Search ResultsElectronic Resources 
Limit Search Results
by
Slaughter, Sandra A., author.
Format:
Excerpt:
competitive and has undergone a dramatic transformation from its roots in a handful of computer hardware
by
Pal, Sankar K.
Format:
Excerpt:
surveillance is an extremely interdisciplinary area, embracing the study of methods and algorithms for computer
by
Grace, David, 1970-
Format:
Excerpt:
communications techniques in different application areas (e.g. Cognitive Femtocell Networks (CFN)) Written by
by
Serpanos, Dimitrios Nikolaou.
ScienceDirect https://www.sciencedirect.com/science/book/9780123744944
Format:
Excerpt:
VLSI. Discussing the major challenges in the design of networks and the architectures that have been
by
International Congress of Energy and Environment Engineering and Management (3rd : 2009 : Portalegre, Portugal)
Format:
Excerpt:
pumps operating as turbines for energy recovery in water distribution networks. Two case study -- Leds
by
Soliman, S. A.
ScienceDirect https://www.sciencedirect.com/science/book/9780123815439
Format:
Excerpt:
advantages and disadvantages and when they are best utilized. Supported by an online computer program, this
by
Casey, Eoghan.
ScienceDirect https://www.sciencedirect.com/science/book/9780123742674
Format:
Excerpt:
cellular telephones and other mobile devices), and investigations involving networks (including enterprise
by
Saltzer, J. H., 1939-
ScienceDirect https://www.sciencedirect.com/science/book/9780123749574
Format:
Excerpt:
organization, file systems, data integrity, consistency, and authenticated messages. Most computer systems are
by
Krasnogor, Natalio.
MacEwan University Access (Unlimited Concurrent Users) from ScienceDirect
ScienceDirect http://www.sciencedirect.com/science/book/9780444528650
ScienceDirect http://www.sciencedirect.com/science/book/9780444528650
Format:
Excerpt:
-Assembled Computer Architectures -- Ch. 9: Simulation of Self-Assembly Processes Using Abstract Reduction Systems
by
Zelkowitz, Marvin V., 1945-
Format:
Excerpt:
and Applications; 3. Multimedia Security; 6. Computer Forensics; 8. Security Protocols for Wireless
by
Berndt, Ernst R.
Format:
Excerpt:
-- Computer input, computer networks, and productivity / B. K. Atrostic and Sang Nguyen -- Services
by
Kraut, Robert E.
Format:
Excerpt:
/ Robert Kraut ... [et al.] -- The neutered computer / Malcom Brynin -- The consumption junction revisited

Select an Action




