Explore our comprehensive collection of books, articles, digital media, and more
New leader election algorithms in hypercube networks \
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of a probabilistic flooding algorithm in noisy mobile Ad Hoc networks \
Network routing : algorithms, protocols, and architectures /
Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /
Development and performance analysis of optimal multipoint relaying algorithm for noisy mobile Ad Hoc networks \
Algorithms /
Algorithm design /
Quality of service routing for multimedia multicast over Ad Hoc networks \
Adaptive genetic algorithm for production system \
Computer networks : principles, technologies, and protocols for network design /
Neural networks in a softcomputing framework /
Introduction to algorithms /
Databases for networks and minicomputers /
Quality of Service Routing in Communication Networks : Algorithm and Partitioning Thechniques /
Introduction to the design & analysis of algorithms /
Algorithms and programming : problems and solutions /
Approximation algorithms /
Computer vision : algorithms and applications /
Data structures and algorithms : with object-oriented design patterns in C++ /
An introduction to data structures and algorithms /
Computers and intractability : a guide to the theory of NP-completeness /
Algorithms in C++ /
Data structures and algorithms in Java /
Constraint-handling in evolutionary optimization /
Data structures and algorithm analysis in Java /
Algorithms and computation : 17th international symposium, ISAAC 2006, Kolkata, India, December 18-20, 2006 ; proceedings /
Operating systems theory
Data structures and an introduction to algorithms : lab manual /
Data structures and algorithms in C++ /
An introduction to computer science : an algorithmic approach /
Arabic Handwritten Character Segmentation Using Graph Theory Algorithm /
ARMA model orders and parameters estimation using evolutionary algorithm= تقدير درجة ومعاملات متسلسلات المتوسط المتحرك التدريجي الذاتي باستخدام الخوارزميات المتطورة /
Advanced data mining and applications : second international conference, ADMA 2006, Xi'an, China, August 14-16, 2006 : proceedings /
Library and information networks in the United Kingdom /
Principles of information security /
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Improving software requirements gathering using workshops techniques \
Branch and bound and A* search using fuzzy underestimates \
Branch and Bound and A Search Using Fuzzy Underestimates /
Enhanced secured voice over internet protocol \
Applying object oriented design methodology for e-government web based applications \
Enhancement of IEEE 802.11 maclayer handoff process and protocol \