Search again

Found: 59  Titles

Order by :    Show:   Per Page
image

image

image
Introduction to secure outsourcing computation / Xiaofeng Chen.
Author
Chen, Xiaofeng,
Call Number
QA76.585 .C445 2016,004.6782 23

image
Layout techniques for MOSFETS / Salvador Pinillos Gimenez.
Author
Gimenez, Salvador Pinillos,
Call Number
TK7871.95 .G555 2016,621.3815284 23

image

image
Learning from multiple social networks / Liqiang Nie, Xuemeng Song, and Tat-Seng Chua.
Author
Nie, Liqiang.,
Call Number
HM742 .N545 2016,302.30285 23

image

image

image
Multipath effects in GPS receivers / Steven Miller, Xue Zhang, and Andreas Spanias.
Author
Miller, Steven.,
Call Number
TK6565.D5 M555 2016,621.384191 23

image

image
Privacy risk analysis / Sourya Joyee De and Daniel Le M�etayer.
Author
De, Sourya Joyee.,
Call Number
BF637.P74 .D46 2016,155.92 23

image

image

image
Research infrastructures for hardware accelerators / Yakun Sophia Shao and David Brooks.
Author
Shao, Yakun Sophia.,
Call Number
TK7895.M5 S427 2016,621.3916 23

image
Resistive random access memory (RRAM) : from devices to array architectures / Shimeng Yu.
Author
Yu, Shimeng.,
Call Number
TK7895.M4 Y87 2016,621.39732 23

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles