S.No. | Book Name | Action |
1
| A Guide to Design and Analysis of Algorithms-by Soubhik Chakraborty, Prashant Pranav, Naghma Khatoon, Sandip Dutta.pdf | Request to E-Borrow |
2
| Advanced Computer Science Applications. Recent Trends in AI, Machine Learning, and Network Security-by Karan Singh, Latha Banda, Manisha Manjul.pdf | Request to E-Borrow |
3
| Advanced Research in Technologies, Information, Innovation and Sustainability_ Third International Conference, ARTIIS-by Teresa Guarda, Filipe Portela , Jose Maria Diaz-Nafria.pdf | Request to E-Borrow |
4
| Advancements in Interdisciplinary Research-by Vijayan Sugumaran, Divya Upadhyay, Shanu Sharma.pdf | Request to E-Borrow |
5
| Advancements in Smart Computing and Information Security-by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat.pdf | Request to E-Borrow |
6
| Advances in Artificial Intelligence-by Ana Cristina Bicharra Garcia, Mariza Ferro, Julio Cesar Rodríguez Ribón.pdf | Request to E-Borrow |
7
| Advances in Computer Graphics-by Nadia Magnenat-Thalmann, Jian Zhang, Jinman Kim, George Papagiannakis,.pdf | Request to E-Borrow |
8
| Advances in Conceptual Modeling_ ER 2022 Workshops-by Renata Guizzardi, Bernd Neumayr.pdf | Request to E-Borrow |
9
| Advances in Model and Data Engineering in the Digitalization Era-by Philippe Fournier-Viger, Ahmed Hassan, Ladjel Bellatreche, Ahmed Awad,.pdf | Request to E-Borrow |
10
| Advances in Service Oriented and Cloud Computing-by Christian Zirpins, Guadalupe Ortiz, Zoltan Nochta.pdf | Request to E-Borrow |
11
| Algorithms and Architectures for Parallel Processing-by Weizhi Meng, Rongxing Lu, Geyong Min, Jaideep Vaidya.pdf | Request to E-Borrow |
12
| Algorithms and Discrete Applied Mathematics-by Amitabha Bagchi, Rahul Muthu.pdf | Request to E-Borrow |
13
| Algorithms for Big Data_ DFG Priority Program 1736-by Hannah Bast, Claudius Korzen, Ulrich Meyer, Manuel Penschuck.pdf | Request to E-Borrow |
14
| Applied Intelligence and Informatics-by Mufti Mahmud, Cosimo Ieracitano, M. Shamim Kaiser, Nadia Mammone, Francesco Carlo Morabito.pdf | Request to E-Borrow |
15
| Applied Technologies-by Miguel Botto-Tobar, Marcelo Zambrano Vizuete.pdf | Request to E-Borrow |
16
| Artificial General Intelligence_ 15th International Conference, AGI-by Ben Goertzel, Matt Iklé, Alexey Potapov, Denis Ponomaryov.pdf | Request to E-Borrow |
17
| Artificial Intelligence and Natural Language_ 11th Conference, AINL-by Valentin Malykh, Andrey Filchenkov.pdf | Request to E-Borrow |
18
| Artificial Intelligence of things-by Rama Krishna Challa , Gagangeet Singh Aujla.pdf | Request to E-Borrow |
19
| Artificial Life and Evolutionary Computation-by Johannes Josef Schneider, Mathias Sebastian Weyland, Dandolo Flumini, Rudolf Marcel Füchslin.pdf | Request to E-Borrow |
20
| Big Data and Social Computing_ 7th China National Conference, BDSC-by Xiaofeng Meng, Qi Xuan, Yang Yang, Yang Yue, Zi-Ke Zhang.pdf | Request to E-Borrow |
21
| Bioinformatics Research and Applications_ 18th International Symposium, ISBRA-by Mukul S. Bansal, Zhipeng Cai, Serghei Mangul.pdf | Request to E-Borrow |
22
| Biomedical Engineering Systems and Technologies-by Claudine Gehin, Bruno Wacogne, Alexandre Douplik, Ronny Lorenz.pdf | Request to E-Borrow |
23
| Business Data Analytics-by Rajesh Singh, Valentina Emilia Balas, Arpan Kumar Kar, Anita Gehlot, Shahab Shamshirband.pdf | Request to E-Borrow |
24
| Chatbot Research and Design-by Asbjørn Følstad, Theo Araujo, Symeon Papadopoulos.pdf | Request to E-Borrow |
