• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2010

IP Performance over GEO Satellite Networks by Cruickshank, Haitham, Liang, Lei, Sun, Zhili
MIMO-Based Wireless Local Area Networks by Ashtaiwi, Abduladhim
Service Oriented Architecture: An Integration Blueprint by Schmutz, Guido, Welkenbach, Peter, Liebhart, Daniel
A User-Centric Quality of Service Management System by Spenst, Aleksej
Soft Computing Techniques And Applications In Financial Engineering by Jilani, Tahseen
Collaborative Attacks on Manets by Vu, Cong Hoan, Soneye, Adeyinka
Network Security and DDoS by Hayat, Sikandar, Sohail, Imran
Wireless Sensor Networks by Sitanayah, Lanny
Beginning Microsoft Excel 2010 by Katz, Abbott
Fundamentals of EMS, NMS and OSS/BSS by Sathyan, Jithesh
Digitale Hardware/Software-Systeme: Spezifikation Und Verifikation by Haubelt, Christian, Teich, Jürgen
Spectrum Selection, Sensing, and Sharing in Cognitive Radio Networks by Ghosh, Chittabrata, P. Agrawal, Dharma
User-Centered Data Management by Catarci, Tiziana, Dix, Alan, Kimani, Stephen
Structural Failure Models for Fault-Tolerant Distributed Computing by Warns, Timo
Functional Safety and System Security in Building Automation by Novak, Thomas
Geostry by Knoll, Mirko
Video Streaming Optimization in ADSL Architecture by Sadock, Djamel, Fernades, Stenio, Santos, Gustavo
Multicast for IPTV services by Islam, Mohammad Taufiqul, Hoque, Azimul
Message Passing Approaches in Interconnection Networks by Prasath, Rajendra
Multistage Interconnection Networks for Switching Fabric Designs by Law, Eddie
The Dialectical Nature of Control Upon Electronic Networks by King, Rawlson
Neighbor-Aware Control in Ad Hoc Networks by Bao, Lichun, Garcia-Luna-Aceves, J. J.
Performance Evaluation of Telecommunication Networks by Kankaya, Hseyin Emre, Kankaya, Huseyin Emre
The Complete One-Week Preparation for the Cisco Ccent/CCNA Icnd1 Exam 640-822: A Certification Guide Based Over 2000 Sample Questions and Answers with by Al_taiey, Thaar
Proceedings of COOP 2010: Proceedings of the 9th International Conference on Designing Cooperative Systems, May, 18-21, 2010, Aix-En-Provence by
Vulnerability Analysis on the Computer Network Security by Hamid Ali, Firkhan Ali
Balanced Automation Systems for Future Manufacturing Networks: 9th IFIP WG 5.5 International Conference, BASYS 2010, Valencia, Spain, July 21-23, 2010 by
Sctp - A Next Generation Transport Protocol by Rngeler, Irene, Rungeler, Irene
Meta-CLI Configuration Model for Network Device Management by Deca, Rudy
Modeling and Tools for Network Simulation by
Principles and Applications of Distributed Event-Based Systems by
Dynamic Reconfigurable Network-on-Chip Design: Innovations for Computational Processing and Communication by
TCL 8.5 Network Programming by Kocjan, Wojciech, Beltowski, Piotr
Analysis and Synthesis of Computer Systems (2nd Edition) by Gelenbe, Erol, Mitrani, Isi
Next Generation Wireless Systems 2009 - Proceedings by Chilamkurti, Naveen
Wavelength-Exchanging Switching Networks by Hamza, Haitham S.
Serial Communication over RTP/CDP: Use Case of a Control Data Profile for the Real-time Transport Protocol by Breese, Finley
New Network Architectures: The Path to the Future Internet by
Advances in Wireless Sensors and Sensor Networks by
Self Organizing Ad Hoc Grids by Sokolov, Vassiliy
Self-organization of Addresses Protocol by Schmidt, Ricardo, Sadok, Djamel, Gomes, Reinaldo
Location Service Management in Vehicular Ad Hoc Networks by Saleet, Hanan
Mesurer La Securite D'Un Reseau D'Un Operateur de Telecommunications by Llorens, Cedric, Llorens Cedric, Llorens, Cdric
Supervision Et Methodes de Resolution Des Incidents D'Un Reseau by Waha Francis, Waha, Francis
Hackers & Painters: Big Ideas from the Computer Age by Graham, Paul
Gestion Des Ressources Des Reseaux Mobiles Umts, Hsdpa Et Wimax by H. Bouyakhf, E., Ibrahimi, Khalil, El-Azouzi, R.
Enhanced Nms Tool Architecture by Ganji, Naveen, Basa, Srinivas
Distributed Intrusion Detection System in Ad hoc Networks by Umunna, Christian Chetachi
Application Development for IBM Websphere Process Server 7 and Enterprise Service Bus 7 by Ahuja, Salil, Chandrasekaran, Swami
Handoff Performance for Voice over IP in WiMAX Networks by Mendahawi, Nayef
An improvement on maximum residual energy routing of sensor networks by Zhang, Lei
Architecture for IMS Security to Mobile by Chalamalasetty, Kalyani
Optimization of Mobility Network Signaling by Simon, Vilmos
Designing and Implementing a National Research and Education Network by Brink, Sybrand
Adaptive MAC, Routing and Topology Control in Wireless Sensor Networks by Slama, Ines
TCP/IP - The Ultimate Protocol Guide: Complete 2 Volume Set by Miller, Philip M.
Anfragegenerierende Systeme: Anwendungsanalyse, Implementierungs- Und Optimierungskonzepte by Schwarz, Holger
Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Pape by
Peer-to-Peer 3D Streaming by Hu, Shun-Yun
A Low-Cost Platform for Peer-To-Peer Mobile Wireless Networks by Islam, Moinul
Technological Developments in Networking, Education and Automation by
Quality of Service Constrained Unicast Routing by Magld, Khalid
A Framework for Network Software by Latif, Nadir
Underwater Acoustic Sensor Networks Protocol Design by Zhang, Lei
Contemporary Computing: Third International Conference, Ic3 2010, Noida, India, August 9-11, 2010. Proceedings, Part I by
Freeswitch 1.0.6 by Schreiber, Darren, Collins, Michael S., Minessale, Anthony
Contemporary Computing: Third International Conference, Ic3 2010, Noida, India, August 9-11, 2010. Proceedings, Part II by
Web Operations: Keeping the Data on Time by Allspaw, John, Robbins, Jesse
Distributing a Private Key Generator in Ad Hoc Networks by Stenberg, Eystein Mly
Hybrid Learning: Third International Conference, ICHL 2010, Beijing, China, August 16-18, 2010, Proceedings by
Diagrammatic Representation and Inference: 6th International Conference, Diagrams 2010, Portland, Or, Usa, August 9-11, 2010, Proceedings by
Wireless Algorithms, Systems, and Applications: 5th International Conference, WASA 2010, Beijing, China, August 15-17, 2010, Proceedings by
Handbook of Research on Trends in Product Design and Development: Technological and Organizational Perspectives by
Multi-Agent Applications with Evolutionary Computation and Biologically Inspired Technologies: Intelligent Techniques for Ubiquity and Optimization by
Improving Search Performance in Unstructured P2P Networks by M. Thampi, Sabu
Smart Spaces and Next Generation Wired/Wireless Networking: Third Conference on Smart Spaces, ruSMART 2010 and 10th International Conference, NEW2AN 2 by
Fields of Logic and Computation: Essays Dedicated to Yuri Gurevich on the Occasion of His 70th Birthday by
Computational Logic in Multi-Agent Systems: 11th International Workshop, CLIMA XI, Lisbon, Portugal, August 16-17, 2010, Proceedings by
A Hybrid Zone-Based Routing Protocol for Secure Communication in Manet by Ashok Kumar Turuk, Pani, Niroj Kumar, Turuk, Ashok Kumar
