Course References

 

School of Engineering and Technology (SET)
 
Field of Study: Computer Science
 
AT70.02 : Data structures & Algorithms
AT70.03 : Theory of Computing
AT70.05 : Computer Networks
AT70.07 : Programming Languages and Compilers
AT70.08 : Operating Systems
AT70.09 : Computer Graphics and Animation
AT70.10 : Paradigms of Artificial Intelligence
AT70.12 : Web Application Engineering
AT70.13 : Computer Security
AT70.15 : Advanced Topics in Internet Technology
AT70.16 : Computational Geometry and Applications
AT70.17 : XML : Foundations, Techiques and Applications
AT70.18 : Software Architecture Design
AT70.19 : Software Development and Quality Improvement
AT70.20 : Machine Vision for Robotics and HCI
AT70.9003 Selected Topic: Computer Organization and Architecture
AT70.9004 Selected Topic: Object-oriented Analysis and Design

AT70.9007 Selected Topic: Introduction to Machine Vision for Robotics and HCI

AT70.9008 Selected Topic: Security, Multiagent Systems, Trust and Online Trading Mechanisms
AT70.9009 Selected Topic: Web Application Engineering
AT70.9010 Selected Topic: Network and Service Management
AT70.9011 Selected Topic: Machine Vision for Robotics and HCI
AT70.9012 Selected Topic: Security, Trust and Repuration
AT70.9013 Selected Topic: Software Architecture Design I
AT70.9014 Selected Topic: Software Development Methodologies
AT70.9015 Selected Topic: Software Architecture Design II
AT70.9016 Selected Topic: Software Quality Improvement
AT70.9018 Selected Topic: Data Mining
AT70.9019 Selected Topic: Digital Information Technology Development and Policy
AT70.9020 Selected Topic: Biologically Inspired Robotics I
AT70.9022 Selected Topic: Machine Learning
AT70.9023 Selected Topic: Theory of Modeling and Simulation: Application to Serious Games
AT70.9026 Selected Topic: The Semantic Web and Linked Open Data
AT70.9028 Selected Topic: Internet Technology and Governance

 

AT70.02 : Data structures & Algorithms
No. Text/References Available Free Online

1

Weiss, M. A. (2003). Data structures and algorithm analysis in C++. (2nd ed.) Upper Saddle River, N.J.  : Pearson Education International. (3rd ed. Not available) QA76.73 C153 W46 2003  

 

 

AT70.03 : Theory of computing
No. Text/References Available Free Online

 

1

Lewis, H. R. and  Papadimitriou, C. H. (1998).Element of the theory of computation. (2nd ed.) Upper Saddle River, N.J. : Prentice-Hall.

QA267 L49 1998 c.2  

2

Calude,C. (1988). Theories of computational complexity. Amsterdam : North-Holland.

QA267 C34 (LOST ON FLOOD)  

3

Mishra, K.L.P. and Chandrasekaran, N. (2011). Theory of computer science : automata, language and computation. (3rd ed.). New Delhi : PHI Learning.

QA267 M57 2007y  
4

Hopcroft, J.E. and Ullman, Jeffrey D. (1979). Introduction to automata theory, languages, and computation. Reading, Mass. : Addison-Wesley Pub.

QA267 H56  ((LOST TO FLOOD)  

5

Hopcroft, J. E., Jeffrey, D. U. and Rajeev, M. (2007). Introduction to automata theory, languages, and computation. (3rd ed.) Boston, MA : Pearson/Addison Wesley. QA267 H56 2007i  
6 Hopcroft, J. E., Jeffrey, D. U. and Rajeev, M. (2007). Introduction to automata theory, languages, and computation. (3rd ed.) New Delhi : Pearson Education. QA267 H56 2007b  
7 Sipser, M. (1997). Introduction to the theory of computation. Boston, MA : PWS Pub. QA267 S56  

8

Smith, Carl H. (1994). A recursive introduction to the theory of computation. New York :  Springer-Verlag. QA76.6 S61547  
9 Taylor, Ralph Gregory. (1998). Model of computation and formal languages. New York : Oxford University Press. QA9.59 T39 (LOST TO FLOOD)  
10 Garey, Michael R. and Johnson, David, S. (1979). Computers and intractability : a guide to the theory of NP-completeness. New York : W.H. Freeman. QA76.6 G35 c.2  

 

 

AT70.05 : Computer Networks
No. Text/References Available Free Online
1

Peterson, Larry L. and Davie, Bruce.S. (2011). Computer networks : a systems approach. (5th ed.). Burlington, MA : Morgan Kaufmann.