25
| Clinical Image-by Yufei Chen, Marius George Linguraru, Raj Shekhar,.pdf | Request to E-Borrow |
26
| Cloud Computing and Services Science-by Donald Ferguson, Markus Helfert, Claus Pahl.pdf | Request to E-Borrow |
27
| Cognitive Computing – ICCC 2022_ 6th International Conference Held as Part of the Services Conference Federation-by Yujiu Yang, Xiaohui Wang, Liang-Jie Zhang.pdf | Request to E-Borrow |
28
| Computational Theory of Mind for Human-Machine Teams_ First International Symposium-by Nikolos Gurney, Gita Sukthankar.pdf | Request to E-Borrow |
29
| Computer and Information Science-by Roger Lee.pdf | Request to E-Borrow |
30
| Computer Performance Engineering_ 18th European Workshop, EPEW 2022, Santa Pola, Spain, September 21–23, 2022, Proceedings-by Katja Gilly, Nigel Thomas.pdf | Request to E-Borrow |
31
| Computer Science Education_ Perspectives on Teaching and Learning in School-by Sue Sentance, Erik Barendsen, Nicol R. Howard, Carsten Schulte.pdf | Request to E-Borrow |
32
| Computer science to the Point_ Computer Science for Life Sciences Students and Other Non-Computer Scientists-by Boris Tolg.pdf | Request to E-Borrow |
33
| Computing and Combinatorics_ 28th International Conference-by Yong Zhang, Dongjing Miao, Rolf Möhring.pdf | Request to E-Borrow |
34
| Concise Guide to Numerical Algorithmics_ The Foundations and Spirit of Scientific Computing-by John Lawrence Nazareth.pdf | Request to E-Borrow |
35
| Cryptography, Codes and Cyber Security_ First International Conference, I4CS-by Abderrahmane Nitaj, Karim Zkik.pdf | Request to E-Borrow |
36
| Current Trends In Web Engneering-by Giuseppe Agapito, Anna Bernasconi, Cinzia Cappiello, Hasan Ali Khattak.pdf | Request to E-Borrow |
37
| Data Mining and Big Data_ 7th International Conference, DMBD-by Ying Tan, Yuhui Shi.pdf | Request to E-Borrow |
38
| Data Structures and Algorithms with Python_ With an Introduction to Multiprocessing-by Kent D. Lee, Steve Hubbard.pdf | Request to E-Borrow |
39
| Developing Sustainable and Energy-Efficient Software Systems-by Artem Kruglov, Giancarlo Succi.pdf | Request to E-Borrow |
40
| Diabetic Foot Ulcers Grand Challenge_ Third Challenge-by Moi Hoon Yap, Connah Kendrick, Bill Cassidy.pdf | Request to E-Borrow |
41
| Digital Transformation. Core Technologies and Emerging Topics from a Computer Science Perspective-by Birgit Vogel-Heuser, Manuel Wimmer.pdf | Request to E-Borrow |
42
| Discovering Computer Science_ Interdisciplinary Problems, Principles, and Python Programming-by Jessen Havill -.pdf | Request to E-Borrow |
43
| Discovering Computer Science_ Interdisciplinary Problems, Principles, and Python Programming-by Jessen Havill.pdf | Request to E-Borrow |
44
| Distributed Computing and Intelligent Technology-by Anisur Rahaman Molla, Gokarna Sharma, Pradeep Kumar, Sanjay Rawat.pdf | Request to E-Borrow |
45
| Dynamic Logic. New Trends and Applications-by Carlos Areces, Diana Costa.pdf | Request to E-Borrow |
46
| Electronic Governance with Emerging Technologies-by Fernando Ortiz-Rodríguez, Sanju Tiwari, Miguel-Angel Sicilia, Anastasija Nikiforova.pdf | Request to E-Borrow |
47
| Electronic Participation_ 14th IFIP WG 8.5 International Conference-by Robert Krimmer, Marius Rohde Johannessen,.pdf | Request to E-Borrow |
48
| Emerging Information Security and Applications_ Third International Conference, EISA-by Jiageng Chen, Debiao He, Rongxing Lu.pdf | Request to E-Borrow |
49
| Emerging Networking Architecture and Technologies_ First International Conference, ICENAT-by Wei Quan.pdf | Request to E-Borrow |
50
| Enterprise Design, Operations, and Computing _ 27th International Conference-by Henderik A. Proper_ Luise Pufahl_ Dimka Karastoyanova_ Marten van Sinderen_ João Moreira.pdf | Request to E-Borrow |
51
| Explorations in Computing_ An Introduction to Computer Science and Python Programming-by Conery, John S.pdf | Request to E-Borrow |
52
| Explorations in Computing_ An Introduction to Computer Science-by John S. Conery.pdf | Request to E-Borrow |
53
| First Analytics Global Conference, AGC-by Suparna Dhar, Sanjay Goswami,.pdf | Request to E-Borrow |
54
| Formalizing Natural Languages_ Applications to Natural Language Processing and Digital-by Mariana González, Silvia Susana Reyes, Andrea Rodrigo, Max Silberztein.pdf | Request to E-Borrow |
55
| Foundation Mathematics for Computer Science_ A Visual Approach-by John Vince.pdf | Request to E-Borrow |
56
| Frontiers of Algorithmic Wisdom_ International Joint Conference, IJTCS-by Minming Li, Xiaoming Sun.pdf | Request to E-Borrow |
57
| Graph Drawing and Network Visualization-by Patrizio Angelini, Reinhard von Hanxleden.pdf | Request to E-Borrow |
58
| Green, Pervasive, and Cloud Computing-by Chen Yu, Jiehan Zhou, Xianhua Song, Zeguang Lu.pdf | Request to E-Borrow |
59
| Guide to Computer Processor Architecture. A RISC-V Approach, with High-Level Synthesis-by Bernard Goossens.pdf | Request to E-Borrow |
60
| Guide to Java_ A Concise Introduction to Programming-by James T. Streib, Takako Soma.pdf | Request to E-Borrow |
61
| Health Information Processing-by Buzhou Tang, Qingcai Chen, Hongfei Lin, Fei Wu, Liu Lei, Tianyong Hao.pdf | Request to E-Borrow |
62
| Heterogeneous Data Management-by El Kindi Rezig, Vijay Gadepally, Timothy Mattson, Michael Stonebraker.pdf | Request to E-Borrow |
63
| High-Performance Computing Systems and Technologies in Science-by Vladimir Jordan, Ilya Tarasov, Ella Shurina, Nikolay Filimonov, Vladimir Faerman.pdf | Request to E-Borrow |
64
| Human Computer Interaction-by Vanessa Agredo-Delgado, Pablo H. Ruiz, Omar Correa-Madrigal.pdf | Request to E-Borrow |
65
| ICT Innovations 2022. Reshaping the Future Towards a New Normal-by Katerina Zdravkova, Lasko Basnarkov.pdf | Request to E-Borrow |
66
| Image and Vision-by Wei Qi Yan, Minh Nguyen, Martin Stommel.pdf | Request to E-Borrow |
67
| Information and Knowledge Systems-by Manaswini Pradhan, Satchidananda Dehurl.pdf | Request to E-Borrow |
68
| Information Retrieval-by Yi Chang, Xiaofei Zhu.pdf | Request to E-Borrow |
69
| Intelligent Computing and Communication for the Internet of Vehicles-by Mushu Li, Jie Gao, Xuemin (Sherman) Shen, Lian Zhao.pdf | Request to E-Borrow |
70
| Intelligent Networked Things_ 5th China Conference, CINT-by Lin Zhang, Wensheng Yu, Haijun Jiang, Yuanjun Laili.pdf | Request to E-Borrow |
71
| Internet of Things – ICIOT-by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang.pdf | Request to E-Borrow |
72
| Internet of Things_ 5th The Global IoT Summit-by Aurora González-Vidal, Ahmed Mohamed Abdelgawad, Essaid Sabir.pdf | Request to E-Borrow |
73
| Introduction to Compiler Design-by Torben Ægidius Mogensen.pdf | Request to E-Borrow |
74
| Machine Learning and Practical-by Irena Koprinska, Paolo Mignone,.pdf | Request to E-Borrow |
75
| Machine Learning for Cyber Security_ 4th International Conference part 1-by Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li.pdf | Request to E-Borrow |
76
| Machine Learning for Cyber Security_ 4th International Conference part 2-by Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li.pdf | Request to E-Borrow |
77
| Machine Learning for Cyber Security_ 4th International Conference part 3-by Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li.pdf | Request to E-Borrow |
78
| Machine Learning, Image Processing, Network Security-by Nilay Khare, Deepak Singh Tomar.pdf | Request to E-Borrow |
79
| Mastering GNOME_ A Beginner’s Guide-by Sufyan bin Uzayr.pdf | Request to E-Borrow |
80
| Measuring Ontologies for Value Enhancement_ Aligning Computing Productivity with Human Creativity-by Rubina Polovina, Simon Polovina, Neil Kemp.pdf | Request to E-Borrow |
81
| Medical Applications with Disentanglements-by Jana Fragemann, Jianning Li, Xiao Liu.pdf | Request to E-Borrow |
82
| Nordic Artificial Intelligence Research and Development_ 4th Symposium of the Norwegi-by Evi Zouganeli, Anis Yazidi, Gustavo Mello, Pedro Lind.pdf | Request to E-Borrow |
83
| Pattern Recognition Applications and Methods-by Maria De Marsico, Gabriella Sanniti di Baja, Ana Fred.pdf | Request to E-Borrow |
84
| Philosophy through Computer Science_ An Introduction-by Daniel Lim.pdf | Request to E-Borrow |
85
| Principles of Computer Science_ An Invigorating, Hands-on Approach-by Joshua Crotts.pdf | Request to E-Borrow |
86
| Programming-Based Formal Languages and Automata Theory_ Design, Implement, Validate, and Prove (Texts in Computer Science)-by Marco T. Morazán.pdf | Request to E-Borrow |
87
| Representation in Machine Learning-by M. N. Murty, M. Avinash.pdf | Request to E-Borrow |
88
| Robust Latent Feature Learning for Incomplete Big Data-by Di Wu.pdf | Request to E-Borrow |
89
| Science of Cyber Security - SciSec 2022 Workshops_ AI-CryptoSec, TA-BC-NFT, and MathSci-by Chunhua Su, Kouichi Sakurai.pdf | Request to E-Borrow |
90
| Secure IT Systems_ 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings-by Hans P. Reiser, Marcel Kyas.pdf | Request to E-Borrow |
91
| Simple Type Theory - A Practical Logic for Expressing and Reasoning About Mathematical Ideas-by William M. Farmer.pdf | Request to E-Borrow |
92
| Simulating Science Computer Simulations as Scientific Instruments-by Ramón Alvarado.pdf | Request to E-Borrow |
93
| Social Robotics-by Filippo Cavallo, John-John Cabibihan, Laura Fiorini, Alessandra Sorrentino.pdf | Request to E-Borrow |
94
| Statistical Atlases and Computational Models of theHeart-by Oscar Camara, Esther Puyol-Antón.pdf | Request to E-Borrow |
95
| Technology and Innovation in Learning, Teaching-by Arsénio Reis, João Barroso, Paulo Martins.pdf | Request to E-Borrow |
96
| Transactions on Computational Science XXXIX-by Marina L. Gavrilova, C. J. Kenneth Tan.pdf | Request to E-Borrow |
97
| Transactions on Large-Scale Data- and Knowledge-Centered Systems LIII-by Abdelkader Hameurlain, A Min Tjoa.pdf | Request to E-Borrow |
98
| Transactions on Rough Sets XXIII-by James F. Peters, Andrzej Skowron, Rabi Nanda Bhaumik, Sheela Ramanna.pdf | Request to E-Borrow |
99
| Verification, Model Checking, and Abstract Interpretation-by Cezara Dragoi, Michael Emmi, Jingbo Wang.pdf | Request to E-Borrow |
100
| Verified Software. Theories, Tools and Experiments-by Akash Lal, Stefano Tonetta.pdf | Request to E-Borrow |
101
| Web and Big Data_ 6th International Joint Conference, APWeb-by Bohan Li, Lin Yue, Chuanqi Tao, Xuming Han, Diego Calvanese, Toshiyuki Amagasa.pdf | Request to E-Borrow |