Integrating Macs into Windows Networks by Hart-Davis, Guy
Secure Routing in Multi-Hop Wireless Networks by Acs, Gergely
Advances in Social Network Mining and Analysis: Second International Workshop, Snakdd 2008, Las Vegas, Nv, Usa, August 24-27, 2008. Revised Selected P by
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised by
Future Internet--FIS 2009 by
Coordination, Organizations, Institutions, and Norms in Agent Systems V: Coin 2009 International Workshops: Coin@aamas 2009 Budapest, Hungary, May 200 by
Grids and Service-Oriented Architectures for Service Level Agreements by
Cooperative Communications and Networking: Technologies and System Design by Kuo, C. -C Jay, Hong, Y. -W Peter, Huang, Wan-Jen
Computer Network Security by
Data Integration in the Life Sciences by
Entertainment Computing: ICEC 2010 by
Software Architecture by
Knowledge Management and Acquisition for Smart Systems and Services: 11th International Workshop, PKAW 2010, Daegu, Korea, August 20-September 3, 2010 by
Application Layer Proxy to Save Energy in Network Hosts by Jimeno, Miguel
Wireless Network Administration a Beginner's Guide by Soyinka, Wale
Distributed, Parallel and Biologically Inspired Systems by
Elements of Computer Security by Salomon, David
Traffic Engineering with Multiprotocol Label Switching by Aslam, Muhammad Naeem, Aziz, Yassar
Performance Evaluation of Ad Hoc Routing Protocols for Vanets by Khan, Imran
Adaptive Ofdma Frame Structure in Mobile Multi-Hop Relay Networks by Kwon, Bongkyoung
Scheduling and Congestion Control for Wireless and Processing Networks by Jiang, Libin, Walrand, Jean
Top 60 custom solutions built on Microsoft SharePoint Server 2010 by Pentsarskyy, Yaroslav
Electronic Government: 9th IFIP WG 8.5 International Conference, EGOV 2010 Lausanne, Switzerland, August 29 - September 2, 2010 Proceedings by
CONCUR 2010 - Concurrency Theory: 21th International Conference, CONCUR 2010, Paris, France, August 31-September 3, 2010, Proceedings by
Active Media Technology: 6th International Conference, AMT 2010, Toronto, Canada, August 28-30, 2010, Proceedings by
Information, Technology in Bio- And Medical Informatics, Itbam 2010: First International Conference, Bilbao, Spain, September 1-2, 2010, Proceedings by
Data Management in Grid and Peer-To-Peer Systems: Third International Conference, Globe 2010, Bilbao, Spain, September 1-2, 2010, Proceedings by
Data Warehousing and Knowledge Discovery: 12th International Conference, DaWaK 2010, Bilbao, Spain, August/September 2010, Proceedings by
Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings by
Electronic Participation: Second IFIP WG 8.5 International Conference, ePart 2010, Lausanne, Switzerland, August 29-September 2, 2010, Proceedin by
Data Link Layer for Mobile Vehicular Ad Hoc Underwater Networks by Jabba Molinares, Daladier
Artificial Intelligence: Methodology, Systems, and Applications: 14th International Conference, AIMSA 2010, Varna, Bulgaria, September 8-10, 2010, Pro by
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques: 13th International Workshop, Approx 2010, and 14th Internatio by
Global Security, Safety, and Sustainability: 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, Proceedings by
Adding Session and Transaction Management to Web Services by Using Sip by Dong, Wei, Newmarch, Jan
Routing Algorithms in Survivable Telecommunication Networks by Tapolcai, Janos, Tapolcai, Jnos
Communications: Wireless in Developing Countries and Networks of the Future by
Human-Computer Interaction by
Theoretical Computer Science by
Artificial Intelligence in Theory and Practice III by
Enterprise Architecture, Integration and Interoperability by
Wlans Fairness Controlling by Seyedzadegan, Mojtaba, Othman, Mohamed
E-Government, E-Services and Global Processes: Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010, by
What Kind of Information Society?: Governance, Virtuality, Surveillance, Sustainability, Resilience by
Real-Time Video Transmission Protocol for Wireless Sensor Networks by Ayran, Orhan
Network Resource Scheduling and Management by Tanwir, Savera
Energy-Efficient Multicast for Mobile Ad Hoc Networks by Agrawal, Bunty
Reasoning Web: Semantic Technologies for Software Engineering: 6th International Summer School 2010, Dresden, Germany, August 30-September 3, 2010, Tu by
Database Systems for Advanced Applications: 15th International Conference, Dasfaa 2010, International Workshops: Gdm, Benchmarx, McIs, Snsmw, Diew, Ud by
Incentives, Overlays, and Economic Traffic Control: Third International Workshop, Etm 2010, Amsterdam, the Netherlands, September 6, 2010. Proceedings by
Algorithms -- ESA 2010, Part II: 18th Annual European Symposium, Liverpool, Uk, September 6-8, 2010, Proceedings by
Grid-Computing: Eine Basistechnologie Für Computational Science by
Demanding Traffic Control and Management in Next Generation Networks by Alshaer, Hamada
IPSec: A Practical Approach by Sharif, Lukman, Ahmed, Munir
Wireless and Power Line Data Communication by Gope, Tamal, Yadav, Brijesh, Modi, Sahil
Knowledge-Based and Intelligent Information and Engineering Systems: 14th International Conference, Kes 2010, Cardiff, Uk, September 8-10, 2010, Proce by
Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings by
Testing: Academic and Industrial Conference - Practice and Research Techniques: 5th International Conference, Taic Part 2010, Windsor, Uk, September 4 by
Algorithms - ESA 2010: 18th Annual European Symposium, Liverpool, Uk, September 6-8, 2010, Proceedings by
Knowledge-Based and Intelligent Information and Engineering Systems: 14th International Conference, Kes 2010, Cardiff, Uk, September 8-10, 2010, Proce by
Evolvable Systems: From Biology to Hardware: 9th International Conference, Ices 2010, York, Uk, September 6-8, 2010, Proceedings by
Software Product Lines: Going Beyond: 14th International Conference, Splc 2010, Jeju Island, South Korea, September 13-17, 2010. Proceedings by
Network and Parallel Computing: IFIP International Conference, NPC 2010, Zhengzhou, China, September 13-15, 2010, Proceedings by
Computer Networks by Bezanov, Goran
Handbook of Signal Processing Systems by
Database Replication by Patino-Martinez, Marta, Kemme, Bettina, Jimenez-Peris, Ricardo
Relational and XML Data Exchange by Arenas, Marcelo, Barcelo, Pablo, Libkin, Leonid
Trends in Intelligent Robotics: 15th Robot World Cup and Congress, Fira 2010, Bangalore, India, September15-19, 2010, Proceedings by
Knowledge-Based and Intelligent Information and Engineering Systems: 14th International Conference, Kes 2010, Cardiff, Uk, September 8-10, 2010, Proce by
Distributed Computing: 24th International Symposium, Disc 2010, Cambridge, Ma, Usa, September 13-15, 2010, Proceedings by
Agents and Data Mining Interaction: 6th International Workshop on Agents and Data Mining Interaction, ADMI 2010, Toronto, ON, Canada, May 11, 2010, Re by
Sequences and Their Applications - Seta 2010: 6th International Conference, Paris, France, September 13-17, 2010. Proceedings by
Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings by
Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, by
Knowledge-Based and Intelligent Information and Engineering Systems: 14th International Conference, Kes 2010, Cardiff, Uk, September 8-10, 2010, Proce by
Swarm Intelligence: 7th International Conference, ANTS 2010, Brussels, Belgium, September 8-10, 2010, Proceedings by
Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings by
Web Services and Formal Methods: 6th International Workshop, WS-FM 2009, Bologna, Italy, September 4-5, 2009, Revised Selected Papers by
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings by
Towards Flexible Qos Provisioning for Inter-Provider Services by Bertrand, Gilles
Utility Maximization in P2P Systems by Ponec, Miroslav
