|
|
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
by Tang, Jin.
Publication:
. X, 86 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Resource Management in Utility and Cloud Computing
by Zhao, Han.
Publication:
. XII, 82 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Social Networks
by Liang, Xiaohui.
Publication:
. VIII, 100 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Studies on Urban Vehicular Ad-hoc Networks
by Zhu, Hongzi.
Publication:
. IX, 124 p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Trust Context in Networks
by Adali, Sibel.
Publication:
. VI, 83 p. 13 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Scale Data Management for the Cloud
by Lehner, Wolfgang.
Publication:
. XV, 193 p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Medium Access Control in Wireless Networks
by Wang, Ping.
Publication:
. XII, 109 p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Layer Approaches for Securing Wireless Communication Systems
by Wen, Hong.
Publication:
. X, 83 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Routing for Wireless Multi-Hop Networks
by Abdel Hamid, Sherin.
Publication:
. XV, 73 p. 14 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Managing and Mining Sensor Data
by Aggarwal, Charu C.
Publication:
. XIV, 534 p. 66 illus., 43 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
3D Surface Reconstruction
by Bellocchio, Francesco.
Publication:
. VI, 162 p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Structured Peer-to-Peer Systems
by Korzun, Dmitry.
Publication:
. XXII, 366 p. 84 illus., 45 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Dynamic Cloud Collaboration Platform
by Hassan, Mohammad Mehedi.
Publication:
. X, 90 p. 19 illus., 8 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Programming
by Shankar, A. Udaya.
Publication:
. XVIII, 387 p. 175 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Authentication
by Jakobsson, Markus.
Publication:
. XIV, 113 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Robustness under Large-Scale Attacks
by Zhou, Qing.
Publication:
. VIII, 41 p. 12 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Traffic Measurement on the Internet
by Li, Tao.
Publication:
. IX, 82 p. 24 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agent-Based Semantic Web Service Composition
by Kumar, Sandeep.
Publication:
. X, 57 p. 7 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|