TK5105.5 P479 2011  
2 Kurose, James F. and Ross, Ketih W. (2013). Computer networking : a top-down approach. (6th ed.) Boston, MA: Pearson Education. TK5105.875 I57 K88 2013    
3 Comer, Douglas E. (1999). Computer networks and Internets. (2nd ed.) Upper Saddle Reiver, N.J. : Prentice-Hall. TK5105.5 C5897 1999  

 

 

AT70.07 : Programming Languages and Compilers
No. Text/References Available Free Online
1 Watt, D. A. and Brown, D. F. (2000). Programming language processors in Java : compilers and interpreters. Harlow, Eng. : Prentice Hall. QA76.73 J38 W385 ( LOST TO FLOOD)  
2 Sebesta, R. W. (1999). Concepts of programming languages. (4th ed.) Reading, MA : Addison-Wesley.   QA76.7 S43 1999  
3 Appel, A. W. & Palsberg, J. (2002). Modern compiler implementation in Java. (2nd ed.) Cambridge, UK : Cambridge University Press. QA76.73 J38 A65 2002 (LOST TO FLOOD)  
4 MacLennan, B. J. (1999). Principles of programming languages : design, evaluation, and implementation. (3rd ed.) New York : Oxford University Press. QA76.7 M33 1999  
5 Wirth, N. (1996). Compiler construction. Harlow, Eng. : Addison-Wesley.

QA76.76 C65 W5713  (LOST TO FLOOD)

 
6 Pierce, B. C. (2002). Types and programming languages. Cambridge, Mass. : MIT Press. QA76.7 P54  
7 Sampaio, A. (1997). An algebraic approach to compiler design. Singapore : World Scientific.

QA76.7 S26

 
8 Wilhelm, R. and Maurer, D. (1995). Compiler design. Reading, MA. : Addison-Wesley Pub. QA76.76 C65 W55 (Lost to flood)  
9

Aho, A. V., Sethi, R. and Ullman, J. D. (1986). Compilers : principles, techniques, and tools. Reading, Mass. : Addison-Wesley.

QA76.6 A366 c.3  
10 Muchnick, S. S. (1997). Advanced compiler design and implementation. San Francisco, Calif. : Morgan Kaufmann Pub.

QA76.76 C65 M8 (LOST TO FLOOD)

 
11

Pittman, T. and Peters J. (1992). The art of compiler design: theory and practice. Englewood Cliffs, N.J. : Prentice Hall.

QA76.76 C65 P57  (LOST TO FLOOD)  

 

 

AT70.08 Operating Systems
No. Text/References Available Free Online
1 Deitel, H. M. (1990). An introduction to operating systems. (2nd ed.) Reading, Mass. : Addison-Wesley Pub. QA76.76 O63 D46 1990  
2 Stallings, W. (2001). Operating systems : internals and design principles. (4th ed.) Upper Saddle River, N.J. : Prentice Hall. QA76.76 O63 S734 2001 (LOST TO FLOOD.)  
3 Raghavan, S. V. and Satish, K. T. (1998). Networked multimedia systems : concepts, architecture & design. Upper Saddle River, NJ : Prentice Hall. QA76.575 R34  
4 Tanenbaum, A. S. and Steen, M. V. (2002). Distributed systems : principles and paradigms. Upper Saddle River, N.J. : Pearson Education International.

(Not Available.)

 
5

Menascé, D. A. and Almeida, Virgilio, A. F. (1998). Capacity planning for Web performance : metrics, models, and methods. Upper Saddle River, N.J. : Prentice Hall.

(QA76.9 C63 M463)

 

 

 

AT70.09 Computer Graphics and Animation
No. Text/References Available Free Online
1  Guha, S. (2011). Computer graphics through OpenGL : from theory to experiments. Boca Raton, FL : CRC Press. T385 G85  
2 Shreiner, D. (et. Al.). (2008). OpenGL programming guide : the official guide to learning OpenGL, version 2.1. (6th ed.). Upper Saddle River, N.J. : Addison-Wesley.

T385 O636 2008

 
3

Angel, E. (2003). Interactive computer graphics : a top-down approach with OpenGL. (3rd ed.). Boston : Addison Wesley.

T385 A514 2003  
4 Foley, Jame D. (et al.). (2003). Computer graphics : principles and practice. (2nd ed.) Mass. : Addison-Wesley T385 C5735 1996s (LOST ON FLOOD)  
5 Hearn, D. and Baker, M. P. (2004). Computer graphics with OpenGL. (3rd ed.) Upper Saddle River, N.J. : Pearson Prentice Hall. T385 H395 2004  
6 Shreiner, D.(ed.). (2000). OpenGL reference manual : the official reference document to OpenGL, version 1.2. (3rd ed.) Reading, MA : Addison-Wesley. T385 O642 2000  
7 Wright, Richard S. (et al.). (2011). OpenGL superbible : comprehensive tutorial and reference. (5th ed.) Upper Saddle River, NJ : Addison-Wesley. T385 W728 2011  

 

 

AT70.10 Paradigms of Artificial Intelligence
No. Text/References Available Free Online
1 Russell, S. J. and Norvig, P. (1995). Artificial intelligence : a modern approach. Englewood Cliffs, N.J. : Prentice Hall Q335 R86  
2 Nilsson, N. J. (1998). Artificial intelligence : a new synthesis. San Francisco, CA : Morgan Kaufmann. Q335 N495  
3 Wolfram, S. (2002). A new kind of science. Champaign, IL : Wolfram Media. QA267.5 C45 W67  

 

AT70.12 Web Application Engineering
No. Text/References Available Free Online
1

Anderson, E., Greenspun, P. and Grumet, A. (2006). Software engineering for internet applications. Cambridge : MIT Press.

