Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
NOTE: AND will only work with single words not phrases.
If you use 'OR' between 2 single words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
NOTE: OR will only work with single words not phrases.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
NOTE: NOT will only work with single words not phrases.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
NOTE: "" cannot be combined with AND, OR & NOT searches.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This comprehensive and up-to-date reference presents a practical approach to RF and microwave amplifier design and development.... [more]
Wireless sensor networks (WSNs) are a special class of ad hoc network in which network nodes composed of tiny sensors pass... [more]
Detailing the advantages and limitations of multi-carrier communication, this book proposes possible solutions for these limitations.... [more]
Signals and Systems: A Primer with MATLAB (R) provides clear, interesting, and easy-to-understand coverage of continuous-time... [more]
On Fire at Work flies in the face of other books on workplace culture by showing that employee engagement isn't the ultimate... [more]
The exponential increase in mobile device users and high-bandwidth applications has pushed the current 3G and 4G wireless... [more]
These proceedings of the symposium ISIT 2014 aim to be a platform for international exchange of the state-of-the-art research... [more]
The Lab Manual contains more than 70 labs to provide students with additional hands-on experience and to help them prepare... [more]
Cloud computing is the most significant technology transformation since the introduction of the Internet in the early 1990s.... [more]
Addresses the Challenges of Modern-Day Air Traffic Air traffic control (ATC) directs aircraft in the sky and on the ground... [more]
Container terminals are constantly being challenged to adjust their throughput capacity to match fluctuating demand. Examining... [more]
The term smart city defines the new urban environment, one that is designed for performance through information and communication... [more]
Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects... [more]
Configuration Management: Theory, Practice, and Application details a comprehensive approach to configuration management from... [more]
Discover the perfect resource for learning Windows (R) Server 2016 from the ground up with HANDS-ON MICROSOFT (R) WINDOWS... [more]
Within a healthcare enterprise, patient vital signs and other automated measurements are communicated from connected medical... [more]
The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts-providing... [more]
Get prepared for your Information Security job search!<br /><br />Do you... [more]
A groundbreaking study of one of the most crucial yet least understood issues of the twenty-first century: the governance... [more]
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected... [more]
Although there are countless books on statistics, few are dedicated to the application of statistical methods to software... [more]
Recent changes in healthcare delivery as mandated by the Patient Protection and Affordable Care Act are forcing providers... [more]
Information Technology and Career Education contains the contributions presented at the 2014 International Conference on Information... [more]
An examination of how information technology (IT) can be used in public administration, Information and Communication Technologies... [more]
Future Communication Technology and Engineering is a collection of papers presented at the 2014 International Conference on... [more]