10063 Matching Record(s) found
Title | Author | Subject | Publisher | Action |
Information Technology For Balanced Manufacturing Systems | Weiming Shen | Computer Science | Springer | Details |
Automatic Quantum Computer Programming | Lee Spector | Computer Science | Springer | Details |
Human Work Interaction Design: Designing for Human Work | Torkil Clemmensen, Pedro Campos, Rikke Orngreen, Annelise Mark Pejtersen, William Wong | Computer Science | Springer | Details |
Data Mining | Krzysztof J. Cios, Roman W. Swiniarski, Witold Pedrycz, Lukasz A. Kurgan | Computer Science | Springer | Details |
Evolutionary Algorithms for Solving Multi-Objective Problems | Carlos A. Coello Coello, Gary B. Lamont, David A. Van Veldhuizen | Computer Science | Springer | Details |
Algebraic Aspects of the Advanced Encryption Standard | Carlos Cid, Sean Murphy, Matthew Robshaw | Computer Science | Springer | Details |
Advances in Digital Forensics II | Martin S. Olivier, Sujeet Shenoi | Computer Science | Springer | Details |
Multivariate Public Key Cryptosystems | Jintai Ding, Jason E. Gower, Dieter S. Schmidt | Computer Science | Springer | Details |
Knowledge and Data Management in GRIDs | Domenico Talia, Angelos Bilas, Marios D. Dikaiakos | Computer Science | Springer | Details |
Social Informatics: An Information Society for all? In Remembrance of Rob Kling | Jacques Berleur, Markku I. Nurminen, John Impagliazzo | Computer Science | Springer | Details |
Power Analysis Attacks | Stefan Mangard, Elisabeth Oswald, Thomas Popp | Computer Science | Springer | Details |
Network-Centric Collaboration and Supporting Frameworks | Luis M. Camarinha-Matos, Hamideh Afsarmanesh, Martin Ollus | Computer Science | Springer | Details |
Reliable Face Recognition Methods | Harry Wechsler | Computer Science | Springer | Details |
Max-Plus Linear Stochastic Systems and Perturbation Analysis | Bernd Heidergott | Computer Science | Springer | Details |
Project E-Society: Building Bricks | Reima Suomi, Regis Cabral, J. Felix Hampe, Arto Heikkilä, Jonna Järveläinen, Eija Koskivaara | Computer Science | Springer | Details |
Ontology Learning and Population from Text | Philipp Cimiano | Computer Science | Springer | Details |
Nonlinear Dimensionality Reduction | John A. Lee, Michel Verleysen | Computer Science | Springer | Details |
From Model-Driven Design to Resource Management for Distributed Embedded Systems | Bernd Kleinjohann, Lisa Kleinjohann, Ricardo J. Machado, Carlos E. Pereira, P. S. Thiagarajan | Computer Science | Springer | Details |
Software Engineering Techniques: Design for Quality | Krzysztof Sacha | Computer Science | Springer | Details |
Encyclopedia of Database Systems | LING LIU, M. TAMER ÖZSU | Computer Science | Springer | Details |
Malware Detection | Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang | Computer Science | Springer | Details |
Electronic Postage Systems | Gerrit Bleumer | Computer Science | Springer | Details |
Intelligent Information Processing III | Zhongzhi Shi, K. Shimohara, D. Feng | Computer Science | Springer | Details |
Preserving Privacy in On-Line Analytical Processing (OLAP) | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera | Computer Science | Springer | Details |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks | Radha Poovendran, Sumit Roy, Cliff Wang | Computer Science | Springer | Details |
Security for Wireless Sensor Networks | Donggang Liu, Peng Ning | Computer Science | Springer | Details |
Data Streams | Charu C. Aggarwal | Computer Science | Springer | Details |
Past, Present and Future of Research in the Information Society | Wesley Shrum, Keith R. Benson, Wiebe E. Bijker, Klaus Brunnstein | Computer Science | Springer | Details |
Data Warehousing and Data Mining Techniques for Cyber Security | Anoop Singhal | Computer Science | Springer | Details |
Integrated Research in GRID Computing | Sergei Gorlatch, Marco Danelutto | Computer Science | Springer | Details |
Software Verification and Validation | Marcus S. Fisher | Computer Science | Springer | Details |
Network Security Policies and Procedures | Douglas W. Frye | Computer Science | Springer | Details |
Decision Support for Global Enterprises | Uday Kulkarni, Daniel J. Power, Ramesh Sharda | Computer Science | Springer | Details |
A Computer Scientist's Guide to Cell Biology | William W. Cohen | Computer Science | Springer | Details |
The Semantic Web | Jorge Cardoso, Martin Hepp, Miltiadis D. Lytras | Computer Science | Springer | Details |
Handbook of Database Security | Michael Gertz, Sushil Jajodia | Computer Science | Springer | Details |
Cryptanalytic Attacks on RSA | Song Y. Yan | Computer Science | Springer | Details |
Wireless Sensor Networks and Applications | Yingshu Li, My T. Thai, Weili Wu | Computer Science | Springer | Details |
Genetic Programming Theory and Practice IV | Rick Riolo, Terence Soule, Bill Worzel | Computer Science | Springer | Details |
Network Control and Engineering for QoS, Security and Mobility, IV | Dominique Gaïti | Computer Science | Springer | Details |
An Introduction to Kolmogorov Complexity and Its Applications | Ming Li, Paul Vitányi | Computer Science | Springer | Details |
Digital Enterprise Technology | Pedro Filipe Cunha, Paul G. Maropoulos | Computer Science | Springer | Details |
Hypercomputation | Apostolos Syropoulos | Computer Science | Springer | Details |
Privacy-Respecting Intrusion Detection | Ulrich Flegel | Computer Science | Springer | Details |
Visual Languages and Applications | Kang Zhang | Computer Science | Springer | Details |
Bayesian Networks and Decision Graphs | Finn V. Jensen, Thomas D. Nielsen | Computer Science | Springer | Details |
Peer-to-Peer Computing for Mobile Networks | Henning Schulzrinne, Maria Papadopouli | Computer Science | Springer | Details |
New Computational Paradigms | S. Barry Cooper, Benedikt Löwe, Andrea Sorbi | Computer Science | Springer | Details |
Advances in Wireless Ad Hoc and Sensor Networks | Deying Li, Maggie Xiaoyan Cheng | Computer Science | Springer | Details |
Synchronizing Internet Protocol Security (SIPSec) | Charles A. Shoniregun | Computer Science | Springer | Details |
Economics of Identity Theft: Avoidance, Causes and Possible Cures | L. Jean Camp | Computer Science | Springer | Details |
Botnet Detection | Wenke Lee, Cliff Wang, David Dagon | Computer Science | Springer | Details |
Information Systems Development | Wita Wojtkowski, Gregory Wojtkowski, Michael Lang, Kieran Conboy, Chris Barry | Computer Science | Springer | Details |
Information and Complexity in Statistical Modeling | Jorma Rissanen | Computer Science | Springer | Details |
Online Business Security Systems | Godfried B. Williams | Computer Science | Springer | Details |
More Math Into Latex | George Grätzer | Computer Science | Springer | Details |
Parsing Techniques | Dick Grune, Ceriel J. H. Jacobs | Computer Science | Springer | Details |
Introduction to C++ Programming and Graphics | Constantine Pozrikidis | Computer Science | Springer | Details |
Do-All Computing in Distributed Systems | Chryssis Georgiou, Alexander A. Shvartsman | Computer Science | Springer | Details |
Stochastic Learning and Optimization | Xi-Ren Cao | Computer Science | Springer | Details |
Moving Wearables into the Mainstream | Joseph L. Dvorak | Computer Science | Springer | Details |
SAT-Based Scalable Formal Verification Solutions | Malay K. Ganai, Aarti Gupta | Computer Science | Springer | Details |
Knowledge Management for Educational Innovation | Arthur Tatnall, Toshio Okamoto, Adrie Visscher | Computer Science | Springer | Details |
Data Quality and Record Linkage Techniques | Thomas N. Herzog, Fritz J. Scheuren, William E. Winkler | Computer Science | Springer | Details |
Distributed and Parallel Systems | Péter Kacsuk, Thomas Fahringer, Zsolt Németh | Computer Science | Springer | Details |
Ontology Management | Martin Hepp, Pieter Leenheer, Aldo Moor, York Sure | Computer Science | Springer | Details |
Securing Biometrics Applications | Charles A. Shoniregun, Stephen Crosier | Computer Science | Springer | Details |
Soft Computing for Knowledge Discovery and Data Mining | Oded Maimon, Lior Rokach | Computer Science | Springer | Details |
Sequence Data Mining | Guozhu Dong, Jian Pei | Computer Science | Springer | Details |
Machine Learning for Multimedia Content Analysis | Yihong Gong, Wei Xu | Computer Science | Springer | Details |
Advances in Information Systems Development | Gabor Magyar, Gabor Knapp, Wita Wojtkowski, W. Gregory Wojtkowski, Jože Zupan?i? | Computer Science | Springer | Details |
Advances in Information Systems Development | Wita Wojtkowski, W. Gregory Wojtkowski, Jože Zupancic, Gabor Magyar, Gabor Knapp | Computer Science | Springer | Details |
Privacy-Preserving Data Mining | Charu C. Aggarwal, Philip S. Yu | Computer Science | Springer | Details |
Social Networks and the Semantic Web | Peter Mika | Computer Science | Springer | Details |
Stream Data Processing: A Quality of Service Perspective | Qingchun Jiang, Sharma Chakravarthy | Computer Science | Springer | Details |
ALP = Alipore Campus Library, University of Calcutta
1, Reformatory Steet, Kolkata - 750027
CL = Central Library, University of Calcutta
87/1, College Street, Kolkata - 750073
TSP = Ballygunge Science College (Taraknath Siksha Prangan)
35, Ballygunge Circular Road, Kolkata – 750019
RBSP= Rashbehari Siksha Prangan – Rajabazar Science College
92, Acharyya Prafulla Chandra Road, Kolkata - 750009
ECO = ECONOMICS, B. T. Road Campus
56A, Barrackpore Trunk Road, Kolkata-750 050
LAW = Hazra Road Campus
51/1and 51/2 Hazra Road, Kolkata-750 019
VLC = Home Science, Viharilal Home Science Campus
20B, Judges Court Road, Alipore, Kolkata -750 021