Refine your search

Your search returned 3890 results.

1261.
Theory of Computation by George Tourlakis

by Tourlakis, George.

Material type: Text Text Publication details: New Jersey John Wiley & Sons 2012Availability: Items available for reference: Not for loanCall number: REF 004.0151 TOU (1). :

1262.
Applying Computational Intelligence: how to create value by Arthur K. Kordon

by Kordon, Arthur K.

Edition: 1st ed.Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2010Availability: Items available for reference: Not for loanCall number: REF 005.1 KOR (1). :

1263.
Fault Tolerant Scheduling Algorithm for Grid Computing Neha Agarwal

by Agarwal, Neha | Nitin.

Material type: Text Text Publication details: Solan {HP} Jaypee University of Information Technology 2013Availability: Items available for reference: Not for loanCall number: SPR 005 AGA (1). :

1264.
Arithmetic Optimization Techniques for Hardware and Software Design by Ryan Kastner

by Kastner, Ryan | Fallah, Farzan | Hosangadi, Anup.

Material type: Text Text Publication details: Cambridge Cambridge University Press 2010Availability: Items available for reference: Not for loanCall number: REF 004.015196 KAS (1). :

1265.
Formal Logical Methods for System Security and Correctness Edited by Orna Grumberg

by Grumberg, Orna | Pfaller, Christian | Nipkow, Tobias.

Material type: Text Text Publication details: Amsterdam IOS Press 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 GRU (1). :

1266.
Dictionary of Computer Vision and Image Processing Robert B. Fisher

by Fisher, Robert B | Robertson, Craig | Fitzgibbon, Andrew | Dawson-Howe, Kenneth | Breckon, Toby P.

Edition: 2nd ed.Material type: Text Text Publication details: Chichester John Wiley & Sons 2014Availability: Items available for reference: Not for loanCall number: RES 006.3703 FIS (1). :

1267.
Aspects of Network and Information Security Edited by Evangelos Kranakis

by Kranakis, Evangelos | Shahbazian, Elisa | Haroutunian, Evgueni.

Material type: Text Text Publication details: Amsterdam IOS Press 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 KRA (1). :

1268.
Mobile Agents in Networking and Distributed Computing by Jiannong Cao

by Cao, Jiannong | Das, Sajal K.

Material type: Text Text Publication details: Hoboken John Wiley & Sons 2012Availability: Items available for reference: Not for loanCall number: REF 006.3 CAO (1). :

1269.
From Semantics to Computer Science: essays in honour of Gilles Kahn by Yves Bertot

by Kahn, Gilles | Huet, Gerard | Bertot, Yves.

Material type: Text Text Publication details: New York Cambridge University Press 2009Availability: Items available for reference: Not for loanCall number: REF 004 BER (1). :

1270.
Object Categorization: computer and human vision perspectives by Sven J. Dickinson

by Dickinson, Sven J | Leonardis, Alies.

Material type: Text Text Publication details: Cambridge Cambridge University Press 2009Availability: Items available for reference: Not for loanCall number: REF 006.37 DIC (1). :

1271.
Man-Machine Interactions by Krzysztof A. Cyran

by Cyran, Krzysztof A | Peters, James F | Kozielski, Stanislaw.

Material type: Text Text Publication details: USA Springer Verlag, Netherlands 2009Availability: Items available for reference: Not for loanCall number: REF 620.8 CYR (1). :

1272.
Key Secure Establishment by Kim-Kwang Raymond Choo

by Choo, Kim-Kwang Raymond.

Material type: Text Text Publication details: New York Springer Verlag, Netherlands 2009Availability: Items available for reference: Not for loanCall number: REF 005.82 CHO (1). :

1273.
Molecular Design: concepts and applications by Gisbert Schneider

by Schneider, Gisbert | Baringhaus, Karl-Heinz.

Material type: Text Text Publication details: Weinheim Wiley 2008Availability: Items available for reference: Not for loanCall number: REF 541.220113 SCH (1). :

1274.
Variants of Evolutionary Algorithms for Real-World Applications Edited by Raymond Chiong

by Chiong, Raymond | Michalewicz, Zbigniew | Weise, Thomas.

Material type: Text Text Publication details: Berlin Springer 2012Availability: Items available for reference: Not for loanCall number: REF 006.31 CHI (1). :

1275.
Computer Vision: algorithms and applications by Richard Szeliski

by Szeliski, Richard.

Material type: Text Text Publication details: London Springer 2011Availability: Items available for reference: Not for loanCall number: REF 006.37 SZE (1). :

1276.
Security and Cooperation in Wireless Networks: thwarting malicious and selfish behavior in the age of ubiquitous computing by Levente Buttyan

by Buttyán, Levente | Hubaux, Jean-Pierre.

Material type: Text Text Publication details: Cambridge Cambridge University Press 2008Availability: Items available for reference: Not for loanCall number: REF 005.8 BUT (1). :

1277.
Communication Networks and Computer Systems: a tribute to Professor Erol Gelenbe by Javier A. Barria

by Barria, Javier A | Gelenbe, Erol.

Material type: Text Text Publication details: London Imperial College Press 2006Availability: Items available for reference: Not for loanCall number: REF 004.6 BAR (1). :

1278.
ECG Signal Processing, Classification, and Interpretation: a comprehensive framework of computational intelligence by Adam Gacek

by Gacek, Adam C | Pedrycz, Witold.

Material type: Text Text Publication details: London Springer 2012Availability: Items available for reference: Not for loanCall number: REF 616.1207547 GAC (1). :

1279.
Object Oriented Programming with C++ by Sunil K. Pandey

by Pandey, Sunil K | Singh, Diljinder | Dhillon, Jaspreet Singh.

Material type: Text Text Publication details: New Delhi SK Kataria & Sons 2010Availability: Items available for loan: Call number: 005.13321 PAN (2).

1280.
Mining of Massive Datasets Parul Gupta

by Gupta, Parul | Saha, Suman.

Material type: Text Text Publication details: Solan {HP} Jaypee University of Information Technology 2013Availability: Items available for reference: Not for loanCall number: SPR 005 GUP (1). :


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha