![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
Text mining applications have experienced tremendous advances because of web 2.0 and social networking applications. Recent advances in hardware and software technology have lead to a number of unique scenarios where text mining algorithms are learned. Mining Text Data introduces an important niche in the text analytics field, and is an edited volume contributed by leading international researchers and practitioners focused on social networks & data mining. This book contains a wide swath in topics across social networks & data mining. Each chapter contains a comprehensive survey including the key research content on the topic, and the future directions of research in the field. There is a special focus on Text Embedded with Heterogeneous and Multimedia Data which makes the mining process much more challenging. A number of methods have been designed such as transfer learning and cross-lingual mining for such cases. Mining Text Data simplifies the content, so that advanced-level students, practitioners and researchers in computer science can benefit from this book. Academic and corporate libraries, as well as ACM, IEEE, and Management Science focused on information security, electronic commerce, databases, data mining, machine learning, and statistics are the primary buyers for this reference book.
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.
This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The contributions are based on the results of the FP7 European Project ROMEO, which focuses on new methods for the compression and delivery of 3D multi-view video and spatial audio, as well as the optimization of networking and compression jointly across the future Internet. The delivery of 3D media to individual users remains a highly challenging problem due to the large amount of data involved, diverse network characteristics and user terminal requirements, as well as the user's context such as their preferences and location. As the number of visual views increases, current systems will struggle to meet the demanding requirements in terms of delivery of consistent video quality to fixed and mobile users. ROMEO will present hybrid networking solutions that combine the DVB-T2 and DVB-NGH broadcast access network technologies together with a QoE aware Peer-to-Peer (P2P) distribution system that operates over wired and wireless links. Live streaming 3D media needs to be received by collaborating users at the same time or with imperceptible delay to enable them to watch together while exchanging comments as if they were all in the same location. This book is the last of a series of three annual volumes devoted to the latest results of the FP7 European Project ROMEO. The present volume provides state-of-the-art information on 3D multi-view video, spatial audio networking protocols for 3D media, P2P 3D media streaming, and 3D Media delivery across heterogeneous wireless networks among other topics. Graduate students and professionals in electrical engineering and computer science with an interest in 3D Future Internet Media will find this volume to be essential reading.
Thisvolumecontainstheinvitedandregularpaperspresentedat TCS 2010, the 6thIFIP International Conference on Theoretical Computer Science, organised by IFIP Tech- cal Committee 1 (Foundations of Computer Science) and IFIP WG 2.2 (Formal - scriptions of Programming Concepts) in association with SIGACT and EATCS. TCS 2010 was part of the World Computer Congress held in Brisbane, Australia, during September 20-23, 2010 ( ). TCS 2010 is composed of two main areas: (A) Algorithms, Complexity and Models of Computation, and (B) Logic, Semantics, Speci?cation and Veri?cation. The selection process led to the acceptance of 23 papers out of 39 submissions, eachofwhichwasreviewedbythreeProgrammeCommitteemembers.TheProgramme Committee discussion was held electronically using Easychair. The invited speakers at TCS 2010 are: Rob van Glabbeek (NICTA, Australia) Bart Jacobs (Nijmegen, The Netherlands) Catuscia Palamidessi (INRIA and LIX, Paris, France) Sabina Rossi (Venice, Italy) James Harland (Australia) and Barry Jay (Australia) acted as TCS 2010 Chairs. We take this occasion to thank the members of the Programme Committees and the external reviewers for the professional and timely work; the conference Chairs for their support; the invited speakers for their scholarly contribution; and of course the authors for submitting their work to TCS 2010
This book proposes dynamic wavelength and bandwidth allocation (DWBA), a hybrid of time-division multiplexing (TDM) and wavelength-division multiplexing (WDM), which offers a solution for service providers faced with multiservice networks. It discusses different models, architectures and implementations and evaluates their performance.
Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of 'anytime, anywhere communications'. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based Coordinated Routing Protocol and other Token based group local mutual exclusion Algorithms. The book also covers a chapter on Extended Ad hoc On-Demand Distance Vector (EAODV) routing protocol based on Distributed Minimum Transmission Multicast Routing (DMTMR). One chapter is dedicated to OCDMA and its future application and another chapter covers development of Home Automation System using SWN.
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.
This book highlights the need for an efficient Handover Decision (HD) mechanism to perform switches from one network to another and to provide unified and continuous mobile services that include seamless connectivity and ubiquitous service access. The author shows how the HD involves efficiently combining handover initiation and network selection process. The author describes how the network selection decision is a challenging task that is a central component to making HD for any mobile user in a heterogeneous environment that involves a number of static and dynamic parameters. The author also discusses prevailing technical challenges like Dynamic Spectrum Allocation (DSA) methods, spectrum sensing, cooperative communications, cognitive network architecture protocol design, cognitive network security challenges and dynamic adaptation algorithms for cognitive system and the evolving behavior of systems in general. The book allows the reader to optimize the sensing time for maximizing the spectrum utilization, improve the lifetime of the cognitive radio network (CRN) using active scan spectrum sensing techniques, analyze energy efficiency of CRN, find a secondary user spectrum allocation, perform dynamic handovers, and use efficient data communication in the cognitive networks. Identifies energy efficient spectrum sensing techniques for Cooperative Cognitive Radio Networks (CRN); Shows how to maximize the energy capacity by minimizing the outage probability; Features end-of-chapter summaries, performance measures, and case studies.
With the emergence of cloud computing, traditional approaches to software engineering must be adapted in order to take full advantage of the benefits promised by cloud technologies. This timely and authoritative text/reference presents the latest research on "Software Engineering Frameworks for the Cloud Computing Paradigm," drawn from an international selection of researchers and practitioners. The book offers both a discussion of relevant software engineering approaches and practical guidance on enterprise-wide software deployment in the cloud environment, together with real-world case studies. Topics and features: presents the state of the art in software engineering approaches for developing cloud-suitable applications; discusses the impact of the cloud computing paradigm on software engineering, including the semantic web; offers guidance and best practices for students and practitioners of cloud-based applications architecture; examines the stages of the software development lifecycle, with a focus on the requirements engineering and testing of cloud-based applications; reviews the efficiency and performance of cloud-based applications; explores feature-driven and cloud-aided software design, presenting strategies for cloud adoption and migration; provides relevant theoretical frameworks, practical approaches and current and future research directions. This practical and clearly-structured volume is an ideal self-study primer for students of cloud computing and software engineering. Software engineers, application developers and IT infrastructure managers will also find the work to be an invaluable reference.
The requirement of causality in system theory is inevitably accompanied by the appearance of certain mathematical operations, namely the Riesz proj- tion,theHilberttransform,andthespectralfactorizationmapping.Aclassical exampleillustratingthisisthedeterminationoftheso-calledWiener?lter(the linear, minimum means square error estimation ?lter for stationary stochastic sequences [88]). If the ?lter is not required to be causal, the transfer function of the Wiener ?lter is simply given by H(?)=? (?)/? (?),where ? (?) xy xx xx and ? (?) are certain given functions. However, if one requires that the - xy timation ?lter is causal, the transfer function of the optimal ?lter is given by 1 ? (?) xy H(?)= P ,?? (??,?] . + [? ] (?) [? ] (?) xx + xx? Here [? ] and [? ] represent the so called spectral factors of ? ,and xx + xx? xx P is the so called Riesz projection. Thus, compared to the non-causal ?lter, + two additional operations are necessary for the determination of the causal ?lter, namely the spectral factorization mapping ? ? ([? ] ,[? ] ),and xx xx + xx? the Riesz projection P .
This book constitutes the refereed proceedings of the 2008 IFIP Conference on Wireless Sensors and Actor Networks held in Ottawa, Canada on July 14-15, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
The unprecedented growth in the range of multimedia services offered these days by modern telecommunication systems has been made possible only because of the advancements in signal processing technologies and algorithms. In the area of telecommunications, application of signal processing allows for new generations of systems to achieve performance close to theoretical limits, while in the area of multimedia, signal processing the underlying technology making possible realization of such applications that not so long ago were considered just a science fiction or were not even dreamed about. We all learnt to adopt those achievements very quickly, but often the research enabling their introduction takes many years and a lot of efforts. This book presents a group of invited contributions, some of which have been based on the papers presented at the International Symposium on DSP for Communication Systems held in Coolangatta on the Gold Coast, Australia, in December 2003. Part 1 of the book deals with applications of signal processing to transform what we hear or see to the form that is most suitable for transmission or storage for a future retrieval. The first three chapters in this part are devoted to processing of speech and other audio signals. The next two chapters consider image coding and compression, while the last chapter of this part describes classification of video sequences in the MPEG domain.
