{"id":41,"date":"2023-01-19T05:54:22","date_gmt":"2023-01-19T05:54:22","guid":{"rendered":"http:\/\/greenresearchit.com\/?page_id=41"},"modified":"2023-01-20T10:37:50","modified_gmt":"2023-01-20T05:07:50","slug":"research-zone","status":"publish","type":"page","link":"http:\/\/greenresearchit.com\/index.php\/research-zone\/","title":{"rendered":"Research Zone"},"content":{"rendered":"<hr>\n<p style=\"text-align:justify;\">All research projects are technically sponsored by GRITS. Academicians, Industry Professionals, and Students of Engineering College may contribute to the research project if they are good in Logic, Programming Languages, IT Technologies, Analysis, and Mathematics.<\/p>\n\n<table id=\"tablepress-5\" class=\"tablepress tablepress-id-5\">\n<thead>\n<tr class=\"row-1 odd\">\n\t<th class=\"column-1\">Project Title<\/th><th class=\"column-2\">Research Team<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\">Parametric Container Management Algorithm<\/td><td class=\"column-2\">Nitesh Kumar Jangid<\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\">Suitability of Card-Size Computer to ensure Software and Hardware level security in Enterprise IT System.<\/td><td class=\"column-2\">Nitesh Kumar Jangid<\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\">NoCReachSim: A Simulator to test Packet Reachability under Link Fault  in 2D Mesh NoC. <\/td><td class=\"column-2\">Nitesh Kumar Jangid<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<hr>\n<p style=\"text-align:justify\">The following electronic books are available to trainees and research collaborators of Mr. Nitesh Kumar Jangid for reading in the digital library. Digital copy is not permitted for distribution or print. The trainee and research collaborator are free to make their notes while reading in the digital library.<\/p>\n\n<table id=\"tablepress-6\" class=\"tablepress tablepress-id-6\">\n<thead>\n<tr class=\"row-1 odd\">\n\t<th class=\"column-1\">Category<\/th><th class=\"column-2\">Tag<\/th><th class=\"column-3\">Title<\/th><th class=\"column-4\">Author<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Complier<\/td><td class=\"column-3\"><strong>Engineering a Compiler<\/strong><\/td><td class=\"column-4\">Keith D. Cooper<br \/>\nLinda Torczon<\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Forensic Science<\/td><td class=\"column-3\"><strong>Digital Evidence and<br \/>\nComputer Crime<\/strong><\/td><td class=\"column-4\">Eoghan Casey<\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\">Research Communication<\/td><td class=\"column-2\">Scientific Communication<\/td><td class=\"column-3\"><strong>Scientific Papers and<br \/>\nPresentations<\/strong><\/td><td class=\"column-4\">Martha Davis<br \/>\nKaaron J. Davis<br \/>\nMarion M. Dunagan<\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">MATLAB<\/td><td class=\"column-3\"><strong>MATLAB By Example : <em>Programming Basics<\/em><\/strong><\/td><td class=\"column-4\">Munther Gdeisat and FrancisLilley<\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Computer Graphics<\/td><td class=\"column-3\"><strong>Geometric Tools for<br \/>\nComputer Graphics<\/strong><\/td><td class=\"column-4\">Philip J. Schneider<br \/>\nDavid H. Eberly<\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Human\u2013Computer Interaction<\/td><td class=\"column-3\"><strong>Understanding Mobile<br \/>\nHuman\u2013Computer Interaction<\/strong><\/td><td class=\"column-4\">Steve Love<\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Web Technology<\/td><td class=\"column-3\"><strong>Web<br \/>\nDragons<\/strong><\/td><td class=\"column-4\">Ian H. Witten<br \/>\nMarco Gori<br \/>\nTeresa Numerico<\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Groovy Programming<\/td><td class=\"column-3\"><strong>Groovy Programming : <em>An Introduction for Java Developers<\/em><\/strong><\/td><td class=\"column-4\">Kenneth Barclay<br \/>\nJohn Savage<\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nElectronics Engineering<\/td><td class=\"column-2\">High-Performance Computing<\/td><td class=\"column-3\"><strong>High-Performance Embedded Computing :<br \/>\n<em>Architectures, Applications, and Methodologies<\/em><\/strong><\/td><td class=\"column-4\">Wayne Wolf<\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Computer Networks<\/td><td class=\"column-3\"><strong>Deploying IP and MPLS QOS for Multiservice Networks : <em>Theory and Practice<\/em><\/strong><\/td><td class=\"column-4\">John Evans<br \/>\nClarence Filsfils<\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nElectronics Engineering<\/td><td class=\"column-2\">Embedded System<\/td><td class=\"column-3\"><strong>ARM System Developer\u2019s Guide :  <em>Designing and Optimizing<br \/>\nSystem Software<\/em><\/strong><\/td><td class=\"column-4\">Andrew N. Sloss<br \/>\nDominic Symes<br \/>\nChris Wright<\/td>\n<\/tr>\n<tr class=\"row-13 odd\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nElectronics Engineering<\/td><td class=\"column-2\">Embedded System<\/td><td class=\"column-3\"><strong>Customizable Embedded<br \/>\nProcessors : <em>Design Technologies and Applications<\/em><\/strong><\/td><td class=\"column-4\">Paolo Ienne<br \/>\nRainer Leupers<\/td>\n<\/tr>\n<tr class=\"row-14 even\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nElectronics Engineering<\/td><td class=\"column-2\">Embedded System<\/td><td class=\"column-3\"><strong>Principles and Practices of Interconnection Networks<\/strong><\/td><td class=\"column-4\">William James Dally<br \/>\nBrian Towles<\/td>\n<\/tr>\n<tr class=\"row-15 odd\">\n\t<td class=\"column-1\">Management<\/td><td class=\"column-2\">Security<br \/>\nManagement<\/td><td class=\"column-3\"><strong>Effective Security<br \/>\nManagement<\/strong><\/td><td class=\"column-4\">Charles A. Sennewald<br \/>\nCurtis Baillie<\/td>\n<\/tr>\n<tr class=\"row-16 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Artificial Intelligence<\/td><td class=\"column-3\"><strong>Essentials of Artificial Intelligence<\/strong><\/td><td class=\"column-4\">Matt Ginsberg<\/td>\n<\/tr>\n<tr class=\"row-17 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Artificial<br \/>\nIntelligence<\/td><td class=\"column-3\"><strong>Readings<br \/>\nin<br \/>\nArtificial<br \/>\nIntelligence<\/strong><\/td><td class=\"column-4\">Bonnie Lynn Webber<br \/>\nNils J. Nilsson<\/td>\n<\/tr>\n<tr class=\"row-18 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Web Technology<\/td><td class=\"column-3\"><strong>Web Application<br \/>\nDesign Handbook :<br \/>\n<em>Best Practices for Web-Based Software<\/em><\/strong><\/td><td class=\"column-4\">Susan Fowler<br \/>\nVictor Stanwick<\/td>\n<\/tr>\n<tr class=\"row-19 odd\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nElectronics Engineering<\/td><td class=\"column-2\">Embedded System<\/td><td class=\"column-3\"><strong>System-Level Design with Rosetta<\/strong><\/td><td class=\"column-4\">Perry Alexander<\/td>\n<\/tr>\n<tr class=\"row-20 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Network Security<\/td><td class=\"column-3\"><strong>Botnets : The Killer Web App<\/strong><\/td><td class=\"column-4\">Craig A. Schiller<br \/>\nJim Binkley<br \/>\nDavid Harley<br \/>\nGadi Evron<br \/>\nTony Bradley<br \/>\nCarsten Willems<br \/>\nMichael Cross<\/td>\n<\/tr>\n<tr class=\"row-21 odd\">\n\t<td class=\"column-1\">Social<\/td><td class=\"column-2\">Mobile Technology<\/td><td class=\"column-3\"><strong>The Mobile Connection : T<em>he Cell Phone\u2019s Impact on Society<\/em><\/strong><\/td><td class=\"column-4\">Rich Ling<\/td>\n<\/tr>\n<tr class=\"row-22 even\">\n\t<td class=\"column-1\">Communication Engineering<\/td><td class=\"column-2\">Wireless Technology<\/td><td class=\"column-3\"><strong>Wireless Communications and Networking<\/strong><\/td><td class=\"column-4\">Vijay K. Garg<\/td>\n<\/tr>\n<tr class=\"row-23 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Geometric Algebra<\/td><td class=\"column-3\"><strong>Geometric Algebra for Computer Science : <em>An Object-oriented Approach to Geometry<\/em><\/strong><\/td><td class=\"column-4\">Leo Dorst<br \/>\nDaniel Fontijne Stephen Mann<\/td>\n<\/tr>\n<tr class=\"row-24 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Artificial Intelligence<\/td><td class=\"column-3\"><strong>Computational Intelligence : <em>Concepts to Implementations<\/em><\/strong><\/td><td class=\"column-4\">Russell C. Eberhart<br \/>\nYuhui Shi<\/td>\n<\/tr>\n<tr class=\"row-25 odd\">\n\t<td class=\"column-1\">Electronics Engineering<\/td><td class=\"column-2\">Embedded System<\/td><td class=\"column-3\"><strong>Reconfigurable Computing : <em>The Theory and Practice of FPGA-Based Computation<\/em><\/strong><\/td><td class=\"column-4\">Scott Hauck <br \/>\nAndr e  \u0301 DeHon<\/td>\n<\/tr>\n<tr class=\"row-26 even\">\n\t<td class=\"column-1\">Electronics Engineering<\/td><td class=\"column-2\">Embedded System<\/td><td class=\"column-3\"><strong>System-on-Chip Test Architectures : <em>Nanometer Design for Testability<\/em><\/strong><\/td><td class=\"column-4\">Laung-Terng Wang<br \/>\nCharles E. Stroud<br \/>\nNur A. Touba<\/td>\n<\/tr>\n<tr class=\"row-27 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">System Engineering<\/td><td class=\"column-3\"><strong>Systems Engineering with SysML\/UML : Modeling, Analysis, Design<\/strong><\/td><td class=\"column-4\">Tim Weilkiens<\/td>\n<\/tr>\n<tr class=\"row-28 even\">\n\t<td class=\"column-1\">Electronics Engineering<\/td><td class=\"column-2\">Embedded System<\/td><td class=\"column-3\"><strong>Processor Description Languages : <em>Applications and Methodologies<\/em><\/strong><\/td><td class=\"column-4\">Prabhat Mishra<br \/>\nNikil Dutt<\/td>\n<\/tr>\n<tr class=\"row-29 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Information Security<\/td><td class=\"column-3\"><strong>AVIEN Malware Defense Guide for the Enterprise<\/strong><\/td><td class=\"column-4\">David Harley<\/td>\n<\/tr>\n<tr class=\"row-30 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Network Security<\/td><td class=\"column-3\"><strong>Network Security : <em>Know It All<\/em><\/strong><\/td><td class=\"column-4\">James Joshi <br \/>\nJames D. McCabe<br \/>\nSaurabh Bagchi<br \/>\nLionel M. Ni<br \/>\nBruce S. Davie <br \/>\nLarry L. Peterson<br \/>\nAdrian Farrel <br \/>\nRajiv Ramaswami<br \/>\nBingrui Foo <br \/>\nKumar N. Sivarajan<br \/>\nVijay K. Garg <br \/>\nEugene H. Spafford<br \/>\nMatthew W. Glause George Varghese<br \/>\nGaspar Modelo-Howard Yu-Sung Wu<br \/>\nPrashant Krishnamurthy Pei Zheng<br \/>\nPete Loshin<\/td>\n<\/tr>\n<tr class=\"row-31 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Information Security<\/td><td class=\"column-3\"><strong>Next Generation SSH2 Implementation : <em>Securing Data in Motion<\/em><\/strong><\/td><td class=\"column-4\">Dale Liu<\/td>\n<\/tr>\n<tr class=\"row-32 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Computer Networks<\/td><td class=\"column-3\"><strong>P2P Networking and Applications<\/strong><\/td><td class=\"column-4\">John F. Buford<br \/>\nHeather Yu<br \/>\nEng Keong Lua<\/td>\n<\/tr>\n<tr class=\"row-33 odd\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nElectronics Engineering<\/td><td class=\"column-2\">Embedded Systems<\/td><td class=\"column-3\"><strong>Embedded Systems Design with Platform FPGAs : <em>Principles and Practices<\/em><\/strong><\/td><td class=\"column-4\">Ron Sass<br \/>\nAndrew G. Schmidt<\/td>\n<\/tr>\n<tr class=\"row-34 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Computer Networks<\/td><td class=\"column-3\"><strong>Broadband Cable Access Networks : <em>The HFC Plant<\/em><\/strong><\/td><td class=\"column-4\">David Large<br \/>\nJames Farmer<\/td>\n<\/tr>\n<tr class=\"row-35 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Networked Graphics<\/td><td class=\"column-3\"><strong>Networked Graphics : <em>Building Networked Games and Virtual Environments<\/em><\/strong><\/td><td class=\"column-4\">Anthony Steed<br \/>\nManuel Fradinho Oliveira<\/td>\n<\/tr>\n<tr class=\"row-36 even\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nElectronics Engineering<\/td><td class=\"column-2\">Embedded Systems<\/td><td class=\"column-3\"><strong>Low-Power Design of Nanometer FPGAs : <em>Architecture and EDA<\/em><\/strong><\/td><td class=\"column-4\">Hassan Hassan<br \/>\nMohab Anis<\/td>\n<\/tr>\n<tr class=\"row-37 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Computer Networks<\/td><td class=\"column-3\"><strong>Architecture of Network Systems<\/strong><\/td><td class=\"column-4\">Dimitrios Serpanos<br \/>\nTilman Wolf<\/td>\n<\/tr>\n<tr class=\"row-38 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Mobile Malware<\/td><td class=\"column-3\"><strong>Mobile Malware Attacks and Defense<\/strong><\/td><td class=\"column-4\">Ken Dunham<\/td>\n<\/tr>\n<tr class=\"row-39 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Computer System<\/td><td class=\"column-3\"><strong>Principles of Computer System Design :  <em>An Introduction<\/em><\/strong><\/td><td class=\"column-4\">Jerome H. Saltzer<br \/>\nM. Frans Kaashoek<\/td>\n<\/tr>\n<tr class=\"row-40 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Data Mining<\/td><td class=\"column-3\"><strong>Data Mining : <em>Concepts and Techniques<\/em><\/strong><\/td><td class=\"column-4\">Jiawei Han<br \/>\nMicheline Kamber<br \/>\nJian Pei<\/td>\n<\/tr>\n<tr class=\"row-41 odd\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nElectronics Engineering<\/td><td class=\"column-2\">Computer Architecture<\/td><td class=\"column-3\"><strong>Computer Architecture : <em>A Quantitative Approach<\/em><\/strong><\/td><td class=\"column-4\">John L. Hennessy<br \/>\nDavid A. Patterson<\/td>\n<\/tr>\n<tr class=\"row-42 even\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nCommunication Engineering<\/td><td class=\"column-2\">Computer Networks<\/td><td class=\"column-3\"><strong>Deploying Next Generation Multicast-Enabled Applications : <em>Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet<\/em><\/strong><\/td><td class=\"column-4\">Vinod Joseph<br \/>\nSrinivas Mulugu<\/td>\n<\/tr>\n<tr class=\"row-43 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Programming Language<\/td><td class=\"column-3\"><strong>API Design for C ++<\/strong><\/td><td class=\"column-4\">Martin Reddy<\/td>\n<\/tr>\n<tr class=\"row-44 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Web Technology<\/td><td class=\"column-3\"><strong>Letting Go of the Words : <em>Writing Web Content that Works<\/em><\/strong><\/td><td class=\"column-4\">Janice (Ginny) Redish<\/td>\n<\/tr>\n<tr class=\"row-45 odd\">\n\t<td class=\"column-1\">Research Communication<\/td><td class=\"column-2\">Scientific Communication<\/td><td class=\"column-3\"><strong>Designing Science Presentations : <em>A Visual Guide to Figures, Papers, Slides, Posters, and More<\/em><\/strong><\/td><td class=\"column-4\">Matt Carter<\/td>\n<\/tr>\n<tr class=\"row-46 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">High Performance Computing<\/td><td class=\"column-3\"><strong>CUDA Application Design and Development<\/strong><\/td><td class=\"column-4\">Rob Farber<\/td>\n<\/tr>\n<tr class=\"row-47 odd\">\n\t<td class=\"column-1\">Management<\/td><td class=\"column-2\">IT Management<\/td><td class=\"column-3\"><strong>IT Manager\u2019s Handbook : <em>Getting Your New Job Done<\/em><\/strong><\/td><td class=\"column-4\">Bill Holtsnider<br \/>\nBrian D. Jaffe<\/td>\n<\/tr>\n<tr class=\"row-48 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Software Engineering<\/td><td class=\"column-3\"><strong>Agile User Experience Design : <em>A Practitioner\u2019s Guide to<br \/>\nMaking It Work<\/em><\/strong><\/td><td class=\"column-4\">Diana DeMarco Brown<\/td>\n<\/tr>\n<tr class=\"row-49 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">High Performance Computing<\/td><td class=\"column-3\"><strong>Programming Massively Parallel Processors : A Hands-on Approach<\/strong><\/td><td class=\"column-4\">David B. Kirk<br \/>\nWen-mei W. Hwu<\/td>\n<\/tr>\n<tr class=\"row-50 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">High Performance Computing<\/td><td class=\"column-3\"><strong>Structured Parallel Programming : <em>Patterns for Efficient Computation<\/em><\/strong><\/td><td class=\"column-4\">Michael McCool<br \/>\nArch D. Robison<br \/>\nJames Reinders<\/td>\n<\/tr>\n<tr class=\"row-51 odd\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nElectronics Engineering<\/td><td class=\"column-2\">Embedded System<\/td><td class=\"column-3\"><strong>Modern Embedded Computing : <em>Designing Connected, Pervasive, Media-Rich Systems<\/em><\/strong><\/td><td class=\"column-4\">Peter Barry<br \/>\nPatrick Crowley<\/td>\n<\/tr>\n<tr class=\"row-52 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Information Security<\/td><td class=\"column-3\"><strong>Computer and Information Security Handbook<\/strong><\/td><td class=\"column-4\">John R. Vacca<\/td>\n<\/tr>\n<tr class=\"row-53 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">MATLAB<\/td><td class=\"column-3\"><strong>Essential MATLAB for Engineers and Scientists<\/strong><\/td><td class=\"column-4\">Brian H. Hahn<br \/>\nDaniel T. Valentine<\/td>\n<\/tr>\n<tr class=\"row-54 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Cloud Computing<\/td><td class=\"column-3\"><strong>Temporal QoS Management in Scientific Cloud Workflow Systems<\/strong><\/td><td class=\"column-4\">Xiao Liu<br \/>\nYun Yang<br \/>\nJinjun Chen<\/td>\n<\/tr>\n<tr class=\"row-55 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">High Performance Computing<\/td><td class=\"column-3\"><strong>The Art of Multiprocessor Programming<\/strong><\/td><td class=\"column-4\">Maurice Herlihy<br \/>\nNir Shavit<\/td>\n<\/tr>\n<tr class=\"row-56 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Data Mining<\/td><td class=\"column-3\"><strong>Implementing Analytics : <em>A Blueprint for Design, Development, and Adoption<\/em><\/strong><\/td><td class=\"column-4\">Nauman Sheikh<\/td>\n<\/tr>\n<tr class=\"row-57 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Artificial Intelligence<\/td><td class=\"column-3\"><strong>Plan, Activity, and Intent Recognition : <em>Theory and Practice<\/em><\/strong><\/td><td class=\"column-4\">Gita Sukthankar<br \/>\nRobert P. Goldman<br \/>\nChristopher Geib<br \/>\nDavid V. Pynadath<br \/>\nHung Hai Bui<\/td>\n<\/tr>\n<tr class=\"row-58 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Web Analytics<\/td><td class=\"column-3\"><strong>Practical Web Analytics for User Experience : <em>How Analytics Can Help You Understand Your Users<\/em><\/strong><\/td><td class=\"column-4\">Michael Beasley<\/td>\n<\/tr>\n<tr class=\"row-59 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Big Data Processing<\/td><td class=\"column-3\"><strong>Principles of Big Data: <em>Preparing, Sharing, and Analyzing Complex Information<\/em><\/strong><\/td><td class=\"column-4\">Jules J. Berman<\/td>\n<\/tr>\n<tr class=\"row-60 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Distributed Computing <\/td><td class=\"column-3\"><strong>Distributed Computing Through Combinatorial Topology<\/strong><\/td><td class=\"column-4\">Maurice Herlihy<br \/>\nDmitry Kozlov<br \/>\nSergio Rajsbaum<\/td>\n<\/tr>\n<tr class=\"row-61 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Heterogeneous<br \/>\nComputing and OpenCL<\/td><td class=\"column-3\"><strong>Heterogeneous Computing with OpenCL<\/strong><\/td><td class=\"column-4\">Benedict R. Gaster<br \/>\nLee Howes<br \/>\nDavid R. Kaeli<br \/>\nPerhaad Mistry<br \/>\nDana Schaa<\/td>\n<\/tr>\n<tr class=\"row-62 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Cloud Computing<\/td><td class=\"column-3\"><strong>The Basics of Cloud Computing : <em>Understanding the Fundamentals<br \/>\nof Cloud Computing in Theory and Practice<\/em><\/strong><\/td><td class=\"column-4\">Derrick Rountree<br \/>\nIleana Castrillo<\/td>\n<\/tr>\n<tr class=\"row-63 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Web Analytics<\/td><td class=\"column-3\"><strong>Analyzing the Social Web<\/strong><\/td><td class=\"column-4\">Jennifer Golbeck<\/td>\n<\/tr>\n<tr class=\"row-64 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Search Engines<\/td><td class=\"column-3\"><strong>Relevance Ranking for Vertical Search Engines<\/strong><\/td><td class=\"column-4\">Bo Long<br \/>\nYi Chang<\/td>\n<\/tr>\n<tr class=\"row-65 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">NoSQL Database<\/td><td class=\"column-3\"><strong>Complete Guide To NoSQL : <em>What Every SQL Professional Needs To Know About Nonrelational Databases<\/em><\/strong><\/td><td class=\"column-4\">Joe Celko<\/td>\n<\/tr>\n<tr class=\"row-66 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Software Engineering<\/td><td class=\"column-3\"><strong>Software Engineering : <em>Architecture-Driven Software Development<\/em><\/strong><\/td><td class=\"column-4\">Richard F. Schmidt<\/td>\n<\/tr>\n<tr class=\"row-67 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Cloud Computing<\/td><td class=\"column-3\"><strong>Computation and Storage in the Cloud : <em>Understanding the Trade-Offs<\/em><\/strong><\/td><td class=\"column-4\">Dong Yuan<br \/>\nYun Yang<br \/>\nJinjun Chen<\/td>\n<\/tr>\n<tr class=\"row-68 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Image Processing<\/td><td class=\"column-3\"><strong>High-Performance Deformable Image Registration Algorithms for Manycore Processors<\/strong><\/td><td class=\"column-4\">James Shackleford<br \/>\nNagarajan Kandasamy<br \/>\nGregory Sharp<\/td>\n<\/tr>\n<tr class=\"row-69 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">MATLAB<br \/>\nGPU Computing<\/td><td class=\"column-3\"><strong>Accelerating MATLAB with GPU Computing : <em>A Primer with Examples<\/em><\/strong><\/td><td class=\"column-4\">Jung W. Suh<br \/>\nYoungmin Kim<\/td>\n<\/tr>\n<tr class=\"row-70 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Cloud Computing<\/td><td class=\"column-3\"><strong>Mastering Cloud Computing : <em>Foundations and Applications<br \/>\nProgramming<\/em><\/strong><\/td><td class=\"column-4\">Rajkumar Buyya<br \/>\nChristian Vecchiola<br \/>\nS. Thamarai Selvi<\/td>\n<\/tr>\n<tr class=\"row-71 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Hacking and Penetration Testing<\/td><td class=\"column-3\"><strong>The Basics of Hacking and Penetration Testing : <em>Ethical Hacking and Penetration Testing Made Easy<\/em><\/strong><\/td><td class=\"column-4\">Patrick Engebretson<\/td>\n<\/tr>\n<tr class=\"row-72 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Business Intelligence<\/td><td class=\"column-3\"><strong>Using Open Source Platforms for Business Intelligence :<br \/>\n <em>Avoid Pitfalls and Maximize ROI<\/em><\/strong><\/td><td class=\"column-4\">Lyndsay Wise<\/td>\n<\/tr>\n<tr class=\"row-73 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Data