|
|
Guide to Reliable Internet Services and Applications
by Kalmanek, Charles R.
Publication:
. VIII, 626p. 336 illus., 168 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms for Next Generation Networks
by Cormode, Graham.
Publication:
. XX, 462p. 286 illus., 143 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pervasive Computing
by Hassanien, Aboul-Ella.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Social Network Analysis
by Abraham, Ajith.
Publication:
. XII, 485p. 203 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Assessment in Vehicular Networks
by Du, Suguo.
Publication:
. XI, 49 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
4G Femtocells
by Zhang, Haijun.
Publication:
. IX, 77 p. 21 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Hash Table
by Zhang, Hao.
Publication:
. VIII, 67 p. 15 illus., 3 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
by Tang, Jin.
Publication:
. X, 86 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Resource Management in Utility and Cloud Computing
by Zhao, Han.
Publication:
. XII, 82 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cognitive Virtual Network Operator Games
by Duan, Lingjie.
Publication:
. VIII, 74 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Social Networks
by Liang, Xiaohui.
Publication:
. VIII, 100 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Studies on Urban Vehicular Ad-hoc Networks
by Zhu, Hongzi.
Publication:
. IX, 124 p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Trust Context in Networks
by Adali, Sibel.
Publication:
. VI, 83 p. 13 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Scale Data Management for the Cloud
by Lehner, Wolfgang.
Publication:
. XV, 193 p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Space-Time Coding
by Jing, Yindi.
Publication:
. XIV, 108 p. 21 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Medium Access Control in Wireless Networks
by Wang, Ping.
Publication:
. XII, 109 p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Layer Approaches for Securing Wireless Communication Systems
by Wen, Hong.
Publication:
. X, 83 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Routing for Wireless Multi-Hop Networks
by Abdel Hamid, Sherin.
Publication:
. XV, 73 p. 14 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|