Multiple Access Communications: Third International Workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010, Proceedings by
Advances in Multimedia Information Processing - PCM 2010: 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 21-24, 2010 Proceeding by
Advances in Multimedia Information Processing - PCM 2010: 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 21-24, 2010, Proceedin by
Geographic Information Science by
Intelligent Virtual Agents: 10th International Conference, Iva 2010, Philadelphia, Pa, Usa. Proceedings by
Programming Multi-Agent Systems: 7th International Workshop, ProMAS 2009, Budapest, Hungary, May 10-15, 2009, Revised Selected Papers by
Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010, Singapore, September 21-24, 2010, Proceedings by
Information and Communication Technologies: International Conference, ICT 2010, Kochi, Kerala, India, September 7-9, 2010, Proceedings by
Thinking of... Force.com as the key to the Cloud Kingdom? Ask the Smart Questions by Misra, Alok, Gotts, Ian
Security Management for Mobile Ad hoc Network of Networks (MANoN) by Al-Bayatti, Ali
Traffic Engineering with Multi-Protocol Label Switching by Aziz, Yassar, Naeem Aslam, Muhammad
Performance Measurement and Improvement of TCP by Islam, MD Shohidul
Advances in Databases and Information Systems: 14th East European Conference, ADBIS 2010, Novi Sad, Serbia, September 20-24, 2010, Proceedings by
Foundational and Practical Aspects of Resource Analysis: First International Workshop, FOPARA 2009, Eindhoven, the Netherlands, November 6, 2010, Revi by
Academia and Industry Linchpin by Ahmed, Munir
Image Compression Using Wavelet Transform by Hossain, Siam Mosharraf, Yeasin Razib, Mohammad, Karim, Imranul
Data Centric Storage in Wireless Sensor Networks: Advanced Techniques by Albano, Michele
Collaboration and Technology: 16th International Conference, Criwg 2010, Maastricht, the Netherlands, September 20-23, 2010, Proceedings by
Future Internet - FIS 2010: Third Future Internet Symposium, Berlin, Germany, September 20-22, 2010, Proceedings by
Trustworthy Global Computing: 5th International Symposium, Tgc 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers by
Computer Performance Engineering: 7th European Performance Engineering Workshop, EPEW 2010, Bertinoro, Italy, September 23-24, 2010, Proceedings by
Data and Video Coexistence Analysis in Dense Wi-Fi Environments by Vora, Varun
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec by
Ultra Wideband by
Network Science: Complexity in Nature and Technology by
Social Media on the Road: The Future of Car Based Computing by Juhlin, Oskar
Enhanced Routing in Wireless Network using Ant Colony Optmization by K. Kotecha, Sharma, Priyanka, Siddarth Khasgiwala
Transactions on Aspect-Oriented Software Development VII: A Common Case Study for Aspect-Oriented Modeling by
Software Services for e-World: 10th Ifip Wg 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2010, Buenos Aires, Argentina, November 3-5 by
Collaborative Networks for a Sustainable World: 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October by
Evolving Towards the Internetworked Enterprise: Technological and Organizational Perspectives by
Wimax Cryptographic Suit Up-Gradation by Mehmood, Rashid, Akram, Muhammad, Riaz, Faisal
Stochastic Network Optimization with Application to Communication and Queueing Systems by Neely, Michael
Wireless Sensor Networks: Deployments and Design Frameworks by
Cracking iPhone and Android Native Development: Cross-Platform Mobile Apps Without the Kludge by Baxter-Reynolds, Matthew
Principles of Transactional Memory by Kapalka, Michael, Guerraoui, Rachid
Information Computing and Applications by
Survivable IP over Optical Transport Networks by Maamoun, Khaled, Mouftah, Hussein
Scalable Uncertainty Management by
Information Computing and Applications: International Conference, ICICA 2010, Tangshan, China, October 15-18, 2010, Proceedings, Part II by
See More