"3D Surface Reconstruction: Multi-Scale Hierarchical Approaches "presents methods to model 3D objects in an incremental way so as to capture more finer details at each step. The configuration of the model parameters, the rationale and solutions are described and discussed in detail so the reader has a strong understanding of the methodology. Modeling starts from data captured by 3D digitizers and makes the process even more clear and engaging. Innovative approaches, based on two popular machine learning paradigms, namely Radial Basis Functions and the Support Vector Machines, are also introduced. These paradigms are innovatively extended to a multi-scale incremental structure, based on a hierarchical scheme. The resulting approaches allow readers to achieve high accuracy with limited computational complexity, and makes the approaches appropriate for online, real-time operation. Applications can be found in any domain in which regression is required. "3D Surface Reconstruction: Multi-Scale Hierarchical Approaches" is designed as a secondary text book or reference for advanced-level students and researchers in computer science. This book also targets practitioners working in computer vision or machine learning related fields.
This book presents link-layer cooperative frameworks to improve transmission reliability and network throughput of distributed TDMA MAC protocols in vehicular ad hoc networks (VANETs). The main objective of this book is to present link-layer node cooperation schemes to enhance the link-layer performance of vehicular networks, in terms of reliability and system throughput. The authors present approaches proposed for the medium access control (MAC) and node cooperation in VANETs. The authors also cover cooperative ADHOC MAC for point-to-point communication between a pair of source and destination nodes, and cooperative relay broadcasting for broadcast services in this book. The performance of node cooperation frameworks is evaluated via mathematical analysis and computer simulations, in comparison with distributed TDMA MAC protocols without cooperation. The proposed node cooperation frameworks enhance the performance of distributed TDMA MAC and make it more robust to tackle the dynamic networking conditions in VANETs. Furthermore, with cooperation enabled transmission, the performance of distributed TMDA MAC is more suitable to support the wide range of mobile applications and their strict service requirements which is discussed in this book. The proposed node cooperation schemes and distributed cooperation decisions can be extended to wireless systems other than distributed TDMA MAC, such as cellular communication, for vehicular communications introduced in this book. This book is useful for researchers from academia and industry, as well as advanced level students interested in vehicular communication networks. It is also useful for professionals and engineers developing applications that use cooperative wireless communication systems.
This proceedings volume presents selected papers from the 7th International Conference on Emerging Databases: Technologies, Applications, and Theory (EDB 2017), which was held in Busan, Korea from 7 to 9 August, 2017. This conference series was launched by the Korean Institute of Information Scientists and Engineers (KIISE) Database Society of Korea as an annual forum for exploring novel technologies, applications, and research advances in the field of emerging databases. This forum has evolved into the premier international venue for researchers and practitioners to discuss current research issues, challenges, new technologies, and solutions.
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand
This book investigates new enabling technologies for Fi-Wi convergence. The editors discuss Fi-Wi technologies at the three major network levels involved in the path towards convergence: system level, network architecture level, and network management level. The main topics will be: a. At system level: Radio over Fiber (digitalized vs. analogic, standardization, E-band and beyond) and 5G wireless technologies; b. Network architecture level: NGPON, WDM-PON, BBU Hotelling, Cloud Radio Access Networks (C-RANs), HetNets. c. Network management level: SDN for convergence, Next-generation Point-of-Presence, Wi-Fi LTE Handover, Cooperative MultiPoint.
The emergence of Web technologies for the distribution of an immense amount of data and knowledge has given rise to the need for supportive frameworks for kno- edge management. Semantic Web technologies aim at providing shared semantic spaces for Web contents, such that people, applications and communities can use a common platform to share information. Canadian Semantic Web: Technologies and Applications aims at contributing to the advancement of the Semantic Web by providing the most recent signi?cant - search on Semantic Web theory, techniques and applications in academia, industry and government in Canada and all over the world. It also enlightens possible - mantic Web research directions in future by reporting some works in-progress that presenton-goingresearchonprinciplesandapplicationsoftheSemanticWeb, while their implementation or deployment may have not been completed. This book consists of ten chapters. The chapters are extended versions of a - lected set of papers from the second Canadian Semantic Web Working Symposium (CSWWS 2009) and the twenty-?rst international Conference on Software En- neering and Knowledge Engineering (SEKE 2009). CSWWS 2009 was held in Kelowna, British Columbia in May 2009. Since many of the challenging aspects of the research problems tackled in the Semantic Web area fall in the realm of Ar- ?cial Intelligence or employ of AI techniques, CSWWS 2009 was organized in - nd sociation with the 22 Canadian Conference on Arti?cial Intelligence
Research and development in wireless and mobile networks and services areas have been going on for some time, reaching the stage of products. Graceful evo- tion of networks, new access schemes, flexible protocols, increased variety of services and applications, networks reliability and availability, security, are some of the present and future challenges that have to be met. MWCN (Mobile and Wireless Communications Networks) and PWC (Personal Wireless Communications) are two conferences sponsored by IFIP WG 6.8 that provide forum for discussion between researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and computing. In 2008, MWCN and PWC were held in Toulouse, France, from September 30 to October 2, 2008. MWNC'2008 and PWC'2008 were coupled to form the first edition of IFIP Wireless and Mobile Networking Conference (WMNC'2008). MWCN and PWC topics were revisited in order to make them complementary and covering together the main hot issues in wireless and mobile networks, services, applications, computing, and technologies.
The project of writing this monograph was conceived in August 2006. It is a m- ter of delight and satisfaction that this monograph would be published during the centenary year (May 27, 2008 - May 26, 2009) of our dear alma mater, the Indian Institute of Science, which is truly a magni cent temple and an eternal source of inspiration, with a splendid ambiance for research. Studying the rational behavior of entities interacting with each other in or- nized or ad-hoc marketplaces has been the bread and butter of our research group here at the Electronic Commerce Laboratory, Department of Computer Science and Automation, Indian Institute of Science. Speci cally, the application of game th- retic modeling and mechanism design principles to the area of network economics was an area of special interest to the authors. In fact, the dissertations of the s- ond, third, and fourth authors (Dinesh Garg, Ramasuri Narayanam, and Hastagiri Prakash) were all in this area. Dinesh Garg's Doctoral Thesis, which later won the Best Dissertation Award at the Department of Computer Science and Automation, Indian Institute of Science for the academic year 2006-07, included an interesting chapter on applying the brilliant work of Roger Myerson (Nobel laureate in E- nomic Sciences in 2007) to the topical problem of sponsored search auctions on the web. Ramasuri's Master's work applied mechanism design to develop robust broadcastprotocolsin wireless adhoc networkswhile Hastagiri's Master's work - veloped resource allocation mechanisms for computational grids.
This book addresses the major challenges in realizing unmanned aerial vehicles (UAVs) in IoT-based Smart Cities. The challenges tackled vary from cost and energy efficiency to availability and service quality. The aim of this book is to focus on both the design and implementation aspects of the UAV-based approaches in IoT-enabled smart cities' applications that are enabled and supported by wireless sensor networks, 5G, and beyond. The contributors mainly focus on data delivery approaches and their performability aspects. This book is meant for readers of varying disciplines who are interested in implementing the smart planet/environments vision via wireless/wired enabling technologies. Involves the most up to date unmanned aerial vehicles (UAV) assessment and evaluation approaches Includes innovative operational ideas in agriculture, surveillance, rescue, etc. Pertains researchers, scientists, engineers and practitioners in the field of smart cities, IoT, and communications Fadi Al-Turjman received his Ph.D. from Queen's University, Canada. He is a full professor and a research center director at Near East University, Nicosia. He is a leading authority in the area of IoT and intelligent systems. His publication history spans over 250 publications in addition to his editorialship in top journals such as the IEEE Communication Surveys and Tutorials, and the Elsevier Sustaibable Cities and Society.
