Energy Efficient Computation Offloading in Mobile Edge Computing
Ying Chen & Ning Zhang & Yuan Wu & Sherman Shen
10 Steps Every CISO Should Take to Secure Next-Gen Software
Cindy Blake
The Portable Edmund Burke
Edmund Burke
Against Proper Objects. Introduction
Judith P. Butler
Theological Studies Volume 1
Peter S. Ruckman
Mathematics for Physical Science and Engineering: Symbolic Computing ...
Frank E. Harris