|
|
The Regularized Fast Hartley Transform
by Jones, Keith.
Publication:
. XVII, 200p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Interference Cancellation Using Space-Time Processing and Precoding Design
by Li, Feng.
Publication:
. XII, 96 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Satellite Data Compression
by Huang, Bormin.
Publication:
. X, 310 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Engineering and Applications
by Zhu, Rongbo.
Publication:
. XVIII, 1735p. 660 illus., 58 illus. in color. In 3 volumes, not available separately.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ultra-Wideband Radio Frequency Identification Systems
by Nekoogar, Faranak.
Publication:
. XVI, 160p. 109 illus., 74 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Satellite Applications
by Pelton, Joseph N.
Publication:
. LIV, 1228 p. 453 illus., 361 illus. in color. eReference.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network-Embedded Management and Applications
by Clemm, Alexander.
Publication:
. X, 352 p. 129 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing
by Afek, Yehuda.
Publication:
. XXIV, 586 p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and Parallel Computing
by Park, James J.
Publication:
. XX, 647 p. 253 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Ubiquitous Computing
by Khalil, Ismail.
Publication:
. XIX, 267 p. 117 illus., 47 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security and Privacy
by Felici, Massimo.
Publication:
. XIV, 177 p. 44 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Dynamic Provisioning for Community Services
by Qi, Li.
Publication:
. XII, 174 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Wireless Middleware, Operating Systems, and Applications
by Cai, Ying.
Publication:
. XVI, 508p. 209 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
by Subrahmanian, V.S.
Publication:
. XIV, 231 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Next-Generation Wireless Technologies
by Chilamkurti, Naveen.
Publication:
. X, 285 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Networked "i-Learning"
by Elia, Gianluca.
Publication:
. XXI, 195p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Grid Computing
by Preve, Nikolaos P.
Publication:
. XVI, 312 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Network Design
by Kennington, Jeff.
Publication:
. XIX, 373 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Managing Risk and Information Security
by Harkins, Malcolm.
Publication:
. XVII, 152 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|