10063 Matching Record(s) found
| Title | Author | Subject | Publisher | Action |
| Information Technology For Balanced Manufacturing Systems | Weiming Shen | Computer Science | Springer | Details |
| Automatic Quantum Computer Programming | Lee Spector | Computer Science | Springer | Details |
| Human Work Interaction Design: Designing for Human Work | Torkil Clemmensen, Pedro Campos, Rikke Orngreen, Annelise Mark Pejtersen, William Wong | Computer Science | Springer | Details |
| Data Mining | Krzysztof J. Cios, Roman W. Swiniarski, Witold Pedrycz, Lukasz A. Kurgan | Computer Science | Springer | Details |
| Evolutionary Algorithms for Solving Multi-Objective Problems | Carlos A. Coello Coello, Gary B. Lamont, David A. Van Veldhuizen | Computer Science | Springer | Details |
| Algebraic Aspects of the Advanced Encryption Standard | Carlos Cid, Sean Murphy, Matthew Robshaw | Computer Science | Springer | Details |
| Advances in Digital Forensics II | Martin S. Olivier, Sujeet Shenoi | Computer Science | Springer | Details |
| Multivariate Public Key Cryptosystems | Jintai Ding, Jason E. Gower, Dieter S. Schmidt | Computer Science | Springer | Details |
| Knowledge and Data Management in GRIDs | Domenico Talia, Angelos Bilas, Marios D. Dikaiakos | Computer Science | Springer | Details |
| Social Informatics: An Information Society for all? In Remembrance of Rob Kling | Jacques Berleur, Markku I. Nurminen, John Impagliazzo | Computer Science | Springer | Details |
| Power Analysis Attacks | Stefan Mangard, Elisabeth Oswald, Thomas Popp | Computer Science | Springer | Details |
| Network-Centric Collaboration and Supporting Frameworks | Luis M. Camarinha-Matos, Hamideh Afsarmanesh, Martin Ollus | Computer Science | Springer | Details |
| Reliable Face Recognition Methods | Harry Wechsler | Computer Science | Springer | Details |
| Max-Plus Linear Stochastic Systems and Perturbation Analysis | Bernd Heidergott | Computer Science | Springer | Details |
| Project E-Society: Building Bricks | Reima Suomi, Regis Cabral, J. Felix Hampe, Arto Heikkilä, Jonna Järveläinen, Eija Koskivaara | Computer Science | Springer | Details |
| Ontology Learning and Population from Text | Philipp Cimiano | Computer Science | Springer | Details |
| Nonlinear Dimensionality Reduction | John A. Lee, Michel Verleysen | Computer Science | Springer | Details |
| From Model-Driven Design to Resource Management for Distributed Embedded Systems | Bernd Kleinjohann, Lisa Kleinjohann, Ricardo J. Machado, Carlos E. Pereira, P. S. Thiagarajan | Computer Science | Springer | Details |
| Software Engineering Techniques: Design for Quality | Krzysztof Sacha | Computer Science | Springer | Details |
| Encyclopedia of Database Systems | LING LIU, M. TAMER ÖZSU | Computer Science | Springer | Details |
| Malware Detection | Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang | Computer Science | Springer | Details |
| Electronic Postage Systems | Gerrit Bleumer | Computer Science | Springer | Details |
| Intelligent Information Processing III | Zhongzhi Shi, K. Shimohara, D. Feng | Computer Science | Springer | Details |
| Preserving Privacy in On-Line Analytical Processing (OLAP) | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera | Computer Science | Springer | Details |
| Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks | Radha Poovendran, Sumit Roy, Cliff Wang | Computer Science | Springer | Details |
| Security for Wireless Sensor Networks | Donggang Liu, Peng Ning | Computer Science | Springer | Details |
| Data Streams | Charu C. Aggarwal | Computer Science | Springer | Details |
| Past, Present and Future of Research in the Information Society | Wesley Shrum, Keith R. Benson, Wiebe E. Bijker, Klaus Brunnstein | Computer Science | Springer | Details |
| Data Warehousing and Data Mining Techniques for Cyber Security | Anoop Singhal | Computer Science | Springer | Details |
| Integrated Research in GRID Computing | Sergei Gorlatch, Marco Danelutto | Computer Science | Springer | Details |
| Software Verification and Validation | Marcus S. Fisher | Computer Science | Springer | Details |
| Network Security Policies and Procedures | Douglas W. Frye | Computer Science | Springer | Details |
| Decision Support for Global Enterprises | Uday Kulkarni, Daniel J. Power, Ramesh Sharda | Computer Science | Springer | Details |
| A Computer Scientist's Guide to Cell Biology | William W. Cohen | Computer Science | Springer | Details |
| The Semantic Web | Jorge Cardoso, Martin Hepp, Miltiadis D. Lytras | Computer Science | Springer | Details |
| Handbook of Database Security | Michael Gertz, Sushil Jajodia | Computer Science | Springer | Details |
| Cryptanalytic Attacks on RSA | Song Y. Yan | Computer Science | Springer | Details |
| Wireless Sensor Networks and Applications | Yingshu Li, My T. Thai, Weili Wu | Computer Science | Springer | Details |
