• +353-1-415-1241(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

PRODUCT FILTERS

REGION

27

CATEGORIES

  • 22
  • 12
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1

PRICE

26
27
27
27

PUBLISHED

0
0
3
27

PRODUCT TYPE

27

Search "Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks - DUPLICATE" returned 27 results.

PRODUCT TITLE

Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks. Wiley Series on Parallel and Distributed Computing

Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable...

November 2008

Mobile Ad Hoc Networking. The Cutting Edge Directions. 2nd Edition. IEEE Series on Digital & Mobile Communication

"An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art." —E-Streams This...

March 2013

Principles of Wireless Access and Localization

A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless...

November 2013

Ad Hoc and Sensor Wireless Networks: Architectures, Algorithms and Protocols

This Ebook brings together the latest developments and studies of Mobile Ad Hoc Networks (MANETs) and Wireless Sensor Networks (WSNs), which should provide a seedbed for new breakthroughs. It focuses...

January 2009

Handbook of Green Information and Communication Systems

This book gives a comprehensive guide on the fundamental concepts, applications, algorithms, protocols, new trends and challenges, and research results in the area of Green Information and Communications...

November 2012

Principles of Wireless Access and Localization

A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless...

November 2013
FROM

Wireless Mesh Networks. Advanced Texts in Communications and Networking

Going beyond classic networking principles and architectures for better wireless performance Written by authors with vast experience in academia and industry, Wireless Mesh Networks provides its...

January 2009

Wireless Sensor and Actuator Networks. Algorithms and Protocols for Scalable Coordination and Data Communication

A mixture of theory, experiments, and simulations that provide qualitative and quantitative insights into the technology The important new technology of wireless sensor and actuator networks provides...

February 2010

Self-Organization in Sensor and Actor Networks

Self-Organization in Sensor and Actor Networks explores self-organization mechanisms and methodologies concerning the efficient coordination between intercommunicating autonomous systems.Self-organization...

November 2007

Wireless Ad Hoc and Sensor Networks. ISTE

Two new fields have recently appeared: mobile ad hoc networks and sensor networks. The emergence of these very promising systems is mainly due to great technological progress in the field of wireless...

December 2007

Security of Information and Communication Networks. IEEE Press Series on Information and Communication Networks Security

2009 CHOICE AWARD OUTSTANDING ACADEMIC TITLE Information and communications security is a hot topic in private industry as well as in government agencies. This book provides a complete conceptual...

April 2009

The Handbook of Computer Networks. Handbook of Computer Networks 3 V Set. 3 Volume Set

The Handbook of Computer Networks is the first single, comprehensive treatment of the subject available. Written by noted author and expert Hossein Bidgoli, this three-volume masterpiece presents an...

December 2007

LTE, LTE-Advanced and WiMAX. Towards IMT-Advanced Networks

A concise introduction to IMT-Advanced Systems, including LTE-Advanced and WiMAX There exists a strong demand for fully extending emerging Internet services, including collaborative applications...

November 2011

Quality of Service Mechanisms in Next Generation Heterogeneous Networks. ISTE

A modern communication network?can be described as?a large, complex, distributed system composed by higher interoperating, smaller sub-systems. Today, the proliferation and convergence of different...

December 2008

Cooperating Embedded Systems and Wireless Sensor Networks. ISTE

A number of different system concepts have become apparent in the broader context of embedded systems over the past few years. Whilst there are some differences between these, this book argues that...

March 2008

Cooperative Networking

This book focuses on the latest trends and research results in Cooperative Networking This book discusses the issues involved in cooperative networking, namely, bottleneck resource management, resource...

July 2011

Wireless Sensor Networks. Signal Processing and Communications

A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of...

October 2007

Computer and Information Security Handbook. Edition No. 2

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security...

July 2013

Technologies for Home Networking

A broad overview of the home networking field, ranging from wireless technologies to practical applications In the future, it is expected that private networks (e.g., home networks) will become part...

March 2008

Engineering Information Security. The Application of Systems Engineering Concepts to Achieve Information Assurance. IEEE Press Series on Information and Communication Networks Security

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed...

June 2011
Loading Indicator