OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 14 from your keywords: subject="Communications Engine...
1 2 Next Last Page
cover
Künstliche Intelligenz = Technologien | Anwendung | Gesellschaft
Comment Share
Volker WittpahlHein

Dieses Buch ist eine Open-Access-Publikation unter einer CC BY 4.0 Lizenz. Künstliche Intelligenz (KI) klingt in aktuellen Debatten oft abstrakt und alltagsfremd. Doch die meisten Internetnutzerinnern und -nutzer sind bereits täglich mit ihr konfrontiert – wenn auch unbewusst: sei es bei der Sprachsteuerung des Smartphones, bei Kaufempfehlungen im Online-Shop oder bei der Abfrage von auf …

Edition
1
ISBN/ISSN
9783662580424
Collation
XVI, 270 ill; lamp
Series Title
-
Call Number
-
Availability1
Add to basket
MARC DownloadCite
cover
Probability in Electrical Engineering and Computer Science = An Application-D…
Comment Share
Jean Walrand

This revised textbook motivates and illustrates the techniques of applied probability by applications in electrical engineering and computer science (EECS). The author presents information processing and communication systems that use algorithms based on probabilistic models and techniques, including web searches, digital links, speech recognition, GPS, route planning, recommendation systems, c…

Edition
1
ISBN/ISSN
9783030499952
Collation
XXI, 380 hlm; ill., lamp.,
Series Title
-
Call Number
-
Availability1
Add to basket
MARC DownloadCite
cover
Why Cryptography Should Not Rely on Physical Attack Complexity
Comment Share
KRAMER, Juliane

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…

Edition
-
ISBN/ISSN
978-981-287-787-1
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Innovations in Computer Science and Engineering Proceedings of the Third ICI…
Comment Share
SAINI,H. S.SAYAL,RishiRAWAT, Sandeep Singh

The book is a collection of high-quality peer-reviewed research papers presented at the third International Conference on Innovations in Computer Science and Engineering (ICICSE 2015) held at Guru Nanak Institutions, Hyderabad, India during 7 – 8 August 2015. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from a…

Edition
-
ISBN/ISSN
978-981-10-0417-9
Collation
XVII, 316
Series Title
-
Call Number
004 INN
Availability0
Add to basket
MARC DownloadCite
cover
Transactions on Engineering Technologies International MultiConference of En…
Comment Share
YANG, Gi-ChulHUANG, XuCASTILLO, OscarLONG AO, Sio

This volume contains revised and extended research articles written by prominent researchers who participated in the international conference on Advances in Engineering Technologies, which was held in Hong Kong, 12-14 March, 2014. Topics covered include engineering physics, engineering mathematics, scientific computing, control theory, artificial intelligence, electrical engineering, communicat…

Edition
-
ISBN/ISSN
978-94-017-9588-3
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Wireless and Satellite Systems 7th International Conference, WiSATS 2015, Br…
Comment Share
PILAI, PrashantYIM FUN HUOTUNG, IfiokGIAMBENE, Giovanni

This book constitutes the proceedings of the 7th International Conference on Wireless and Satellite Services, WiSATS 2015, held in Bradford, UK, in July 2015. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. As the scope of the conference widened to include wireless systems, the conference wa…

Edition
-
ISBN/ISSN
978-3-319-25479-1
Collation
XII, 402
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Amplify-and-Forward Relaying in Wireless Communications
Comment Share
RODRIGUEZ, Leonardo JiménezTRAN, NghiLE-NGOC, Tho

This SpringerBrief explores the advantage of relaying techniques in addressing the increasing demand for high data rates and reliable services over the air. It demonstrates how to design cost-effective relay systems that provide high spectral efficiency and fully exploit the diversity of the relay channel. The brief covers advances in achievable rates, power allocation schemes, and error perfor…

Edition
Ed. 1
ISBN/ISSN
978-3-319-17981-0
Collation
XIV, 122
Series Title
SpringerBriefs in Computer Science
Call Number
004.6 ROD a
Availability0
Add to basket
MARC DownloadCite
cover
Virtualized Cloud Data Center Networks: Issues in Resource Management.
Comment Share
TSAI, LinjiunLIAO, Wanjiun

This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization…

Edition
-
ISBN/ISSN
978-3-319-32632-0
Collation
VIII, 57
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Learning from Data Streams in Dynamic Environments
Comment Share
Moamar Sayed-Mouchaweh

This book addresses the problems of modeling, prediction, classification, data understanding and processing in non-stationary and unpredictable environments. It presents major and well-known methods and approaches for the design of systems able to learn and to fully adapt its structure and to adjust its parameters according to the changes in their environments. Also presents the problem of lear…

Edition
-
ISBN/ISSN
978-3-319-25667-2
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Leakage Resilient Password Systems
Comment Share
Yingjiu LiQiang YanRobert H. Deng

This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP system…

Edition
-
ISBN/ISSN
978-3-319-17503-4
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
1 2 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?