10063 Matching Record(s) found
Title | Author | Subject | Publisher | Action |
Traffic Measurement on the Internet | Tao Li, Shigang Chen | Computer Science | Springer | Details |
Network Robustness under Large-Scale Attacks | Qing Zhou, Long Gao, Ruifang Liu, Shuguang Cui | Computer Science | Springer | Details |
Mobile Authentication | Markus Jakobsson | Computer Science | Springer | Details |
Distributed Programming | A. Udaya Shankar | Computer Science | Springer | Details |
Spatio-temporal Networks | Betsy George, Sangho Kim | Computer Science | Springer | Details |
Querying Moving Objects Detected by Sensor Networks | Markus Bestehorn | Computer Science | Springer | Details |
Information Systems Development | Rob Pooley, Jennifer Coady, Christoph Schneider, Henry Linger, Chris Barry, Michael Lang | Computer Science | Springer | Details |
Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis | Uffe B. Kjærulff, Anders L. Madsen | Computer Science | Springer | Details |
Dynamic Cloud Collaboration Platform | Mohammad Mehedi Hassan, Eui-Nam Huh | Computer Science | Springer | Details |
Energy-aware Scheduling on Multiprocessor Platforms | Dawei Li, Jie Wu | Computer Science | Springer | Details |
RFID as an Infrastructure | Yan Qiao, Shigang Chen, Tao Li | Computer Science | Springer | Details |
Facebook Nation | Newton Lee | Computer Science | Springer | Details |
Handbook of Computational Approaches to Counterterrorism | V.S. Subrahmanian | Computer Science | Springer | Details |
Pattern Recognition and Classification | Geoff Dougherty | Computer Science | Springer | Details |
Requirements Engineering and Management for Software Development Projects | Murali Chemuturi | Computer Science | Springer | Details |
Moving Target Defense II | Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang | Computer Science | Springer | Details |
Structured Peer-to-Peer Systems | Dmitry Korzun, Andrei Gurtov | Computer Science | Springer | Details |
Semantic Analysis and Understanding of Human Behavior in Video Streaming | Alberto Amato, Vincenzo Di Lecce, Vincenzo Piuri | Computer Science | Springer | Details |
Fast Compact Algorithms and Software for Spline Smoothing | Howard L. Weinert | Computer Science | Springer | Details |
Automatic Malware Analysis | Heng Yin, Dawn Song | Computer Science | Springer | Details |
Iris Biometrics | Christian Rathgeb, Andreas Uhl, Peter Wild | Computer Science | Springer | Details |
Health Informatics in the Cloud | Mark L. Braunstein | Computer Science | Springer | Details |
3D Surface Reconstruction | Francesco Bellocchio, N. Alberto Borghese, Stefano Ferrari, Vincenzo Piuri | Computer Science | Springer | Details |
Digital Functions and Data Reconstruction | Li M. Chen | Computer Science | Springer | Details |
Digital Creativity | Kun Chang Lee | Computer Science | Springer | Details |
Managing and Mining Sensor Data | Charu C. Aggarwal | Computer Science | Springer | Details |
Routing for Wireless Multi-Hop Networks | Sherin Abdel Hamid, Hossam S. Hassanein, Glen Takahara | Computer Science | Springer | Details |
Outlier Analysis | Charu C. Aggarwal | Computer Science | Springer | Details |
SmartData | Inman Harvey, Ann Cavoukian, George Tomko, Don Borrett, Hon Kwan, Dimitrios Hatzinakos | Computer Science | Springer | Details |
Physical Layer Approaches for Securing Wireless Communication Systems | Hong Wen | Computer Science | Springer | Details |
Performance Evaluation Software | Bahadir Karasulu, Serdar Korukoglu | Computer Science | Springer | Details |
Finding Source Code on the Web for Remix and Reuse | Susan Elliott Sim, Rosalva E. Gallardo-Valencia | Computer Science | Springer | Details |
Distributed Medium Access Control in Wireless Networks | Ping Wang, Weihua Zhuang | Computer Science | Springer | Details |
A General Framework for Reasoning On Inconsistency | Maria Vanina Martinez, Cristian Molinaro, V.S. Subrahmanian, Leila Amgoud | Computer Science | Springer | Details |
Semantic Web-based Intelligent Geospatial Web Services | Peng Yue | Computer Science | Springer | Details |
Search Theory | Steve Alpern, Robbert Fokkink, Leszek G?sieniec, Roy Lindelauf, V.S. Subrahmanian | Computer Science | Springer | Details |
Distributed Space-Time Coding | Yindi Jing | Computer Science | Springer | Details |
Genetic Programming Theory and Practice X | Rick Riolo, Ekaterina Vladislavleva, Marylyn D Ritchie, Jason H. Moore | Computer Science | Springer | Details |
Web-Scale Data Management for the Cloud | Wolfgang Lehner, Kai-Uwe Sattler | Computer Science | Springer | Details |
Semantic Web and Web Science | Juanzi Li, Guilin Qi, Dongyan Zhao, Wolfgang Nejdl, Hai-Tao Zheng | Computer Science | Springer | Details |
Trust for Intelligent Recommendation | Touhid Bhuiyan | Computer Science | Springer | Details |
ICT Development for Social and Rural Connectedness | Nor Aziah Alias | Computer Science | Springer | Details |
Process Simulation and Parametric Modeling for Strategic Project Management | Peter J. Morales, Dennis Anderson | Computer Science | Springer | Details |
Modeling Trust Context in Networks | Sibel Adali | Computer Science | Springer | Details |
Abstraction in Artificial Intelligence and Complex Systems | Lorenza Saitta, Jean-Daniel Zucker | Computer Science | Springer | Details |
Cooperative Networking in a Heterogeneous Wireless Medium | Muhammad Ismail, Weihua Zhuang | Computer Science | Springer | Details |
Transportation and Information | Piyushimita (Vonu) Thakuriah, D. Glenn Geers | Computer Science | Springer | Details |
Security for Wireless Implantable Medical Devices | Xiali Hei, Xiaojiang Du | Computer Science | Springer | Details |
A Survey of Core Research in Information Systems | Anna Sidorova, Nicholas Evangelopoulos, Russell Torres, Vess Johnson | Computer Science | Springer | Details |
Trust-based Collective View Prediction | Tiejian Luo, Su Chen, Guandong Xu, Jia Zhou | Computer Science | Springer | Details |
Counterterrorism and Cybersecurity | Newton Lee | Computer Science | Springer | Details |
Robotized Transcranial Magnetic Stimulation | Lars Richter | Computer Science | Springer | Details |
Model-based Health Monitoring of Hybrid Systems | Danwei Wang, Ming Yu, Chang Boon Low, Shai Arogeti | Computer Science | Springer | Details |
Android Malware | Xuxian Jiang, Yajin Zhou | Computer Science | Springer | Details |
3D Biometrics | David Zhang, Guangming Lu | Computer Science | Springer | Details |
Hyperspectral Image Fusion | Subhasis Chaudhuri, Ketan Kotwal | Computer Science | Springer | Details |
Building Sustainable Information Systems | Henry Linger, Julie Fisher, Andrew Barnden, Chris Barry, Michael Lang, Christoph Schneider | Computer Science | Springer | Details |
Sustainable Web Ecosystem Design | Greg O'Toole | Computer Science | Springer | Details |
Concepts, Ontologies, and Knowledge Representation | Grega Jakus, Veljko Milutinovi?, Sanida Omerovi?, Sašo Tomaži? | Computer Science | Springer | Details |
Studies on Urban Vehicular Ad-hoc Networks | Hongzi Zhu, Minglu Li | Computer Science | Springer | Details |
Modeling, Simulation and Visual Analysis of Crowds | Saad Ali, Ko Nishino, Dinesh Manocha, Mubarak Shah | Computer Science | Springer | Details |
Handbook of Medical and Healthcare Technologies | Borko Furht, Ankur Agarwal | Computer Science | Springer | Details |
Modern Accelerator Technologies for Geographic Information Science | Xuan Shi, Volodymyr Kindratenko, Chaowei Yang | Computer Science | Springer | Details |
Computational Medicine in Data Mining and Modeling | Goran Rakocevic, Tijana Djukic, Nenad Filipovic, Veljko Milutinovi? | Computer Science | Springer | Details |
Handbook of Human Computation | Pietro Michelucci | Computer Science | Springer | Details |
Security and Privacy in Mobile Social Networks | Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen | Computer Science | Springer | Details |
Cognitive Virtual Network Operator Games | Lingjie Duan, Jianwei Huang, Biying Shou | Computer Science | Springer | Details |
Resource Management in Utility and Cloud Computing | Han Zhao, Xiaolin Li | Computer Science | Springer | Details |
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks | Jin Tang, Yu Cheng | Computer Science | Springer | Details |
Distributed Hash Table | Hao Zhang, Yonggang Wen, Haiyong Xie, Nenghai Yu | Computer Science | Springer | Details |
Location Privacy Protection in Mobile Networks | Xinxin Liu, Xiaolin Li | Computer Science | Springer | Details |
4G Femtocells | Haijun Zhang, Xiaoli Chu, Xiangming Wen | Computer Science | Springer | Details |
Security Assessment in Vehicular Networks | Suguo Du, Haojin Zhu | Computer Science | Springer | Details |
Modelling Computing Systems | Faron Moller, Georg Struth | Computer Science | Springer | Details |
Principles of Digital Image Processing | Wilhelm Burger, Mark J. Burge | Computer Science | Springer | Details |
ALP = Alipore Campus Library, University of Calcutta
1, Reformatory Steet, Kolkata - 750027
CL = Central Library, University of Calcutta
87/1, College Street, Kolkata - 750073
TSP = Ballygunge Science College (Taraknath Siksha Prangan)
35, Ballygunge Circular Road, Kolkata – 750019
RBSP= Rashbehari Siksha Prangan – Rajabazar Science College
92, Acharyya Prafulla Chandra Road, Kolkata - 750009
ECO = ECONOMICS, B. T. Road Campus
56A, Barrackpore Trunk Road, Kolkata-750 050
LAW = Hazra Road Campus
51/1and 51/2 Hazra Road, Kolkata-750 019
VLC = Home Science, Viharilal Home Science Campus
20B, Judges Court Road, Alipore, Kolkata -750 021