| Genetic Programming Theory and Practice IV | Rick Riolo, Terence Soule, Bill Worzel | Computer Science | Springer | Details |
| Network Control and Engineering for QoS, Security and Mobility, IV | Dominique Gaïti | Computer Science | Springer | Details |
| An Introduction to Kolmogorov Complexity and Its Applications | Ming Li, Paul Vitányi | Computer Science | Springer | Details |
| Digital Enterprise Technology | Pedro Filipe Cunha, Paul G. Maropoulos | Computer Science | Springer | Details |
| Hypercomputation | Apostolos Syropoulos | Computer Science | Springer | Details |
| Privacy-Respecting Intrusion Detection | Ulrich Flegel | Computer Science | Springer | Details |
| Visual Languages and Applications | Kang Zhang | Computer Science | Springer | Details |
| Bayesian Networks and Decision Graphs | Finn V. Jensen, Thomas D. Nielsen | Computer Science | Springer | Details |
| Peer-to-Peer Computing for Mobile Networks | Henning Schulzrinne, Maria Papadopouli | Computer Science | Springer | Details |
| New Computational Paradigms | S. Barry Cooper, Benedikt Löwe, Andrea Sorbi | Computer Science | Springer | Details |
| Advances in Wireless Ad Hoc and Sensor Networks | Deying Li, Maggie Xiaoyan Cheng | Computer Science | Springer | Details |
| Synchronizing Internet Protocol Security (SIPSec) | Charles A. Shoniregun | Computer Science | Springer | Details |
| Economics of Identity Theft: Avoidance, Causes and Possible Cures | L. Jean Camp | Computer Science | Springer | Details |
| Botnet Detection | Wenke Lee, Cliff Wang, David Dagon | Computer Science | Springer | Details |
| Information Systems Development | Wita Wojtkowski, Gregory Wojtkowski, Michael Lang, Kieran Conboy, Chris Barry | Computer Science | Springer | Details |
| Information and Complexity in Statistical Modeling | Jorma Rissanen | Computer Science | Springer | Details |
| Online Business Security Systems | Godfried B. Williams | Computer Science | Springer | Details |
| More Math Into Latex | George Grätzer | Computer Science | Springer | Details |
| Parsing Techniques | Dick Grune, Ceriel J. H. Jacobs | Computer Science | Springer | Details |
| Introduction to C++ Programming and Graphics | Constantine Pozrikidis | Computer Science | Springer | Details |
| Do-All Computing in Distributed Systems | Chryssis Georgiou, Alexander A. Shvartsman | Computer Science | Springer | Details |
| Stochastic Learning and Optimization | Xi-Ren Cao | Computer Science | Springer | Details |
| Moving Wearables into the Mainstream | Joseph L. Dvorak | Computer Science | Springer | Details |
| SAT-Based Scalable Formal Verification Solutions | Malay K. Ganai, Aarti Gupta | Computer Science | Springer | Details |
| Knowledge Management for Educational Innovation | Arthur Tatnall, Toshio Okamoto, Adrie Visscher | Computer Science | Springer | Details |
| Data Quality and Record Linkage Techniques | Thomas N. Herzog, Fritz J. Scheuren, William E. Winkler | Computer Science | Springer | Details |
| Distributed and Parallel Systems | Péter Kacsuk, Thomas Fahringer, Zsolt Németh | Computer Science | Springer | Details |
| Ontology Management | Martin Hepp, Pieter Leenheer, Aldo Moor, York Sure | Computer Science | Springer | Details |
| Securing Biometrics Applications | Charles A. Shoniregun, Stephen Crosier | Computer Science | Springer | Details |
| Soft Computing for Knowledge Discovery and Data Mining | Oded Maimon, Lior Rokach | Computer Science | Springer | Details |
| Sequence Data Mining | Guozhu Dong, Jian Pei | Computer Science | Springer | Details |
| Machine Learning for Multimedia Content Analysis | Yihong Gong, Wei Xu | Computer Science | Springer | Details |
| Advances in Information Systems Development | Gabor Magyar, Gabor Knapp, Wita Wojtkowski, W. Gregory Wojtkowski, Jože Zupan?i? | Computer Science | Springer | Details |
| Advances in Information Systems Development | Wita Wojtkowski, W. Gregory Wojtkowski, Jože Zupancic, Gabor Magyar, Gabor Knapp | Computer Science | Springer | Details |
| Privacy-Preserving Data Mining | Charu C. Aggarwal, Philip S. Yu | Computer Science | Springer | Details |
| Social Networks and the Semantic Web | Peter Mika | Computer Science | Springer | Details |
| Stream Data Processing: A Quality of Service Perspective | Qingchun Jiang, Sharma Chakravarthy | Computer Science | Springer | Details |
ALP = Alipore Campus Library, University of Calcutta
1, Reformatory Steet, Kolkata - 750027
CL = Central Library, University of Calcutta
87/1, College Street, Kolkata - 750073
TSP = Ballygunge Science College (Taraknath Siksha Prangan)
35, Ballygunge Circular Road, Kolkata – 750019
RBSP= Rashbehari Siksha Prangan – Rajabazar Science College
92, Acharyya Prafulla Chandra Road, Kolkata - 750009
ECO = ECONOMICS, B. T. Road Campus
56A, Barrackpore Trunk Road, Kolkata-750 050
LAW = Hazra Road Campus
51/1and 51/2 Hazra Road, Kolkata-750 019
VLC = Home Science, Viharilal Home Science Campus
20B, Judges Court Road, Alipore, Kolkata -750 021