|
Still image and video compression with MATLAB
|
K. S. Thyagarajan |
"This book describes the principles of image and video compression techniques and introduces current and popular compression standards, such as the MPEG series. Derivations of relevant compression al… |
OL16132249W |
|
Web-based supply chain management and digital signal processing
|
Manjunath Ramachandra |
"This book presents trends and techniques for successful intelligent decision-making and transfer of products through digital signal processing, including research in supply chain management with exa… |
OL16925859W |
|
Breakthrough perspectives in network and data communications security, design, and applications
|
Indranil Bose |
"This book addresses key issues and offers expert viewpoints into the field of network and data communications, presenting research articles that address the most salient issues in network and data c… |
OL16952018W |
|
Digital transmission engineering
|
Anderson, John B. |
This introduction to digital data transmission, modulation, and error-correction coding, together with the underlying communication and information theory is an all-inclusive text suitable for all th… |
OL1805870W |
|
Telecommunications protocols
|
Travis Russell |
This book answers the need for an accessible overview of telecommunications protocols, presenting the fundamentals of each of the technologies used to deliver network services--along with practical e… |
OL1809199W |
|
Data and Computer Communications
|
Stallings, William. |
xvii, 653 pages : 27 cm |
OL1865016W |
|
Data stream management
|
Lukasz Golab |
In this lecture many applications process high volumes of streaming data, among them Internet traffic analysis, financial tickers, and transaction log mining. In general, a data stream is an unbounde… |
OL19840138W |
|
Intrusion Detection in Distributed Systems
|
Peng Ning |
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribu… |
OL19859329W |
|
Multilayered Security and Privacy Protection in Car-to-X Networks
|
Hagen Stübing |
Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic informa… |
OL19889488W |
|
Newnes Data Communications Pocket Book
|
Mike Tooley,Steve Winder |
Annotation |
OL19890670W |
|
Introduction to Networks v6 Labs & Study Guide
|
Allan Johnson,Cisco Networking Academy |
xxxvii, 621 pages : 28 cm |
OL20237518W |