• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2012

Context Management for Distributed and Dynamic Context-Aware Computing by Da Rocha, Ricardo Couto Antunes, Endler, Markus
Shirokopolosnye Sistemy Svyazi by Malygin Ivan
Detection and Classification Of Normal and Anomaly IP Packet by Munawar, Saima
Performance Analysis of BICM-ID Based Cooperative Network by Tanoli, Shujaat Ali Khan
Containerterminal-Logistik by Ghanbari, Pejman
Practical SharePoint 2010 Information Architecture by Gotz, Ruven
Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers by
Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers by
The Regularized Fast Hartley Transform: Optimal Formulation of Real-Data Fast Fourier Transform for Silicon-Based Implementation in Resource-Constrain by Jones, Keith
An Energy-Efficient Routing Protocol for Homogeneous WSN by Bathla, Gaurav
Secure Group Communication by Jonnadula, Prathap, Darajula, Naga Mani
Security Protocols for Data Routing in Wireless Sensor Network by Singh, Tejpal
Optimize Bandwidth for Signaling Protocols by Compression Technique by Dixit, Sunanda
Key Management Approach in Wireless Sensor Networks by H, Rachna
Intrusion Detection System using datamining techniques by Puthran, Shubha, Shah, Ketan
Performance Analysis of the CAP-SV Routing Protocol by Yazıcı, Mehmet Akif
Managing the Linux kernel with AgentX by Wellnitz, Oliver
Networking 2012: 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part I by
WDM Optical Multicasting by Yousif, Rabi
Networking 2012: 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part II by
Virtual Knowledge Communities by Trier, Matthias
Internet Retailing by Yan, Ruiliang
Kollaboratives Schreiben by Baatar, Ganchuluun
Instant Messaging and Cross Site Scripting (XSS) by Kurek, Katharina
Kollaboratives Aktivitätenmanagement by Rasche, Torben
Refactoring by Beckmann, Ingrid
Financial Cryptography and Data Security: FC 2011 Workshops, Rlcps and Wecsr, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Pap by
Design and Performance of Multistage Interconnection Networks by Kaur, Lakhwinder, Aggarwal, Rinkle
A Protocol for Multimedia Transmission over Wireless Networks by Yu, Hong
The Network Migration Workbook: Zero Downtime Migration Strategies for Windows Networks 2nd Edition by Palachuk, Karl W., Palachuk, Manuel L.
Scheduling and Flow-Related Problems in Networks by Hall, Alexander
802.11n: A Survival Guide: Wi-Fi Above 100 Mbps by Gast, Matthew
Integration of Wireless Mobile Ad Hoc Networks and the Internet by Khan, Khaleel Ur Rahman
SharePoint Apps with Lightswitch: A QuickStart Guide to Programming Business Applications in VB.NET by Ferrill, Paul
L-Dacs1 by Gräupl, Thomas
Traffic and Congestion Control in ATM Network by H. M. Nerma, Mohamed
Secure communication in p2p networks by Adhoni, Mohammed Azharuddin
Steganography by Asthana, Amit, Singh, Ram Kumar
ERP System for Insurance Broking Company by Maulana, Perkasa Farichin
Analisis de Control de Potencia En Redes Moviles IEEE 802.16e by Munoz Goncen, Margarita, Mu Oz Goncen, Margarita
Wireless Network Security a Beginner's Guide by Wrightson, Tyler
Neural Network-Based Predictive Cost Model for Building Works by Amusan, Lekan
Multimedia Communications, Services and Security: 5th International Conference, MCSS 2012, Krakow, Poland, May 31--June 1, 2012, Proceedings by
Towards an Ideal Electronic cash System by Salama, Mostafa A.
Intelligent Transportation System by Nayyer, Muhammad Ziad
Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments by
Public Key Infrastructures, Services and Applications: 8th European Workshop, Europki 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected P by
Optimisation of AODV for Wireless Sensor Networks by Khalid, Muhammad Ahmed, Chai, Michael
Program Slicing by Schwarz, Hannes
Cloud Computing and Sustainability: Energy Efficiency Aspects by Gholamhosseinian, Ashkan, Khalifeh, Ahmad
Design and Evaluation of Transport Protocols by Schmitz, Ralf
Decentralized Reasoning in Ambient Intelligence by Endler, Markus, Viterbo, José
Data Compression - Exploring New Techniques by Chakraborty, Debashis, Bera, Sandipan, Ghosh, Sutirtha
Zoomable User Interfaces by König, Werner A.
Design of Information Flow for Networked Control Systems by Gupta, Vijay
Channel Estimation for LTE MIMO-OFDM Systems by Omri, Aymen
To Study and Improve the performance of QoS parameters in MANETs by Kapoor, Chandan
Internet Quality of Service Monitoring System by Ta, Xiaoyuan
Performance Evaluation Of Security Algorithms In A Wi-Fi Testbed by Saxena, Kshitiz, Sharma, Juhi
Analysis of Web security attacks: Bangladesh perspective by Chakraborty, Narayan Ranjan
Formal Methods for Computer/Communications Protocols and Software by El-Gendy, Hazem
Adminred Para El Proceso de Conectividad y Seguridad Informatica by Prado Alfaro, Daniel Alexander
Coverage Control in Sensor Networks by Wang, Bang
Java-Based Mobile Agent Systems by Osunade, Seyi
Inferring Hidden Network Properties from Network Measurements by Wei, Wei
Microsoft Sharepoint for Business Executives: Q&A Handbook by Harbridge, Richard, Ward, Peter, Andrushkiw, Pavlo
Sistema de Monitorizacion Ambiental Con Redes Inalambricas de Sensores by Quintanar Villarreal, Jes?'s Francisco, Rodr Guez Henr Quez, Francisco, Quintanar Villarreal, Jesus Francisco
Streaming Media with Peer-to-Peer Networks: Wireless Perspectives by
Cloud Computing Synopsis and Recommendations by Patt-Corner, Robert, Grance, Tim, U. S. Department of Commerce
A Comparative Analysis among Different Routing Protocols with QoS by Rahman, Meftah Ur, Hossain, MD Imran, Neyamat, Sheikh
System Center 2012 Configuration Manager: Mastering the Fundamentals by Agerlund, Kent
Rasshirennyy Yazyk Razmetki XML by Vyazilov Evgeniy
Evolution Towards Cloud by Hasan, Monowar, Ahmed, Sabbir
Checkpoints in Mobile Distributed Systems by Khunteta, Ajay
Process Migration in Grid Computing by Da Rosa Righi, Rodrigo
Data Stream Load Shedding by Ahuja, Amit
Sistemnye Seti S Pryamymi Kanalami Dlya Mnogoprotsessornykh Sistem by Podlazov Viktor, Karavay Mikhail
A Study on Datagram Congestion Control Protocol for Multimedia by Jadoon, Rab Nawaz, Shafi, Jawad
Optimizing energy consumption of wireless access networks by Lorincz, Josip
Computational Science and Its Applications -- Iccsa 2012: 12th International Conference, Salvador de Bahia, Brazil, June 18-21, 2012, Proceedings, Par by
Computational Science and Its Applications -- Iccsa 2012: 12th International Conference, Salvador de Bahia, Brazil, June 18-21, 2012, Proceedings, Par by
Performance Evaluation of Optical Burst Switched Networks by Azodolmolky, Siamak, Tzanakaki, Anna, Tomkos, Ioannis
Energy Effieicnt AOMDV Routing Protocol by Joshi, Hardik, Goswami, Ketan, Suchak, Rajan
A study on ENUM delegation model by Balakrichenan, Sandoche
Comprehensive Model and FWM effect in Optical Fiber by Al Mamun, Shamim
Look Smarter Than You are with Smart View 11.1.2 by McMullen, Tracy, Roske, Edward
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th Ifip Wg 11.2 Intern by
Computational Science and Its Applications -- Iccsa 2012: 12th International Conference, Salvador de Bahia, Brazil, June 18-21, 2012, Proceedings, Par by
Computational Science and Its Applications -- Iccsa 2012: 12th International Conference, Salvador de Bahia, Brazil, June 18-21, 2012, Proceedings, Par by
Pro SharePoint Migration: Moving from Moss 2007 to SharePoint Server 2010 by Malik, Sahil, LLC, Winsmarts, Sistla, Srini
Evaluating Overheads of Integrated Multilevel Checkpointing Algorithms by Gill, Dilbag Singh
Structural Information and Communication Complexity: 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30 - July 2, 2012, Revised by
Power Aware Energy Efficient Routing Protocol by Sharma, Nisha
Gestion de Redes Orientado a la Telematica y Cableado Estructurado by Cortes, Antonio, Cort S., Antonio
Maximizing Energy Efficient Techniques in Wireless Sensor Networks by Manjula, S. H., K. R., Venugopal
Efficient Routing Techniques for Ad Hoc Networks by K. Rajuk, Venugopal, Javarappa, Thriveni
Embedded Systems and Wireless Technology: Theory and Practical Applications by
Digital signal processing receivers for dynamic optical networks by Delgado Mendinueta, José Manuel
Autonomic Diffusion Spray Routing with multiple copies by Ginnu, Manohar
10Gb/s Bang-Bang Takt-und Datenrückgewinnung by Dodel, Norman
Razrabotka SCADA-sistem by Kangin Vladimir
The Cloud Traffic Tribulations- Dangers and Suggested Solutions by Mathur, Mohit
Group Key Agreement for Ad Hoc Networks by Liao, Lijun
Advances in Neural Networks - Isnn 2012: 9th International Symposium on Neural Networks, Isnn 2012, Shenyang, China, July 11-14, 2012. Proceedings, Pa by
OBS Networks by Barradas, Alvaro
Advances in Neural Networks - Isnn 2012: 9th International Symposium on Neural Networks, Isnn 2012, Shenyang, China, July 11-14, 2012. Proceedings, Pa by