Mining<\/td><td class=\"column-3\"><strong>Commercial Data Mining : <em>Processing, Analysis and Modeling for Predictive Analytics Projects<\/em><\/strong><\/td><td class=\"column-4\">David Nettleton<\/td>\n<\/tr>\n<tr class=\"row-74 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Web Hacking<\/td><td class=\"column-3\"><strong>The Basics of Web Hacking : <em>Tools and Techniques to Attack the Web<\/em><\/strong><\/td><td class=\"column-4\">Josh Pauli<\/td>\n<\/tr>\n<tr class=\"row-75 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Intelligent Networks<\/td><td class=\"column-3\"><strong>Intelligent Networks: <em>Recent Approaches and Applications in Medical Systems<\/em><\/strong><\/td><td class=\"column-4\">Syed V. Ahamed<\/td>\n<\/tr>\n<tr class=\"row-76 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Software Defined Networks<\/td><td class=\"column-3\"><strong>Software Defined Networks : <em>A Comprehensive Approach<\/em><\/strong><\/td><td class=\"column-4\">Paul G\u00f6ransson<br \/>\nChuck Black<\/td>\n<\/tr>\n<tr class=\"row-77 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Nature-Inspired Optimization Algorithms<\/td><td class=\"column-3\"><strong>Nature-Inspired Optimization Algorithms<\/strong><\/td><td class=\"column-4\">Xin-She Yang<\/td>\n<\/tr>\n<tr class=\"row-78 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">CUDA <br \/>\nFortran Programming<br \/>\nHigh Performance Computing<\/td><td class=\"column-3\"><strong>CUDA Fortran for Scientists and Engineers : <em>Best Practices for Efficient CUDA Fortran Programming<\/em><\/strong><\/td><td class=\"column-4\">Gregory Ruetsch Massimiliano Fatica<\/td>\n<\/tr>\n<tr class=\"row-79 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">GPU Programming<br \/>\nHigh Performance Computing<\/td><td class=\"column-3\"><strong>Multicore and GPU Programming : <em>An Integrated Approach<\/em><\/strong><\/td><td class=\"column-4\">Gerassimos Barlas<\/td>\n<\/tr>\n<tr class=\"row-80 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Object-Oriented Analysis and Design <\/td><td class=\"column-3\"><strong>Object-Oriented Analysis and Design for Information Systems : <em>Modeling with UML, OCL, and IFML<\/em><\/strong><\/td><td class=\"column-4\">Raul Sidnei Wazlawick<\/td>\n<\/tr>\n<tr class=\"row-81 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Big Data Analytics<\/td><td class=\"column-3\"><strong>Big Data Analytics : <em>From Strategic Planning to Enterprise Integration with Tools, Techniques, NoSQL, and Graph<\/em><\/strong><\/td><td class=\"column-4\">David Loshin<\/td>\n<\/tr>\n<tr class=\"row-82 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Distributed and Cloud Computing<\/td><td class=\"column-3\"><strong>Distributed and Cloud Computing : <em>From Parallel Processing to the Internet of Things<\/em><\/strong><\/td><td class=\"column-4\">Kai Hwang<br \/>\nGeoffrey C. Fox<br \/>\nJack J. Dongarra<\/td>\n<\/tr>\n<tr class=\"row-83 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">VLSI Design<\/td><td class=\"column-3\"><strong>Top-Down Digital VLSI Design : <em>From Architectures <strong>to Gate-Level Circuits and FPGAs<\/em><\/strong><\/td><td class=\"column-4\">Hubert Kaeslin<\/td>\n<\/tr>\n<tr class=\"row-84 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Web Technology<\/td><td class=\"column-3\"><strong>Bridging UX and Web Development : <em>Better Results through Team Integration<\/em><\/strong><\/td><td class=\"column-4\">Jack Moffett<\/td>\n<\/tr>\n<tr class=\"row-85 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Cloud Networking<\/td><td class=\"column-3\"><strong>Cloud Networking : <em>Understanding Cloud-based Data Center Networks<\/em><\/strong><\/td><td class=\"column-4\">Gary Lee<\/td>\n<\/tr>\n<tr class=\"row-86 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Artificial Intelligence<\/td><td class=\"column-3\"><strong>Commonsense Reasoning : <em>An Event Calculus Based Approach<\/em><\/strong><\/td><td class=\"column-4\">Erik T. Mueller<\/td>\n<\/tr>\n<tr class=\"row-87 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Green Information Technology<\/td><td class=\"column-3\"><strong>Green Information Technology : <em>A Sustainable Approach<\/em><\/strong><\/td><td class=\"column-4\">Mohammad Dastbaz<br \/>\nColin Pattinson<br \/>\nBabak Akhgar<\/td>\n<\/tr>\n<tr class=\"row-88 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Parallel and Distributed Computing<\/td><td class=\"column-3\"><strong>Topics in Parallel and Distributed Computing: <em>Introducing Concurrency in Undergraduate Courses<\/em><\/strong><\/td><td class=\"column-4\">Sushil K Prasad<br \/>\nAnshul Gupta<br \/>\nArnold L Rosenberg<br \/>\nAlan Sussman<br \/>\nCharles C Weems<\/td>\n<\/tr>\n<tr class=\"row-89 odd\">\n\t<td class=\"column-1\">Electrical Engineering<\/td><td class=\"column-2\">Smart Grid<\/td><td class=\"column-3\"><strong>Securing the Smart Grid : <em>Next Generation Power Grid Security<\/em><\/strong><\/td><td class=\"column-4\">Tony Flick<br \/>\nJustin Morehouse<\/td>\n<\/tr>\n<tr class=\"row-90 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Malware<br \/>\nCompluter Virus<\/td><td class=\"column-3\"><strong>Managed Code Rootkits : <em>Hooking into Runtime Environments<\/em><\/strong><\/td><td class=\"column-4\">Erez Metula<\/td>\n<\/tr>\n<tr class=\"row-91 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Digital Forensic<\/td><td class=\"column-3\"><strong>Digital Triage Forensics : Processing the Digital Crime Scene<\/strong><\/td><td class=\"column-4\">Stephen Pearson<br \/>\nRichard Watson<\/td>\n<\/tr>\n<tr class=\"row-92 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Information Security<\/td><td