This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions. The papers cover various topics such as wireless network security, network intrusion detection, security and privacy for the general internet, malware and misbehavior, sensor networks, key management, credentials and authentications, as well as secure multicast and emerging technologies.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September...
Motion structures are simply assemblies of resistant bodies connected by movable joints. Unlike conventional structures, they allow large shape transformations to satisfy practical requirements and they can be used in:
shelters, emergency structures and exhibition stands
aircraft morphing wings
satellite solar panels and space antennas
morphing core materials for composites
medical implants for minimum invasive surgery.
Though traditionally the subject falls within structural engineering, motion structures are more closely...
Motion structures are simply assemblies of resistant bodies connected by movable joints. Unlike conventional structures, they allow large shape tra...