43115 Matching Record(s) found
Title | Author | Subject | Publisher | Action |
Alternative Breast Imaging | Keith D. Paulsen, Paul M. Meaney, Larry C. Gilman | Computer Science | Springer | Details |
QoS in Packet Networks | Kun I. Park | Computer Science | Springer | Details |
Intrusion Detection and Correlation | Christopher Kruegel, Fredrik Valeur, Giovanni Vigna | Computer Science | Springer | Details |
Image and Video Encryption | Sushil Jajodia | Computer Science | Springer | Details |
Legal Programming | Brian Subirana, Malcolm Bain | Computer Science | Springer | Details |
Privacy, Security and Trust within the Context of Pervasive Computing | Philip Robinson, Harald Vogt, Waleed Wagealla | Computer Science | Springer | Details |
Advances in Pervasive Computing and Networking | Boleslaw K. Szymanski, Bülent Yener | Computer Science | Springer | Details |
System Modeling and Optimization | John Cagnol, Jean-Paul Zolésio | Computer Science | Springer | Details |
Encyclopedia of Cryptography and Security | Henk C. A. Tilborg | Computer Science | Springer | Details |
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems | Jerzy Peja?, Andrzej Piegat | Computer Science | Springer | Details |
The Next Wave in Computing, Optimization, and Decision Technologies | Bruce Golden, S. Raghavan, Edward Wasil | Computer Science | Springer | Details |
Semistructured Database Design | Tok Wang Ling, Mong Li Lee, Gillian Dobbie | Computer Science | Springer | Details |
E-Training Practices for Professional Organizations | Paul Nicholson, Mikko Ruohonen, J. Barrie Thompson, Jari Multisilta | Computer Science | Springer | Details |
Virtual Organizations | Luis M. Camarinha-Matos, Hamideh Afsarmanesh, Martin Ollus | Computer Science | Springer | Details |
Optical Burst Switched Networks | Jason P. Jue, Vinod M. Vokkarane | Computer Science | Springer | Details |
Reverse Engineering of Object Oriented Code | Paolo Tonella, Alessandra Potrich | Computer Science | Springer | Details |
Coding for Data and Computer Communications | David Salomon | Computer Science | Springer | Details |
Distributed Network Systems | Weijia Jia, Wanlei Zhou | Computer Science | Springer | Details |
Knowledge and Skill Chains in Engineering and Manufacturing | Eiji Arai, Fumihiko Kimura, Jan Goossenaerts, Keiichi Shirase | Computer Science | Springer | Details |
Quantitative Measure for Discrete Event Supervisory Control | Asok Ray, Vir V. Phoha, Shashi P. Phoha | Computer Science | Springer | Details |
Trusted Computing Platforms: Design and Applications | Sean W. Smith | Computer Science | Springer | Details |
Computer Security in the 21st Century | D. T. Lee, S. P. Shieh, J. D. Tygar | Computer Science | Springer | Details |
Broadband Satellite Comunication Systems and the Challenges of Mobility | Thierry Gayraud, Michel Mazzella, Fernando Boavida, Edmundo Monteiro, João Orvalho | Computer Science | Springer | Details |
Information Technology and Educational Management in the Knowledge Society | Arthur Tatnall, Javier Osorio, Adrie Visscher | Computer Science | Springer | Details |
Technology Enhanced Learning | Jean-Pierre Courtiat, Costas Davarakis, Thierry Villemur | Computer Science | Springer | Details |
High Performance Computational Science and Engineering | Michael K. Ng, Andrei Doncescu, Laurence T. Yang, Tau Leng | Computer Science | Springer | Details |
Formal Aspects in Security and Trust | Theo Dimitrakos, Fabio Martinelli | Computer Science | Springer | Details |
Designing Human Interface in Speech Technology | Fang Chen | Computer Science | Springer | Details |
History of Nordic Computing | Janis Bubenko, John Impagliazzo, Arne Sølvberg | Computer Science | Springer | Details |
Managing Cyber Threats | Vipin Kumar, Jaideep Srivastava, Aleksandar Lazarevic | Computer Science | Springer | Details |
Mining Sequential Patterns from Large Data Sets | Wei Wang, Jiong Yang | Computer Science | Springer | Details |
Fuzzy Database Modeling with XML | Zongmin Ma | Computer Science | Springer | Details |
Software Process Modeling | Silvia T. Acuña, Natalia Juristo | Computer Science | Springer | Details |
Evolutionary Synthesis of Pattern Recognition Systems | Bir Bhanu, Yingqiang Lin, Krzysztof Krawiec | Computer Science | Springer | Details |
Communications and Multimedia Security | David Chadwick, Bart Preneel | Computer Science | Springer | Details |
Architecture Description Languages | Pierre Dissaux, Mamoun Filali-Amine, Pierre Michel, François Vernadat | Computer Science | Springer | Details |
Algorithmic Learning in a Random World | Vladimir Vovk, Alexander Gammerman, Glenn Shafer | Computer Science | Springer | Details |
Certification and Security in Inter-Organizational E-Service | Enrico Nardelli, Maurizio Talamo | Computer Science | Springer | Details |