class=\"column-3\"><strong>The Basics of Information Security : <em>Understanding the Fundamentals of InfoSec in Theory and Practice<\/em><\/strong><\/td><td class=\"column-4\">Jason Andress<\/td>\n<\/tr>\n<tr class=\"row-93 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Information Security<\/td><td class=\"column-3\"><strong>Simple Steps to Data Encryption : <em>A Practical Guide to Secure Computing<\/em><\/strong><\/td><td class=\"column-4\">Peter Loshin<\/td>\n<\/tr>\n<tr class=\"row-94 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">CUDA Programming<br \/>\nHigh Performance Computing<\/td><td class=\"column-3\"><strong>CUDA Programming : <em>A Developer\u2019s Guide to Parallel Computing with GPUs<\/em><\/strong><\/td><td class=\"column-4\">Shane Cook<\/td>\n<\/tr>\n<tr class=\"row-95 odd\">\n\t<td class=\"column-1\">Computer Engineering<br \/>\nElectronics Engineering<\/td><td class=\"column-2\">System on Chip<br \/>\nNetworks-on-Chip<br \/>\nSoC, MPSoC, NoC<\/td><td class=\"column-3\"><strong>On-Chip Communication Architectures : <em>System on Chip Interconnect<\/em><\/strong><\/td><td class=\"column-4\">Sudeep Pasricha<br \/>\nNikil Dutt<\/td>\n<\/tr>\n<tr class=\"row-96 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Linux<br \/>\nOperating System<\/td><td class=\"column-3\"><strong>Linux Kernel Development<\/strong><\/td><td class=\"column-4\">Robert Love<\/td>\n<\/tr>\n<tr class=\"row-97 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Linux<br \/>\nOperating System<\/td><td class=\"column-3\"><strong>Understanding the Linux Kernal<\/strong><\/td><td class=\"column-4\">Daniel P. Bovet<br \/>\nMarco Cesati<\/td>\n<\/tr>\n<tr class=\"row-98 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">High Performance Computing<\/td><td class=\"column-3\"><strong>Intel Xeon Phi Coprocessor High Performance Programming<\/strong><\/td><td class=\"column-4\">Jim Jeffers<br \/>\nJames Reinders<\/td>\n<\/tr>\n<tr class=\"row-99 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Computer Networks<\/td><td class=\"column-3\"><strong>Computer Networks: <em>A Systems Approach<\/em><\/strong><\/td><td class=\"column-4\">Larry L. Peterson<br \/>\nBruce S. Davie<\/td>\n<\/tr>\n<tr class=\"row-100 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Pattern Recognition<\/td><td class=\"column-3\"><strong>Introduction to Pattern Recognition : <em>A MATLAB Approach<\/em><\/strong><\/td><td class=\"column-4\">Sergios Theodoridis<br \/>\nKonstantinous Koutroumbas<\/td>\n<\/tr>\n<tr class=\"row-101 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">SQL Injection Attack<\/td><td class=\"column-3\"><strong>SQL Injection Attacks and Defense<\/strong><\/td><td class=\"column-4\">Justin Clarke<\/td>\n<\/tr>\n<tr class=\"row-102 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>A Programmable Programming Language<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-103 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>The Next Phase in the Digital Revolution<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-104 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Decentralized Blockchain-Based Electronic Marketplaces<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-105 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-106 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Reconfigurable Comibts<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-107 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Barriers To Refactoring<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-108 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Moving Beyond the Turing Test with Allen AI Science Challenge<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-109 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>The Science of Brute Force<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-110 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Reimagining the Avtar Dream<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-111 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Sir Tim Berners-Lee<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-112 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Who Owns the Social Web?<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-113 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Attack of the Killer Microseconds<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-114 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Computational Support for Academic Peer Review : <em>A Perspective from Artificial Intelligence<\/em><\/strong> <\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-115 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Model Learning : The power and potential of black box techniques<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-116 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Exponential Laws of Computing Growth<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-117 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Interactive Visualization of 3D Scanned Mummies at Public Venues<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-118 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Sex as an Algorithm<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-119 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Medical Device Security<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-120 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Automating Data Citation<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-121 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Computational Biology in the 21st Century<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-122 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>The Rise of Social Bots<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-123 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Whitfield Diffie Martin  E. Hellman<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-124 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>A Survey of Robotic Musicianship<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-125 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Gambling on Bitcoin<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-126 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Software Obfuscation<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-127 odd\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>YFCC100M : The New Data in Multimedia Research<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-128 even\">\n\t<td class=\"column-1\">Computer Engineering<\/td><td class=\"column-2\">Communications of The ACM<\/td><td class=\"column-3\"><strong>Spatial Computing<\/strong><\/td><td class=\"column-4\">ACM, USA<\/td>\n<\/tr>\n<tr class=\"row-129 odd\">\n\t<td class=\"column-1\">Embedded System<br \/>\n<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi: Retro Computing<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-130 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Media Player Projects<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-131 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Raspberry Pi For Newbies<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-132 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Electronics Starter Guide<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-133 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi: Arcade Machine<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-134 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Lego and Raspberry Pi<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-135 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : 10 Pi Zero W Projects<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-136 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Raspberry Pi Troubleshooting Special<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-137 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : The Raspberry Pi PC Challange<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-138 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Minecraft Maker Guide<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-139 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : AIY Projects<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-140 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Incredible Raspberry Pi Projects<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-141 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Retro Gaming Bliss<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-142 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Build A Magic Mirror<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-143 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Beginners's Guide To Coding<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-144 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Merry Christmas Makes<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-145 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Build A Remote Control Robot<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-146 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : 50 Greatest Raspberry Pi Projects<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-147 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Raspberry Pi Beginner's Guide<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-148 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Windows 10 on Raspberry Pi<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-149 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Mission Accomplished<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-150 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Electronics With The Raspberry Pi<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-151 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Picture Perfect<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-152 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Power Up Your Life With Raspberry Pi<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-153 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Raspberry Pi<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-154 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Pi Zero Projects<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-155 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Minecraft Mashups<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-156 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : #PIZERO<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-157 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : 30 Minute Projects<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-158 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Raspberry Pi Robot<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-159 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Raspberry Pi Digital Home<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-160 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Get Started  With Raspberry Pi<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-161 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Amazing Pi Projects<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-162 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Windows 10 on Raspberry Pi<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-163 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Raspberry Pi Desktop