Search again

Found: 56  Titles

Order by :    Show:   Per Page
image
Introduction to secure outsourcing computation / Xiaofeng Chen.
Author
Chen, Xiaofeng,
Call Number
QA76.585 .C445 2016,004.6782 23

image
Layout techniques for MOSFETS / Salvador Pinillos Gimenez.
Author
Gimenez, Salvador Pinillos,
Call Number
TK7871.95 .G555 2016,621.3815284 23

image

image
Learning from multiple social networks / Liqiang Nie, Xuemeng Song, and Tat-Seng Chua.
Author
Nie, Liqiang.,
Call Number
HM742 .N545 2016,302.30285 23

image

image

image
Multipath effects in GPS receivers / Steven Miller, Xue Zhang, and Andreas Spanias.
Author
Miller, Steven.,
Call Number
TK6565.D5 M555 2016,621.384191 23

image
Privacy risk analysis / Sourya Joyee De and Daniel Le M�etayer.
Author
De, Sourya Joyee.,
Call Number
BF637.P74 .D46 2016,155.92 23

image

image

image
Research infrastructures for hardware accelerators / Yakun Sophia Shao and David Brooks.
Author
Shao, Yakun Sophia.,
Call Number
TK7895.M5 S427 2016,621.3916 23

image
Resistive random access memory (RRAM) : from devices to array architectures / Shimeng Yu.
Author
Yu, Shimeng.,
Call Number
TK7895.M4 Y87 2016,621.39732 23

image
Scalability challenges in web search engines / B. Barla Cambazoglu. Ricardo Baeza-Yates.
Author
Cambazoglu, B. Barla.,
Call Number
TK5105.884 .C257 2016,005.758 23

image
Scholarly collaboration on the academic social web / Daqing He and Wei Jeng.
Author
He, Daqing.,
Call Number
ZA4228 .H47 2016,001.4202854678 23

image

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles