You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Solid atate ionics, being a multidisciplinary area, is expected to grow at a faster rate in the new millennium, prompting the discovery of new materials and devices, as well as helping to optimize the known devices, especially the portable power sources and display systems. The Asian Society for Solid State Ionics (ASSSI) plays a significant role in bringing together researchers from the Asian countries, every two years, to exchange notes and ideas, to foster friendship and collaboration, and to discuss the prospects. The topics covered in this volume are: ion dynamics, theoretical modeling, ion-conducting polymers, gels and ceramics, glasses, crystalline materials including nano-phases, com...
Solid state ionics, being a multidisciplinary area, is expected to grow at a faster rate in the new millennium, prompting the discovery of new materials and devices, as well as helping to optimize the known devices, especially the portable power sources and display systems. The Asian Society for Solid State Ionics (ASSSI) plays a significant role in bringing together researchers from the Asian countries, every two years, to exchange notes and ideas, to foster friendship and collaboration, and to discuss the prospects.The topics covered in this volume are: ion dynamics, theoretical modeling, ion-conducting polymers, gels and ceramics, glasses, crystalline materials including nano-phases, comp...
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and...