//]]>
The Regularized Fast Hartley Transform by Jones, Keith. Publication: . XVII, 200p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Interference Cancellation Using Space-Time Processing and Precoding Design by Li, Feng. Publication: . XII, 96 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Satellite Data Compression by Huang, Bormin. Publication: . X, 310 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Engineering and Applications by Zhu, Rongbo. Publication: . XVIII, 1735p. 660 illus., 58 illus. in color. In 3 volumes, not available separately. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ultra-Wideband Radio Frequency Identification Systems by Nekoogar, Faranak. Publication: . XVI, 160p. 109 illus., 74 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Satellite Applications by Pelton, Joseph N. Publication: . LIV, 1228 p. 453 illus., 361 illus. in color. eReference. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network-Embedded Management and Applications by Clemm, Alexander. Publication: . X, 352 p. 129 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing by Afek, Yehuda. Publication: . XXIV, 586 p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and Parallel Computing by Park, James J. Publication: . XX, 647 p. 253 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Ubiquitous Computing by Khalil, Ismail. Publication: . XIX, 267 p. 117 illus., 47 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security and Privacy by Felici, Massimo. Publication: . XIV, 177 p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dynamic Provisioning for Community Services by Qi, Li. Publication: . XII, 174 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Wireless Middleware, Operating Systems, and Applications by Cai, Ying. Publication: . XVI, 508p. 209 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba by Subrahmanian, V.S. Publication: . XIV, 231 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Next-Generation Wireless Technologies by Chilamkurti, Naveen. Publication: . X, 285 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Networked "i-Learning" by Elia, Gianluca. Publication: . XXI, 195p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grid Computing by Preve, Nikolaos P. Publication: . XVI, 312 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Network Design by Kennington, Jeff. Publication: . XIX, 373 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managing Risk and Information Security by Harkins, Malcolm. Publication: . XVII, 152 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية