Coverart for item
The Resource Computer networks & communications (Netcom) : proceedings of the fourth International Conference on Networks & Communications, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai, editors, (electronic resource)

Computer networks & communications (Netcom) : proceedings of the fourth International Conference on Networks & Communications, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai, editors, (electronic resource)

Label
Computer networks & communications (Netcom) : proceedings of the fourth International Conference on Networks & Communications
Title
Computer networks & communications (Netcom)
Title remainder
proceedings of the fourth International Conference on Networks & Communications
Statement of responsibility
Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai, editors
Title variation
Computer networks and communications (Netcom)
Creator
Contributor
Subject
Genre
Language
eng
Summary
Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications
Cataloging source
CaPaEBR
LC call number
TK5105.5
LC item number
.I58 2012eb
http://bibfra.me/vocab/lite/meetingDate
2012
http://bibfra.me/vocab/lite/meetingName
International Conference on Networks and Communications
http://library.link/vocab/relatedWorkOrContributorDate
1977-
http://library.link/vocab/relatedWorkOrContributorName
  • Chaki, Nabendu
  • Meghanathan, Natarajan
  • Nagamalai, Dhinaharan
  • ebrary, Inc
Series statement
Lecture notes in electrical engineering,
Series volume
v. 131
http://library.link/vocab/subjectName
  • Computer networks
  • Computer network architectures
  • Computer network protocols
Label
Computer networks & communications (Netcom) : proceedings of the fourth International Conference on Networks & Communications, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai, editors, (electronic resource)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Contents
  • pt. 1. The fourth International Conference on Networks & Communications (NETCOM-2012) : adhoc and sensor networks -- pt. 2. The fourth International Conference on Networks & Communications (NETCOM-2012) : heterogeneous wireless, WLAN and mobile networks -- pt. 3. The fourth International Conference on Networks & Communications (NETCOM-2012) : measurement and performance analysis -- pt. 4. The fourth International Conference on Networks & Communications (NETCOM-2012) : network architecture, protocols and routin0067 -- pt. 5. The fourth International Conference on Networks & Communications (NETCOM-2012) : network operations and management -- pt. 6. The fourth International Conference on Networks & Communications (NETCOM-2012) : network security, trust and privacy -- pt. 7. Workshops : the fourth International Workshop on Networks and Communications Security (NCS 2012) -- pt. 8. Workshops : the fourth International Workshop on Wireless and Mobile Networks (WiMoNe-2012) -- pt. 9. Workshops : fourth Workshop on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (GRAPH-HOC - 2012) -- pt. 10. Workshops : the fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC-2012)
  • pt. 1. The fourth International Conference on Networks & Communications (NETCOM-2012) : adhoc and sensor networks -- pt. 2. The fourth International Conference on Networks & Communications (NETCOM-2012) : heterogeneous wireless, WLAN and mobile networks -- pt. 3. The fourth International Conference on Networks & Communications (NETCOM-2012) : measurement and performance analysis -- pt. 4. The fourth International Conference on Networks & Communications (NETCOM-2012) : network architecture, protocols and routin0067 -- pt. 5. The fourth International Conference on Networks & Communications (NETCOM-2012) : network operations and management -- pt. 6. The fourth International Conference on Networks & Communications (NETCOM-2012) : network security, trust and privacy -- pt. 7. Workshops : the fourth International Workshop on Networks and Communications Security (NCS 2012) -- pt. 8. Workshops : the fourth International Workshop on Wireless and Mobile Networks (WiMoNe-2012) -- pt. 9. Workshops : fourth Workshop on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (GRAPH-HOC - 2012) -- pt. 10. Workshops : the fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC-2012)
  • pt. 1. The fourth International Conference on Networks & Communications (NETCOM-2012) : adhoc and sensor networks -- pt. 2. The fourth International Conference on Networks & Communications (NETCOM-2012) : heterogeneous wireless, WLAN and mobile networks -- pt. 3. The fourth International Conference on Networks & Communications (NETCOM-2012) : measurement and performance analysis -- pt. 4. The fourth International Conference on Networks & Communications (NETCOM-2012) : network architecture, protocols and routin0067 -- pt. 5. The fourth International Conference on Networks & Communications (NETCOM-2012) : network operations and management -- pt. 6. The fourth International Conference on Networks & Communications (NETCOM-2012) : network security, trust and privacy -- pt. 7. Workshops : the fourth International Workshop on Networks and Communications Security (NCS 2012) -- pt. 8. Workshops : the fourth International Workshop on Wireless and Mobile Networks (WiMoNe-2012) -- pt. 9. Workshops : fourth Workshop on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (GRAPH-HOC - 2012) -- pt. 10. Workshops : the fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC-2012)
  • Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network -- A Jini Based Implementation for Best Leader Node Selection in MANETs -- A Novel Methodology for Securing Adhoc Network by Friendly Group Model -- Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks -- A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network -- PSO-PAC: An Intelligent Clustering Mechanism in Ad hoc Network -- SEMSuS: Semantic Middleware For Dynamic Service ?Oriented Sensor Network -- CO2 Gas Sensor Using Resonant Frequency changes in Micro-Cantilever -- Heterogeneous Wireless, WLAN and Mobile Networks -- A mechanism for enhanced performance of Chord DHT in mobile environment -- A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas -- Novel Protection from Internal Attacks in Wireless Sensor Networks -- Channel-Usage Model in Underlay Cognitive Radio Networks -- Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework -- A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area -- Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks -- On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-Path Fading Channel -- Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems -- Measurement and Performance Analysis -- Performance evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network -- Performance Enhancement through Optimization in FPGA Synthesis: Constraint Specific Approach -- Performance Optimization of Vehicular Ad hoc Network (VANET) using Clustering Approach -- Performance Evaluation of TCP Congestion Control variants using Ad Hoc On-Demand Distance Vector Routing -- Performance Analysis of Dynamic Source Routing for Ad-hoc Networks Using Active Packet -- Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models -- Network Architectures, Protocols and Routing Low Power and High Speed Adders in Modified Gated Diffusion Input Technique -- Guided Local Search for Optimal GPON/FTTP Network Design -- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method -- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries -- Comparison of Routing Protocols ? Distance Vector and Fisheye State Routing -- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks -- User Behavior and Capability Based Access Control Model and Architecture -- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks -- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions -- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System -- Network Operations and Management -- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter -- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN -- Hybrid Deployment Schemes for Wireless Sensor Networks -- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties -- Secure Real Time Remote Video Monitoring System -- Fully Self-organized Key Management Scheme in MANET and Its Applications -- A Hierarchical Color Net Model for Smart Grid Security Monitoring -- Chapter 6: Network Security, Trust and Privacy -- A Comprehensive study on Two-factor Authentication with One Time Passwords -- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries -- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography -- PASIC: A Novel Approach for Page-Wise Web Application Security -- Cryptanalysis of Lo et al.?s password based authentication scheme -- Intrusion Detection in Zero Knowledge System Using Model Checking Approach -- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations -- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words -- Secure Cryptosystem with Blind Authentication -- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier -- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain -- The Fourth International Workshop on Network and Communications Security (NCS 2012) -- A Strong Pvss Scheme -- Secure Cosine Similarity Computation with Malicious Adversaries -- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones -- An Efficient Microaggregation Method for Protecting Mixed Data -- Plus/Delta (+/?) Evaluation to Help Organizations Deliver Projects Effectively -- A Secure Routing Protocol for Manets Against Byzantine Attacks -- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol -- NIZKPDS to achieve Non-Repudiation -- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study -- A Secure Image Steganography Technique to Hide Multiple Secret Images -- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities -- Document Library System using RDF based inferences -- The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012) -- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks -- Novel architecture of adaptive and optimized policy based handover in MANET -- Trusted control information in the application of cold chain logistics -- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium -- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane -- Low Complexity Speech Enhancement Algorithm for Improved Perception in Mobile Devices -- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing -- Multimedia Traffic over MANETs: Evaluation and Performance Analysis -- Web Accessibility : Designing and Testing of Web Based Application for Persons with Disabilities -- CBADE - Hybrid Approach for Duplication detection and Elimination -- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC ? 2012) -- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks -- Virtual Classroom for E ? Education in Rural Areas -- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching -- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network -- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012) -- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis -- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database -- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs -- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application -- Message Efficient Ring Leader Election in Distributed Systems -- RAW ? A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers -- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code
Control code
OCM1bookssj0000878658
Dimensions
unknown
Isbn
9781461461548
Isbn Type
(e-book)
Specific material designation
remote
System control number
(WaSeSS)bookssj0000878658
Label
Computer networks & communications (Netcom) : proceedings of the fourth International Conference on Networks & Communications, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai, editors, (electronic resource)
Publication
Bibliography note
Includes bibliographical references and index
Contents
  • pt. 1. The fourth International Conference on Networks & Communications (NETCOM-2012) : adhoc and sensor networks -- pt. 2. The fourth International Conference on Networks & Communications (NETCOM-2012) : heterogeneous wireless, WLAN and mobile networks -- pt. 3. The fourth International Conference on Networks & Communications (NETCOM-2012) : measurement and performance analysis -- pt. 4. The fourth International Conference on Networks & Communications (NETCOM-2012) : network architecture, protocols and routin0067 -- pt. 5. The fourth International Conference on Networks & Communications (NETCOM-2012) : network operations and management -- pt. 6. The fourth International Conference on Networks & Communications (NETCOM-2012) : network security, trust and privacy -- pt. 7. Workshops : the fourth International Workshop on Networks and Communications Security (NCS 2012) -- pt. 8. Workshops : the fourth International Workshop on Wireless and Mobile Networks (WiMoNe-2012) -- pt. 9. Workshops : fourth Workshop on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (GRAPH-HOC - 2012) -- pt. 10. Workshops : the fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC-2012)
  • pt. 1. The fourth International Conference on Networks & Communications (NETCOM-2012) : adhoc and sensor networks -- pt. 2. The fourth International Conference on Networks & Communications (NETCOM-2012) : heterogeneous wireless, WLAN and mobile networks -- pt. 3. The fourth International Conference on Networks & Communications (NETCOM-2012) : measurement and performance analysis -- pt. 4. The fourth International Conference on Networks & Communications (NETCOM-2012) : network architecture, protocols and routin0067 -- pt. 5. The fourth International Conference on Networks & Communications (NETCOM-2012) : network operations and management -- pt. 6. The fourth International Conference on Networks & Communications (NETCOM-2012) : network security, trust and privacy -- pt. 7. Workshops : the fourth International Workshop on Networks and Communications Security (NCS 2012) -- pt. 8. Workshops : the fourth International Workshop on Wireless and Mobile Networks (WiMoNe-2012) -- pt. 9. Workshops : fourth Workshop on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (GRAPH-HOC - 2012) -- pt. 10. Workshops : the fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC-2012)
  • pt. 1. The fourth International Conference on Networks & Communications (NETCOM-2012) : adhoc and sensor networks -- pt. 2. The fourth International Conference on Networks & Communications (NETCOM-2012) : heterogeneous wireless, WLAN and mobile networks -- pt. 3. The fourth International Conference on Networks & Communications (NETCOM-2012) : measurement and performance analysis -- pt. 4. The fourth International Conference on Networks & Communications (NETCOM-2012) : network architecture, protocols and routin0067 -- pt. 5. The fourth International Conference on Networks & Communications (NETCOM-2012) : network operations and management -- pt. 6. The fourth International Conference on Networks & Communications (NETCOM-2012) : network security, trust and privacy -- pt. 7. Workshops : the fourth International Workshop on Networks and Communications Security (NCS 2012) -- pt. 8. Workshops : the fourth International Workshop on Wireless and Mobile Networks (WiMoNe-2012) -- pt. 9. Workshops : fourth Workshop on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (GRAPH-HOC - 2012) -- pt. 10. Workshops : the fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC-2012)
  • Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc Network -- A Jini Based Implementation for Best Leader Node Selection in MANETs -- A Novel Methodology for Securing Adhoc Network by Friendly Group Model -- Energy Efficient Medium Access Protocol for Clustered Wireless Sensor Networks -- A Design Mode of Streaming Media Transmission and Access in Wireless Video Sensor Network -- PSO-PAC: An Intelligent Clustering Mechanism in Ad hoc Network -- SEMSuS: Semantic Middleware For Dynamic Service ?Oriented Sensor Network -- CO2 Gas Sensor Using Resonant Frequency changes in Micro-Cantilever -- Heterogeneous Wireless, WLAN and Mobile Networks -- A mechanism for enhanced performance of Chord DHT in mobile environment -- A Hybrid Model of CLMS and ACLMS Algorithms for Smart Antennas -- Novel Protection from Internal Attacks in Wireless Sensor Networks -- Channel-Usage Model in Underlay Cognitive Radio Networks -- Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework -- A Call Admission Control Scheme for Cellular Network to Handle Sudden Influx in a Confined Area -- Distributed Joint Optimal Network Scheduling and Controller Design for Wireless Networks -- On the Estimation Capacity of Equal Gain Diversity Scheme Under Multi-Path Fading Channel -- Low Overhead Time Coordinated Checkpointing Algorithm for Mobile Distributed Systems -- Measurement and Performance Analysis -- Performance evaluation of TCP NewVegas and TCP Newreno on Burstification in an OBS Network -- Performance Enhancement through Optimization in FPGA Synthesis: Constraint Specific Approach -- Performance Optimization of Vehicular Ad hoc Network (VANET) using Clustering Approach -- Performance Evaluation of TCP Congestion Control variants using