Computational Social Networks: Tools, Perspectives and Applications by
Buffering in Video Streaming by Mastoureshgh, Sahel
Progress in Cryptology -- Africacrypt 2012: 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings by
High Level Abstractions for Configuration of Wireless Sensor Networks by Singh, Himanshu
Next Generation Content Delivery Infrastructures: Emerging Paradigms and Technologies by
Developments in Wireless Network Prototyping, Design, and Deployment: Future Generations by
Wireless LAN Security in a SOHO Environment: A Holistic Approach by Wimmer, Christian
Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology (Special Publicati by Souppaya, Murugiah, Scarfone, Karen
Knowledge Grid, The: Toward Cyber-Physical Society (2nd Edition) by Zhuge, Hai
Guide to Reliable Internet Services and Applications by
Interworking of Wireless LANs and Cellular Networks by Song, Wei, Zhuang, Weihua
Combinatorial Optimization: Second International Symposium, Isco 2012, Athens, Greece, 19-21, Revised Selected Papers by
Energy Conservation and Lifetime Prolongation in Sensor Networks by Zhang, Xiaoguang
Dual Stack Mobility by Singh, Chaman
3D Content Transfer by Sequeira, Luís Miguel
Der Hackerbegriff in den Medien: Ein Diskurs by Witte, Randy
Key challenges in Distributed computing by Gill, Dilbag Singh
Congestion Control: Problem and Solution for Wireless Sensor Networks by Bhati, Amit
Architectures of Optical Interconnection Networks by Shacham, Assaf
Privacy Enhancing Technologies: 12th International Symposium, Pets 2012, Vigo, Spain, July 11-13, 2012, Proceedings by
Benutzbarkeit portalbasierter Workflows by Nassiri, Laalak
Advances in Cryptology -- Crypto 2012: 32nd Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2012, Proceedings by
Razrabotka Voip-Shlyuza by Khomskiy Arkadiy, Andrianova Anna, Voronkov Grigoriy
Smart Wireless Sensor Networks by Sharma, Prateek
Secure Data Collection & Critical Data Transmission in Mobile Sink WSN by Puthal, Deepak, Sahoo, Bibhudatta
Secure Routing in Wireless Sensor Networks by Bala, Suman
Network routing and coding in wireless sensor networks by Djouani, Karim, Kurien, Anish, Miao, Lusheng
UMTS versus WLAN und WIMAX by Benkowski, Dimitri
Modelado de Trafico En Series de Tiempo Para Redes de Datos by Salcedo P., Octavio J., Lopez S., Danilo A., Hernandez Suarez, Cesar Augusto
Wireshark Certified Network Analyst Exam Prep Guide (Second Edition) by Chappell, Laura
Self-* and P2P for Network Management: Design Principles and Case Studies by Marquezan, Clarissa Cassales, Granville, Lisandro Zambenedetti
Adapting Multimedia Contents in the Virtual Home Environment by Oliveira, Jos Manuel, Oliveira, Jose Manuel
Webserver Security by Ermolin, Pavel
Routing Algorithms for 3D Ad Hoc Networks by Abdallah, Alaa Eddien
Qualität von Web Services by Rud, Dmytro
Analiz setey abonentskogo dostupa by Sushchenko Sergey, Mikheev Pavel
Congestion Control Scheme for Mobile Communication Network by Oyebisi, Timothy, Aderounmu, Adesola, Ojesanmi, Olusegun
Cryptanalyzing Some Multimedia Encryption Schemes by Li, Chengqing
Broadcast Protocols in Mobile Ad Hoc Networks by Khelil, Abdelmajid
Pro2Expert CCIE R&S lab 4.0 by Chisholm, Greg
Wireless Sensor Networks: Technology and Applications by
Routing Protocols for Mobile Ad Hoc Networks by Lang, Daniel
Development, Testing, Deployment & Operation of Wireless Mesh Networks by Staub, Thomas
Malicious Behavior in Mobile Adhoc Networks by Jaiswal, Anurag Kumar
Distributed Intrusion Detection System by S, Janakiraman
Wireless Sensor Network by Kumari, Parveen
Constrained Shortest Paths and Related Problems by Ziegelmann, Mark
Statistical Modeling Of Multi-polarized MIMO Channels by Talebi, Farzad
Dimensions and challenges in providing QoS for wireless systems by Parimala, Venkata Krishna
Business Processes by Milo, Tova, Deutsch, Daniel
Intelligence in Networks: Ifip Tc6 Wg6.7 Fifth International Conference on Intelligence in Networks (Smartnet '99) November 22-26, 1999, Pathumt by
Network Management and Control by
Using Programmable Logic to Enable Adaptable Networks by Qin, Yixuan, Reed, Martin
Network-Embedded Management and Applications: Understanding Programmable Networking Infrastructure by
Personal Wireless Communications: Ifip Tc6/Wg6.8 Working Conference on Personal Wireless Communications (Pwc'2000), September 14-15, 2000, Gdańsk by
Optimizacion del Plan Basico de Numeracion En La Red de Cantv by Planchart, Franklin
Efficient Hexagonal 2-Coverage By Mobile Sensor Nodes by Santoshi, Ganala, D' Souza, R. J.
Mobile Commerce: Technology, Theory, and Applications by Strader, Troy, Mennecke, Brian E.
Mastering Fiber Optic Network Design: The Essentials by Pearson, Eric R.
Cross Layer Design in Adhoc Networks by Chaturvedi, Anshu
Management-Technologien in der Verkehrstelematik by Stögerer, Christoph
Combinatorial Optimization and Applications: 6th International Conference, Cocoa 2012, Banff, Ab, Canada, August 5-9, 2012, Proceedings by
Taking Turns with Adaptive Cycle Time by Helmy, Ahmed
Getting Started with Citrix Xenapp 6.5 by Musumeci, Guillermo
Control of Discrete-Event Systems: Automata and Petri Net Perspectives by
Optimization of TCP over Wireless Networks by Khan, Mohammad Usman Ali
Multifactor Authentication Protocol for a Secured WSN by Kanagaraj, Marimuthu, Venkatachalam, Eswari
Signal Processing and Information Technology: First International Joint Conference, Spit 2011, Amsterdam, the Netherlands, December 1-2, 2011, Revised by
Dynamic Broadcast Routing With Security Enhancement by V, Anil Kumar, E, Prasad
Cluster Based Secure Key Establishment Protocol for WSN by Rajasekar, Divya
Funcionamiento de Una Red En Protocolo Ipv6 by Santos Jaimes, Luz Marina, Pe Aloza Roja, Sergio, Rico Bautista, Dewar Willmer
Dynamic Bandwidth Allocation Algorithms for Ethernet PON by Peng, Zhiwen
Efficient Watermarking Technique for Quality Loss of Data by Sharma, Chirag
Chaos-based Encryption by Sohail, Shahab Saquib, Ahmad, Musheer
Gays in (Cyber-) Space by Fox, Ragan
Network and Traffic Engineering in Emerging Distributed Computing Applications by
Securing Multi-Media Transmission over Mobile Communications Channels by Elsaid, Shaimaa A.
Cloud Computing Simplified for Small Businesses: Five Steps for Successful Cloud Office Automation by Augustine, Kimberlee, Rasmussen, Roy
Modelo Multivariable de Trafico Para Una Red de Datos Wi-Fi by Salgado F., Lizet Camila, Pedraza M., Luis Fernando, Hernandez Suarez, Cesar Augusto
Security and Cryptography for Networks: 8th International Conference, Scn 2012, Amalfi, Italy, September 5-7, 2012, Proceedings by
Firewalls: Modeling and Management by A. Hassan, Ahmad
Survey on Ad hoc Network Routing Protocols by Ghonge, Mangesh, Bhosle, Amol, Lokulwar, Prasad
Effiziente Datenanalyse in Netzwerkgraphen: Durch User Defined Functions in PostgreSQL by Redmer, Andreas
Key Users in Social Network by Bródka, Piotr
Optimum Bit-by-Bit Power Allocation by Georghiades, Costas N., Karaer, Arzu
Smart Networks: Ifip Tc6 / Wg6.7 Seventh International Conference on Intelligence in Networks (Smartnet 2002) April 8-10, 2002, Saaris by
Even the vehicles can talk using VANETMOBISIM by Dhivya, Shanmugam Bharathy
Swarm Intelligence Based Hole Detection by Jindal, Sunit
Eagle Eye by Kathiresshan, Nandhakumar
TCP Variants over Mobile Adhoc Network by Bisen, Dhananjay
Mastering Fiber Optic Network Design: Presentation Slides by Pearson Cfos, Eric Robert
Certification and Troubleshooting Fiber Optic Networks by Pearson Cfos, Eric R.
Communication Networks by Kadhim, Laith Awda
Monitoring Ethernet Links by Stanica, Roxana
See More