Memory-Constrained Security Enforcement

Evaluation of Java ME-CLDC Security and Characterization of Memory-Constrained Security

Chamseddine Talhi - ISBN: 978-3-8383-2081-6

Pilot-Assisted Channel Estimation for Multipath DS-CDMA Systems

Frequency Domain Channel Equalization in Space-Time Clock Codes

Mansour Tahernezhadi - ISBN: 978-3-8383-2071-7

One War, Two Televised Worlds

Comparative Analysis Between Al-Jazeera and CNN in Covering the 2003 Invasion of Iraq

Rasha El-Ibiary - ISBN: 978-3-8383-2033-5

Psychobiological predictors of exercise behavior

in postmenopausal women

Fiona Barnett - ISBN: 978-3-8383-2036-6

Artificial Spin Ice

The Use of Meta-materials for Physics Study

Yi Qi - ISBN: 978-3-8383-2032-8

Training and Investigating Promotion Decision Making

Recognising Potential and Using Expertise

Damien Armenis - ISBN: 978-3-8383-2040-3

INTRODUCTION TO FILM INSERT INJECTION MOLDING

A PRACTICAL

Yew Wei Leong, Hiroyuki Hamada - ISBN: 978-3-8383-2044-1

Language Learning through Mobile Phones

Design and Trial of a Wireless Application Protocol (WAP) Site Model for Learning English as a Foreign Language (EFL) Listening Skills in Korea

Ki Nah - ISBN: 978-3-8383-2045-8

The Economic Role of Inter-Firm Networks in the Development of SMEs

Study of Symbiosis in the Indonesian Garment Industry

Latif Adam - ISBN: 978-3-8383-2043-4

Social Network Structures of Women In Academic Medicine

Positioning Women for Leadership Success

Bridget Cooper - ISBN: 978-3-8383-2038-0