Ad Hoc On-Demand Distance Vector Routing -- Performance Analysis of Dynamic Source Routing for Ad-hoc Networks Using Active Packet -- Overhead Analysis of AODV, TORA and AOMDV in MANET Using Various Energy Models -- Network Architectures, Protocols and Routing Low Power and High Speed Adders in Modified Gated Diffusion Input Technique -- Guided Local Search for Optimal GPON/FTTP Network Design -- Image Segmentation Using Variable Kernel Fuzzy C Means (VKFCM) Clustering on Modified Level Set Method -- Comparison of SPIHT, Classical and Adaptive Lifting Scheme for Compression of Satellite Imageries -- Comparison of Routing Protocols ? Distance Vector and Fisheye State Routing -- A Gene Expression Based Quality of Service Aware Routing Protocol for Mobile Adhoc Networks -- User Behavior and Capability Based Access Control Model and Architecture -- Congestion Adaptive Most Favorable Control Routing in Ad Hoc Networks -- An Improved Blind Channel Estimation based on Subspace Approach for OFDM Systems Under Fast Time Varying Conditions -- Adaptive Control and Synchronization Design for the Lu-Xiao Chaotic System -- Network Operations and Management -- Secure Patient Monitoring and Self-management Using Brain Expression Interpreter -- Coverage and Connectivity Guaranteed Deterministic Deployment Pattern for WSN -- Hybrid Deployment Schemes for Wireless Sensor Networks -- Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties -- Secure Real Time Remote Video Monitoring System -- Fully Self-organized Key Management Scheme in MANET and Its Applications -- A Hierarchical Color Net Model for Smart Grid Security Monitoring -- Chapter 6: Network Security, Trust and Privacy -- A Comprehensive study on Two-factor Authentication with One Time Passwords -- ITRANS encoded Marathi Literature Document Relevance Ranking for Natural Language Flexible Queries -- AB-OR: Improving the efficiency in Onion Routing using Attribute Based Cryptography -- PASIC: A Novel Approach for Page-Wise Web Application Security -- Cryptanalysis of Lo et al.?s password based authentication scheme -- Intrusion Detection in Zero Knowledge System Using Model Checking Approach -- Detecting Malicious users in P2P Streaming Systems by Using Feedback Correlations -- An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words -- Secure Cryptosystem with Blind Authentication -- An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier -- A Novel Octuple Images Encryption Algorithm Using Chaos in Wavelet Domain -- The Fourth International Workshop on Network and Communications Security (NCS 2012) -- A Strong Pvss Scheme -- Secure Cosine Similarity Computation with Malicious Adversaries -- Test Suite for Intrusion Detection by Layered Conditional Random Fields Using Mobile Phones -- An Efficient Microaggregation Method for Protecting Mixed Data -- Plus/Delta (+/?) Evaluation to Help Organizations Deliver Projects Effectively -- A Secure Routing Protocol for Manets Against Byzantine Attacks -- Analysis of different Mobility Models for Ad Hoc On-Demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol -- NIZKPDS to achieve Non-Repudiation -- An Integrated Solution for both Monitoring and Controlling for Automization using Wireless Sensor Networks:A Case Study -- A Secure Image Steganography Technique to Hide Multiple Secret Images -- Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities -- Document Library System using RDF based inferences -- The Fourth International workshop on Wireless and Mobile Networks (WiMoNe-2012) -- Spread and Erase: Efficient routing algorithm based on Anti-message Info Relay Hubs for Delay Tolerant Networks -- Novel architecture of adaptive and optimized policy based handover in MANET -- Trusted control information in the application of cold chain logistics -- PHY Layer Considerations for Real Time Multimedia Signal Transmission in Wireless Medium -- Approximate Minimum Spanning Tree for Points moving in a Euclidean Two-Dimensions Plane -- Low Complexity Speech Enhancement Algorithm for Improved Perception in Mobile Devices -- Prolonging the Lifetime of Wireless Sensor Network by Exponential Node Distribution and Ant-colony Optimization Routing -- Multimedia Traffic over MANETs: Evaluation and Performance Analysis -- Web Accessibility : Designing and Testing of Web Based Application for Persons with Disabilities -- CBADE - Hybrid Approach for Duplication detection and Elimination -- Fourth Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC ? 2012) -- Energy Aware Multipath Routing Protocol for Wireless Sensor Networks -- Virtual Classroom for E ? Education in Rural Areas -- Unsupervised Methods On Image Database Using Cluster Mean Average Methods For Image Searching -- Impact of Fix Cluster Head Selection (FCHS) Routing Protocol for Wireless Sensors Network -- The Fourth International Workshop on Ad Hoc and Ubiquitous Computing (AUC- 2012) -- Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis -- Compression of Ecg Signals Using A Novel Discrete Wavelet Transform Algorithm for Dynamic Arrythmia Database -- Performance Analysis of ETX and ETT Routing Metrics over AODV Routing Protocol in WMNs -- Optimized CPU Frequency Scaling on Android Devices Based on Foreground Running Application -- Message Efficient Ring Leader Election in Distributed Systems -- RAW ? A novel Reconfigurable Architecture design using Wireless for future generation Supercomputers -- Interference Management Analysis of Double-ABBA and ABBA Quasi-Orthogonal Space Time Code
Control code
OCM1bookssj0000878658
Dimensions
unknown
Isbn
9781461461548
Isbn Type
(e-book)
Specific material designation
remote
System control number
(WaSeSS)bookssj0000878658

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...