Super-Test<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-164 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Crowdfunding Greatest's Hits<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-165 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Raspberry Pi 2<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-166 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Enriching Marine Electronics<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-167 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Scratch Spacecraft<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-168 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Introducing OpenCV<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-169 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Build QR Codes in Minecraft<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-170 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Introducing The Model B+<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-171 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Enigma Cipher<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-172 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Picademy Training<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-173 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Sonic Pi 2.0 : Get Your Groove On<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-174 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : 140% More Solar Energy<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-175 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Stronghold Of The Dwarven Lords<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-176 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : PiBOX Raspberry Pi Hosting<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-177 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Quadcopter Lift Off<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-178 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : After Dark Infrared Camera<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-179 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Robotics With BrickPi<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-180 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Skutter : Expanding Your Senses with I2C<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-181 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Skutter : Old School Gaming<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-182 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : The Camera Module<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-183 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Meet Amy Mather : 13 Year Old Programmer<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-184 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : A Year of Mag Pi With Liz Upton<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-185 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Minecraft<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-186 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Happy Birthday<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-187 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Meet Ladyada<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-188 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Catch Santa Using Home Automation<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-189 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Arduino and RasPi Get Connected!<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-190 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : The Skutter Has Landed <\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-191 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Steady Hand Fun With The RaspberryPi<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-192 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Eben and Liz : The Interview<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-193 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : 150+ Games To Try On Your PI<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-194 even\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : I Have Got A Little Something For Ya<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<tr class=\"row-195 odd\">\n\t<td class=\"column-1\">Embedded System<\/td><td class=\"column-2\">Raspberry Pi<\/td><td class=\"column-3\"><strong>Mag Pi : Introducing The Raspberry Pi :<br \/>\n A New Breed Of Computer<\/strong><\/td><td class=\"column-4\">Raspberry Pi Press, UK<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n","protected":false},"excerpt":{"rendered":"<p>All research projects are technically sponsored by GRITS. Academicians, Industry Professionals, and Students of Engineering College may contribute to the research project [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-41","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/greenresearchit.com\/index.php\/wp-json\/wp\/v2\/pages\/41","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/greenresearchit.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/greenresearchit.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/greenresearchit.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/greenresearchit.com\/index.php\/wp-json\/wp\/v2\/comments?post=41"}],"version-history":[{"count":9,"href":"http:\/\/greenresearchit.com\/index.php\/wp-json\/wp\/v2\/pages\/41\/revisions"}],"predecessor-version":[{"id":176,"href":"http:\/\/greenresearchit.com\/index.php\/wp-json\/wp\/v2\/pages\/41\/revisions\/176"}],"wp:attachment":[{"href":"http:\/\/greenresearchit.com\/index.php\/wp-json\/wp\/v2\/media?parent=41"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}