1 |
0 |
|a Mobile and Wireless Technology 2015
|h [electronic resource] /
|c edited by Kuinam J. Kim, Naruemon Wattanapongsakorn.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a X, 214 p. 126 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Electrical Engineering,
|x 1876-1100 ;
|v 310
|
505 |
0 |
|
|a Part 1 -- VCloud: A Security Framework for VANET; Wiseborn Manfe Danquah, Altilar D. Turgay -- Design of Dual Band H-Shaped Antenna For DCS And WLAN Applications; K.ThanaPakkiam, et al -- Secrecy Rate of the Amplify-and-Forward Relay Wire-Tap Channel in Rayleigh Fading; Cuong Dang, et al -- A Robust On-Demand Routing Protocol for Cognitive Radio Ad Hoc Networks; Zamree Che-aron, et al -- Guiding Users to Shops using the Near-field Communication between Signages and Mobile Terminals; Yoshio SUGA, et al -- MANETs Routing Method for Calls with Predefined Duration in Audio/video Communications; Hiroyuki TODOROKI, Kazumasa TAKAMI -- Enhanced Adaptive Modulation and coding (AMC) Technique using ILDPCA coders over MIMO channel; J.sofia Priya Dharshini, et al -- A weighted T2F scheme for WLANs; Huan Zhang, et al -- Illustrating PNC using rectangular pulses; Li Feng -- Application of Wireless Personal Area Networks to a Ship Area Piconet; Dong-Keun Jeon, et al -- Design and Development of a Wireless Sensor Network Framework for Water Quality Remote Monitoring; Francis Jerome Tiausas, et al -- Fun Learn: An Interactive Mobile Platform for Kids Learning; Shafiq Rehman -- A Compressive Sensing Detection Approach based on Spectral Kurtosis for Frequency Hopping Signal; Jin Young Kim, et al -- Packet Loss Concealment for Improving Audio Streaming Service; Jun-Yong Lee, et al -- Secure IP Mobility Support in Software Defined Networks; Shimun Sun, et al -- Part 2 -- Comparative Performance Analysis of MANET Routing Protocols under Security Attacks; Muhammad Saleem Khan, et al -- Part 3 -- Enhanced Speaker Verification Using GMM-Supervector based Modified Adaptive GMM Training; Tan Dat Trinh, et al -- Part 4 -- Fit Buddy: A Mobile Application for Fitness Tracking Using the Always-On Low-Power Sensor; Kasidit Wijitsopon, et al -- Firenzina: Porting a Chess Engine to Android; Corey Abshire, Dmitri Gusev -- SPEARS: Smart Phone Emergency and Accident Reporting System using Social Network Service and Dijkstra’s Algorithm on Android; Chakkrit Snae Namahoot, Michael Brückner -- Descubre PUCP: Mobile App to improve academic experience inside campus; Pedro Jesús Carrión Castagnola, et al -- Part Workshop -- Localizing a Flying Object on Target Place Using Heterogeneous Binary Sensors; Hyunyoung Kim, et al -- Biometric Authentication Technology Trends in Smart Device Environment; HyunJin Kim, et al -- SLAN based User-Customized Cloud Interface Sharing for Smart Mobile Devices; Sanghyun Park, et al.
|
520 |
|
|
|a This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a System safety.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|
650 |
2 |
4 |
|a Security Science and Technology.
|
700 |
1 |
|
|a Kim, Kuinam J.
|e editor.
|
700 |
1 |
|
|a Wattanapongsakorn, Naruemon.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662476680
|
830 |
|
0 |
|a Lecture Notes in Electrical Engineering,
|x 1876-1100 ;
|v 310
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-662-47669-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|