Wireless technologies and applications are becoming one of the fastest growing areas. This title provides overviews to the classic medium access control algorithms and the related protocols, as well as their applications in various wireless data networks e
Wireless technologies and applications are becoming one of the fastest growing areas. This title provides overviews to the classic medium access contr...
Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor networks. This book explains such attacks and that which can be roughly categorized as isolated attacks by eac
Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor netw...
This text examines the decision making process and health seeking patterns of low-income young women in Thailand with unplanned pregnancies who opted for abortion, putting the baby up for adoption, or keeping the baby.
This text examines the decision making process and health seeking patterns of low-income young women in Thailand with unplanned pregnancies who opted ...