• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » SpringerBriefs in Computer Science

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC
 
Cross-Technology Coexistence Design for Wireless Networks

Junmei Yao;Kaishun Wu

This book introduces readers to the fundamentals of the cross-technology coexistence problem in heterogeneous wireless networks. It also highlights a range of mechanisms designed to combat this problem and improve network performance, including protocol design, theoretical analysis, and experimental evaluation.

In turn, the book proposes three mechanisms that can be combined to combat the cross-technology coexistence problem and improve network performance. First, the authors present a fast signal identification method. It provides the basis for the subsequent protocol design and allows...

This book introduces readers to the fundamentals of the cross-technology coexistence problem in heterogeneous wireless networks. It also highlights...

cena: 201,72 zł
 
Intent Recognition for Human-Machine Interactions

Hua Xu;Hanlei Zhang;Ting-En Lin

Natural interaction is one of the hottest research issues in human-computer interaction. At present, there is an urgent need for intelligent devices (service robots, virtual humans, etc.) to be able to understand intentions in an interactive dialogue. Focusing on human-computer understanding based on deep learning methods, the book systematically introduces readers to intention recognition, unknown intention detection, and new intention discovery in human-computer dialogue. This book is the first to present interactive dialogue intention analysis in the context of natural interaction. In...

Natural interaction is one of the hottest research issues in human-computer interaction. At present, there is an urgent need for intelligent device...

cena: 201,72 zł
 
Computational Modelling of Robot Personhood and Relationality

William F. Clocksin

This SpringerBrief is a computational study of significant concerns and their role in forming long-term relationships between intelligent entities. Significant concerns include attitudes, preferences, affinities, and values that are held to be highly valued and meaningful: The means through which a person may find deeply held identity, purpose, and transformation. Significant concerns always engage the emotions and senses in a way that simply holding an opinion may or may not. For example, experiencing a significant concern may provoke deep feelings of awe and wonder in a way that deciding...

This SpringerBrief is a computational study of significant concerns and their role in forming long-term relationships between intelligent entities....

cena: 201,72 zł
 
Secure Voice Processing Systems against Malicious Voice Attacks

Kun Sun;Shu Wang

This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic physical attributes.

First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum...

This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods...

cena: 201,72 zł
 
Real-Time Database Systems

Pedro Mejia Alvarez;Ricardo J. Zavaleta Vazquez;Susana Ortega Cisneros

This book provides an overview of both experimental and commercial real-time database systems (RTDBs) and a systematic approach to understanding, designing, and implementing them.



To this end, the book is composed of four chapters: Chapter 1 “An Overview of Real-Time Database Systems” delves into the realm of RTDBs and discusses the specific requirements, transaction models, and scheduling algorithms that set RTDBs apart from conventional DBMs. Chapter 2 on “Experimental Real-Time Databases” presents various experimental RTDBs developed in academia with their architectures,...

This book provides an overview of both experimental and commercial real-time database systems (RTDBs) and a systematic approach to understanding, d...

cena: 201,72 zł
 
Securing Unmanned Aerial Vehicle Networks

Bin Duo;Xiaojun Yuan;Yifan Liu
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.

The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design,...
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential know...
cena: 201,72 zł
 
WiFi signal-based user authentication

Jiadi Yu;Hao Kong; Linghe Kong

As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment.



However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios.



Therefore, it is necessary to address the issues and build integrated...

As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authen...

cena: 181,55 zł
 
Latency Optimization in Interactive Multimedia Streaming

Zili Meng; Mingwei Xu

With the emergence of virtual reality and augmented reality, the era of interactive multimedia streaming looms on the horizon. Network latency emerges as a critical factor in the performance of interactive multimedia streaming applications. As the demand for interactive multimedia streaming continues to surge, comprehending and mitigating the challenges posed by network latency becomes increasingly imperative.

This book begins by introducing the fundamentals of network latency, elucidating its sources from both data plane and control plane, along with its effects on user experience....

With the emergence of virtual reality and augmented reality, the era of interactive multimedia streaming looms on the horizon. Network latency emer...

cena: 201,72 zł
 
Non-Line-of-Sight Ultraviolet Communications

Renzhi Yuan; Zhifeng Wang

This book provides a comprehensive review and the latest progress of ultraviolet communications. Optical wireless communications employing electromagnetic waves in optical wavebands as information carriers can achieve higher communication bandwidth compared with radio frequency based wireless communication. However, the good directionality of optical waves degrades its non-line-of-sight transmission ability for avoiding obstacles.

 

The ultraviolet communication employs the ultraviolet light in "solar blind" waveband (200-280 nm) as information carriers. The name "solar blind"...

This book provides a comprehensive review and the latest progress of ultraviolet communications. Optical wireless communications employing electrom...

cena: 201,72 zł
 
Machine Learning in Sports: Open Approach for Next Play Analytics

Keisuke Fujii
cena: 121,01 zł
ilość książek w kategorii: 43
Pierwsza Podprzednia  4  5  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia