Title | Author | Subject | Publisher | Action |
Secure Group Communications over Data Networks | Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras | Computer Science | Springer | Details |
Ambient Intelligence | Paolo Remagnino, Gian Luca Foresti, Tim Ellis | Computer Science | Springer | Details |
Multimodal Video Characterization and Summarization | Michael A. Smith, Takeo Kanade | Computer Science | Springer | Details |
Event-Triggered and Time-Triggered Control Paradigms | Roman Obermaisser | Computer Science | Springer | Details |
Integrating Human Aspects in Production Management | Gert Zülch, Harinder S. Jagdev, Patricia Stock | Computer Science | Springer | Details |
Education and the Knowledge Society | Tom J. Weert | Computer Science | Springer | Details |
Optical Communication Theory and Techniques | Enrico Forestieri | Computer Science | Springer | Details |
Mobile and Wireless Communication Networks | Elizabeth M. Belding-Royer, Khaldoun Agha, Guy Pujolle | Computer Science | Springer | Details |
Intelligent Information Processing II | Zhongzhi Shi, Qing He | Computer Science | Springer | Details |
Designing and Evaluating E-Management Decision Tools | Giampiero E. G. Beroggi | Computer Science | Springer | Details |
Optical Networks and Technologies | Ken-Ichi Kitayama, Francesco Masetti-Placci, Giancarlo Prati | Computer Science | Springer | Details |
Network Control and Engineering for QoS, Security and Mobility, III | Dominique Gaïti, Sebastià Galmés, Ramon Puigjaner | Computer Science | Springer | Details |
The Austin Protocol Compiler | Tommy M. McGuire, Mohamed G. Gouda | Computer Science | Springer | Details |
Genetic Programming Theory and Practice II | Una-May O’Reilly, Tina Yu, Rick Riolo, Bill Worzel | Computer Science | Springer | Details |
Component Models and Systems for Grid Applications | Vladimir Getov, Thilo Kielmann | Computer Science | Springer | Details |
Alternative Breast Imaging | Keith D. Paulsen, Paul M. Meaney, Larry C. Gilman | Computer Science | Springer | Details |
QoS in Packet Networks | Kun I. Park | Computer Science | Springer | Details |
Intrusion Detection and Correlation | Christopher Kruegel, Fredrik Valeur, Giovanni Vigna | Computer Science | Springer | Details |
Image and Video Encryption | Sushil Jajodia | Computer Science | Springer | Details |
Legal Programming | Brian Subirana, Malcolm Bain | Computer Science | Springer | Details |
Privacy, Security and Trust within the Context of Pervasive Computing | Philip Robinson, Harald Vogt, Waleed Wagealla | Computer Science | Springer | Details |
Advances in Pervasive Computing and Networking | Boleslaw K. Szymanski, Bülent Yener | Computer Science | Springer | Details |
System Modeling and Optimization | John Cagnol, Jean-Paul Zolésio | Computer Science | Springer | Details |
Encyclopedia of Cryptography and Security | Henk C. A. Tilborg | Computer Science | Springer | Details |
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems | Jerzy Peja?, Andrzej Piegat | Computer Science | Springer | Details |
The Next Wave in Computing, Optimization, and Decision Technologies | Bruce Golden, S. Raghavan, Edward Wasil | Computer Science | Springer | Details |
Semistructured Database Design | Tok Wang Ling, Mong Li Lee, Gillian Dobbie | Computer Science | Springer | Details |
E-Training Practices for Professional Organizations | Paul Nicholson, Mikko Ruohonen, J. Barrie Thompson, Jari Multisilta | Computer Science | Springer | Details |
Virtual Organizations | Luis M. Camarinha-Matos, Hamideh Afsarmanesh, Martin Ollus | Computer Science | Springer | Details |
Optical Burst Switched Networks | Jason P. Jue, Vinod M. Vokkarane | Computer Science | Springer | Details |
Reverse Engineering of Object Oriented Code | Paolo Tonella, Alessandra Potrich | Computer Science | Springer | Details |
Coding for Data and Computer Communications | David Salomon | Computer Science | Springer | Details |
Distributed Network Systems | Weijia Jia, Wanlei Zhou | Computer Science | Springer | Details |
Knowledge and Skill Chains in Engineering and Manufacturing | Eiji Arai, Fumihiko Kimura, Jan Goossenaerts, Keiichi Shirase | Computer Science | Springer | Details |
Quantitative Measure for Discrete Event Supervisory Control | Asok Ray, Vir V. Phoha, Shashi P. Phoha | Computer Science | Springer | Details |
Trusted Computing Platforms: Design and Applications | Sean W. Smith | Computer Science | Springer | Details |
Computer Security in the 21st Century | D. T. Lee, S. P. Shieh, J. D. Tygar | Computer Science | Springer | Details |
Broadband Satellite Comunication Systems and the Challenges of Mobility | Thierry Gayraud, Michel Mazzella, Fernando Boavida, Edmundo Monteiro, João Orvalho | Computer Science | Springer | Details |
Information Technology and Educational Management in the Knowledge Society | Arthur Tatnall, Javier Osorio, Adrie Visscher | Computer Science | Springer | Details |
Technology Enhanced Learning | Jean-Pierre Courtiat, Costas Davarakis, Thierry Villemur | Computer Science | Springer | Details |
High Performance Computational Science and Engineering | Michael K. Ng, Andrei Doncescu, Laurence T. Yang, Tau Leng | Computer Science | Springer | Details |
Formal Aspects in Security and Trust | Theo Dimitrakos, Fabio Martinelli | Computer Science | Springer | Details |
Designing Human Interface in Speech Technology | Fang Chen | Computer Science | Springer | Details |
History of Nordic Computing | Janis Bubenko, John Impagliazzo, Arne Sølvberg | Computer Science | Springer | Details |
Managing Cyber Threats | Vipin Kumar, Jaideep Srivastava, Aleksandar Lazarevic | Computer Science | Springer | Details |
Mining Sequential Patterns from Large Data Sets | Wei Wang, Jiong Yang | Computer Science | Springer | Details |
Fuzzy Database Modeling with XML | Zongmin Ma | Computer Science | Springer | Details |
Software Process Modeling | Silvia T. Acuña, Natalia Juristo | Computer Science | Springer | Details |
Evolutionary Synthesis of Pattern Recognition Systems | Bir Bhanu, Yingqiang Lin, Krzysztof Krawiec | Computer Science | Springer | Details |
Communications and Multimedia Security | David Chadwick, Bart Preneel | Computer Science | Springer | Details |
Architecture Description Languages | Pierre Dissaux, Mamoun Filali-Amine, Pierre Michel, François Vernadat | Computer Science | Springer | Details |
Algorithmic Learning in a Random World | Vladimir Vovk, Alexander Gammerman, Glenn Shafer | Computer Science | Springer | Details |
Certification and Security in Inter-Organizational E-Service | Enrico Nardelli, Maurizio Talamo | Computer Science | Springer | Details |
Home-Oriented Informatics and Telematics | Andy Sloane | Computer Science | Springer | Details |
Computer Network Security | Joseph Migga Kizza | Computer Science | Springer | Details |
Stream Data Management | Nauman A. Chaudhry, Kevin Shaw, Mahdi Abdelguerfi | Computer Science | Springer | Details |
Data Mining and Knowledge Discovery Handbook | Oded Maimon, Lior Rokach | Computer Science | Springer | Details |
Principles of Computer Graphics | Shalini Govil-Pai | Computer Science | Springer | Details |
A Software Process Model Handbook for Incorporating People?s Capabilities | Silvia Teresita Acuña, Natalia Juristo, Ana María Moreno, Alicia Mon | Computer Science | Springer | Details |
EndNote? 1-2-3 Easy! | Abha Agrawal | Computer Science | Springer | Details |
Perspectives and Policies on ICT in Society | Jacques Berleur, Chrisanthi Avgerou | Computer Science | Springer | Details |
Business Agility and Information Technology Diffusion | Richard L. Baskerville, Lars Mathiassen, Jan Pries-Heje, Janice I. DeGross | Computer Science | Springer | Details |
Understanding IPv6 | Youngsong Mun, Hyewon K. Lee | Computer Science | Springer | Details |
Security and Privacy in the Age of Ubiquitous Computing | Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura | Computer Science | Springer | Details |
Agent Intelligence Through Data Mining | Andreas L. Symeonidis, Pericles A. Mitkas | Computer Science | Springer | Details |
A Classical Introduction to Cryptography | Serge Vaudenay | Computer Science | Springer | Details |
Motion-Free Super-Resolution | Subhasis Chaudhuri, Manjunath V. Joshi | Computer Science | Springer | Details |
Information and Communication Technologies and Real-Life Learning | Tom Weert, Arthur Tatnall | Computer Science | Springer | Details |
Security in E-Learning | Edgar Weippl | Computer Science | Springer | Details |
Multimedia Encryption and Watermarking | Borko Furht, Edin Muharemagic, Daniel Socek | Computer Science | Springer | Details |
Guide to Assembly Language Programming in Linux | Sivarama P. Dandamudi | Computer Science | Springer | Details |
Net-Centric Approaches to Intelligence and National Security | Roy Ladner, Frederick E. Petry | Computer Science | Springer | Details |
Information Processing and Security Systems | Khalid Saeed, Jerzy Peja? | Computer Science | Springer | Details |
Impacts and Risk Assessment of Technology for Internet Security | Charles A. Shoniregun | Computer Science | Springer | Details |
Multi-Agent Programming | Rafael H. Bordini, Mehdi Dastani, Jürgen Dix, Amal Fallah Seghrouchni | Computer Science | Springer | Details |
ALP = Alipore Campus Library, University of Calcutta
1, Reformatory Steet, Kolkata - 750027
CL = Central Library, University of Calcutta
87/1, College Street, Kolkata - 750073
TSP = Ballygunge Science College (Taraknath Siksha Prangan)
35, Ballygunge Circular Road, Kolkata – 750019
RBSP= Rashbehari Siksha Prangan – Rajabazar Science College
92, Acharyya Prafulla Chandra Road, Kolkata - 750009
ECO = ECONOMICS, B. T. Road Campus
56A, Barrackpore Trunk Road, Kolkata-750 050
LAW = Hazra Road Campus
51/1and 51/2 Hazra Road, Kolkata-750 019
VLC = Home Science, Viharilal Home Science Campus
20B, Judges Court Road, Alipore, Kolkata -750 021