The twentieth century ended with the vision of smart dust: a network of wirelessly connected devices whose size would match that of a dust particle, each one a se- containedpackageequippedwithsensing, computation, communication, andpower. Smart dust held the promise to bridge the physical and digital worlds in the most unobtrusive manner, blending together realms that were previously considered well separated. Applications involved scattering hundreds, or even thousands, of smart dust devices to monitor various environmental quantities in scenarios ranging from habitat monitoring to disaster management. The devices were envisioned to se- organize to accomplish their task in the most ef?cient way. As such, smart dust would become a powerful tool, assisting the daily activities of scientists and en- neers in a wide range of disparate disciplines. Wireless sensor networks (WSNs), as we know them today, are the most no- worthy attempt at implementing the smart dust vision. In the last decade, this ?eld has seen a fast-growing investment from both academia and industry. Signi?cant ?nancial resources and manpower have gone into making the smart dust vision a reality through WSNs. Yet, we still cannot claim complete success. At present, only specialist computerscientists or computerengineershave the necessary background to walk the road from conception to a ?nal, deployed, and running WSN syst
"Optical Interconnects in Future Data Center Networks" covers optical networks and how they can be used to provide high bandwidth, energy efficient interconnects for future data centers with increased communication bandwidth requirements. This contributed volume presents an integrated view of the future requirements of the data centers and serves as a reference work for some of the most advanced solutions that have been proposed by major universities and companies. Collecting the most recent and innovative optical interconnects for data center networks that have been presented in the research community by universities and industries, this book is a valuable reference to researchers, students, professors and engineers interested in the domain of high performance interconnects and data center networks. Additionally, "Optical Interconnects in Future Data Center Networks" provides invaluable insights into the benefits and advantages of optical interconnects and how they can be a promising alternative for future data center networks. "
st This volume contains the proceedings of two conferences held as part of the 21 IFIP World Computer Congress in Brisbane, Australia, 20-23 September 2010. th The first part of the book presents the proceedings of DIPES 2010, the 7 IFIP Conference on Distributed and Parallel Embedded Systems. The conference, int- duced in a separate preface by the Chairs, covers a range of topics from specification and design of embedded systems through to dependability and fault tolerance. rd The second part of the book contains the proceedings of BICC 2010, the 3 IFIP Conference on Biologically-Inspired Collaborative Computing. The conference is concerned with emerging techniques from research areas such as organic computing, autonomic computing and self-adaptive systems, where inspiraton for techniques - rives from exhibited behaviour in nature and biology. Such techniques require the use of research developed by the DIPES community in supporting collaboration over multiple systems. We hope that the combination of the two proceedings will add value for the reader and advance our related work.
COLLABORATIVE NETWORKS Becoming a pervasive paradigm In recent years the area of collaborative networks is being consolidated as a new discipline (Camarinha-Matos, Afsarmanesh, 2005) that encompasses and gives more structured support to a large diversity of collaboration forms. In terms of applications, besides the "traditional" sectors represented by the advanced supply chains, virtual enterprises, virtual organizations, virtual teams, and their breading environments, new forms of collaborative structures are emerging in all sectors of the society. Examples can be found in e-government, intelligent transportation systems, collaborative virtual laboratories, agribusiness, elderly care, silver economy, etc. In some cases those developments tend to adopt a terminology that is specific of that domain; often the involved actors in a given domain are not fully aware of the developments in the mainstream research on collaborative networks. For instance, the grid community adopted the term "virtual organization" but focused mainly on the resource sharing perspective, ignoring most of the other aspects involved in collaboration. The European enterprise interoperability community, which was initially focused on the intra-enterprise aspects, is moving towards inter-enterprise collaboration. Collaborative networks are thus becoming a pervasive paradigm giving basis to new socio-organizational structures. |
![]() ![]() You may like...
Smart and Sustainable Collaborative…
Luis M. Camarinha-Matos, Xavier Boucher, …
Hardcover
R6,649
Discovery Miles 66 490
Handbook of Integration of Cloud…
Rajiv Ranjan, Karan Mitra, …
Hardcover
R6,164
Discovery Miles 61 640
Advances in Computing and Network…
Sabu M. Thampi, Erol Gelenbe, …
Hardcover
R8,563
Discovery Miles 85 630
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, …
Hardcover
R2,621
Discovery Miles 26 210
Signals in the Soil - Developments in…
Abdul Salam, Usman Raza
Hardcover
R4,495
Discovery Miles 44 950
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,130
Discovery Miles 41 300
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,891
Discovery Miles 68 910
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, …
Hardcover
R3,422
Discovery Miles 34 220
|