Home-Oriented Informatics and Telematics | Andy Sloane | Computer Science | Springer | Details |
Computer Network Security | Joseph Migga Kizza | Computer Science | Springer | Details |
Stream Data Management | Nauman A. Chaudhry, Kevin Shaw, Mahdi Abdelguerfi | Computer Science | Springer | Details |
Data Mining and Knowledge Discovery Handbook | Oded Maimon, Lior Rokach | Computer Science | Springer | Details |
Principles of Computer Graphics | Shalini Govil-Pai | Computer Science | Springer | Details |
A Software Process Model Handbook for Incorporating People?s Capabilities | Silvia Teresita Acuña, Natalia Juristo, Ana María Moreno, Alicia Mon | Computer Science | Springer | Details |
EndNote? 1-2-3 Easy! | Abha Agrawal | Computer Science | Springer | Details |
Perspectives and Policies on ICT in Society | Jacques Berleur, Chrisanthi Avgerou | Computer Science | Springer | Details |
Business Agility and Information Technology Diffusion | Richard L. Baskerville, Lars Mathiassen, Jan Pries-Heje, Janice I. DeGross | Computer Science | Springer | Details |
Understanding IPv6 | Youngsong Mun, Hyewon K. Lee | Computer Science | Springer | Details |
Security and Privacy in the Age of Ubiquitous Computing | Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura | Computer Science | Springer | Details |
Agent Intelligence Through Data Mining | Andreas L. Symeonidis, Pericles A. Mitkas | Computer Science | Springer | Details |
A Classical Introduction to Cryptography | Serge Vaudenay | Computer Science | Springer | Details |
Motion-Free Super-Resolution | Subhasis Chaudhuri, Manjunath V. Joshi | Computer Science | Springer | Details |
Information and Communication Technologies and Real-Life Learning | Tom Weert, Arthur Tatnall | Computer Science | Springer | Details |
Security in E-Learning | Edgar Weippl | Computer Science | Springer | Details |
Multimedia Encryption and Watermarking | Borko Furht, Edin Muharemagic, Daniel Socek | Computer Science | Springer | Details |
Guide to Assembly Language Programming in Linux | Sivarama P. Dandamudi | Computer Science | Springer | Details |
Net-Centric Approaches to Intelligence and National Security | Roy Ladner, Frederick E. Petry | Computer Science | Springer | Details |
Information Processing and Security Systems | Khalid Saeed, Jerzy Peja? | Computer Science | Springer | Details |
Impacts and Risk Assessment of Technology for Internet Security | Charles A. Shoniregun | Computer Science | Springer | Details |
Multi-Agent Programming | Rafael H. Bordini, Mehdi Dastani, Jürgen Dix, Amal Fallah Seghrouchni | Computer Science | Springer | Details |
Super-Recursive Algorithms | Mark Burgin | Computer Science | Springer | Details |
Understanding 3D Animation Using Maya | John Edgar Park | Computer Science | Springer | Details |
Multimedia Introduction to Programming Using Java | David Gries, Paul Gries | Computer Science | Springer | Details |
Abstraction, Refinement and Proof for Probabilistic Systems | Annabelle McIver, Carroll Morgan | Computer Science | Springer | Details |
Introduction to Assembly Language Programming | Sivarama P. Dandamudi | Computer Science | Springer | Details |
Handbook of Face Recognition | Stan Z. Li, Anil K. Jain | Computer Science | Springer | Details |
Geometric Fundamentals of Robotics | J. M. Selig | Computer Science | Springer | Details |
Guide to RISC Processors | Sivarama P. Dandamudi | Computer Science | Springer | Details |
XML for Bioinformatics | Ethan Cerami | Computer Science | Springer | Details |
Nearest Neighbor Search | Apostolos N. Papadopoulos, Yannis Manolopoulos | Computer Science | Springer | Details |
From Specification to Embedded Systems Application | Achim Rettberg, Mauro C. Zanella, Franz J. Rammig | Computer Science | Springer | Details |
Web Services in the Enterprise | Akhil Sahai, Sven Graupner | Computer Science | Springer | Details |
Reliable Distributed Systems | Kenneth P. Birman | Computer Science | Springer | Details |
Semantic Management of Middleware | Daniel Oberle | Computer Science | Springer | Details |
Understanding Intrusion Detection Through Visualization | Stefan Axelsson, David Sands | Computer Science | Springer | Details |
ALP = Alipore Campus Library, University of Calcutta
1, Reformatory Steet, Kolkata - 750027
CL = Central Library, University of Calcutta
87/1, College Street, Kolkata - 750073
TSP = Ballygunge Science College (Taraknath Siksha Prangan)
35, Ballygunge Circular Road, Kolkata – 750019
RBSP= Rashbehari Siksha Prangan – Rajabazar Science College
92, Acharyya Prafulla Chandra Road, Kolkata - 750009
ECO = ECONOMICS, B. T. Road Campus
56A, Barrackpore Trunk Road, Kolkata-750 050
LAW = Hazra Road Campus
51/1and 51/2 Hazra Road, Kolkata-750 019
VLC = Home Science, Viharilal Home Science Campus
20B, Judges Court Road, Alipore, Kolkata -750 021