QA76.625 A55 Available free online.
2 Andrews, M. and Whittaker, James A. (2006). How to break Web software : functional and security testing of Web applications and Web service. Upper Saddle River, NJ : Addison-Wesley.

QA76.76 T48 W485

 
3 Bergsten, H. (2004). JavaServer pages. (3rd ed.) Beijing, China : O'Reilly.

TK5105.8885 J38 B47 2003

 
4 Collins-Sussman, B., Fitzpatrick, B. and Pilato, C.M. (2016). Version Control with Subversion. Available at : http://svnbook.red-bean.com/nightly/en/index.html   Available free online.
5 Crane, D. and McCarthy, P. (2008). Comet and reverse Ajax : the next-generation Ajax 2.0. Berkely, CA : Apress. TK5105.8885 A52 C73 (LOST ON FLOOD.)  
6 Fowler, C. (2006). Rails recipes. Raleigh, N.C. : Pragmatic Bookshelf. QA76.64 F69  
7 Fowler, M. (2003). Patterns of enterprise application architecture. Boston, MA : Addison-Wesley. QA76.9 S88 F69  
8 Fu, K. (et.al.). (2001). Dos and don'ts of client authentication on the Web. The 10th USENIX Security Symposium. Available at : https://pdos.csail.mit.edu/papers/webauth:sec10.pdf   Available free on online.
9 Gehtland, J., Galbraith and Almaer, D. (2006). Pragmatic Ajax : a web 2.0 primer. Raleigh, NC : Pragmatic Bookshelf TK5105.8885 A53 G44  
10 Greenspun, P. (2006). SQL for web Nerds. Oracle. Available at : http://philip.greenspun.com/sql/   Available free online.
11 Henderson, C. (2006). Building scalable web sites. Sebastopol, CA : O'Reilly.

TK5105.888 H46

 
12 Jendrock, E. (et. al.). (2006). The Java EE 5 Tutorial. (3rd ed.) Upper Saddle River, N.J. : Addison-Wesley. Available at : https://docs.oracle.com/javaee/5/tutorial/doc/   Available free online.
13 Johnson, D., White, A. and Carland A. . (2008). Enterprise AJAX : strategies for building high performance web applications. Upper Saddle River, NJ : Prentice Hall. TK5105.8885 A52 J64 (LOST ON FLOOD)  
14 Murugesan, S. and Deshpande, Y. (eds.). (2001). Web engineering : managing diversity and complexity of Web application development. Springer. (Not Available.)  
15 Richardson, L. and Ruby, S. (2007). RESTful web services. Beijing, China : O'Reilly. TK5105.88813 R53  
16

Ruby, Sam (et. al.). (2009). Agile web development with rails. (3rd ed.) Raleigh, N.C. : Pragmatic Bookshelf.

TK5105.888 T477 2009  
17

Weiss, M. (2003). Patterns for web applications, In Patterns Languages of Programming (PLoP). Ottava, Canada : Carleton University. Available at : http://hillside.net/plop/plop2003/Papers/weiss-web.pdf

  Available free online.

 

 

AT70.13 Computer Security
No. Text/References Available Free Online
1 Schneier, B. (1996).  Applied Cryptography : protocols, algorithms, and source code in C. (2nd ed.) New York : Wiley. QA76.9 A25 S35 1996  
2

Stallings, W. (1999). Cryptography and network security : principles and practice. (2nd ed.) Upper Saddle River, N.J. : Prentice Hall.

TK5105.59 S713 1999  
3 Gollmann, D. (2006). Computer security. (2nd ed.) Chichester, England : Wiley.

QA76.9 A25 G65 2006

 
4

Pfleeger, C. P.  and Pfleeger, S. L. (2003). Security in computing. (3rd ed.) Upper Saddle River, N.J. : Prentice Hall PTR.

QA76.9 A25 P45 2003  
5 Bragg, R., Rhodes-Ousley, M. and Starberg, K. (2004). Network security : the complete reference. New York : McGraw-Hill QA76.9 A25 B73  
6 Swicky, E. D., Simon, C. and Chapman, D. B. (2000). Building internet firewalls. Cambridge, Mass. : O'Reilly. TK5105.59 Z86 2000  
7 Adams, C. (1999). Understanding public-key infrastructure : concepts, standards, and deployment considerations. Indianapolis, IN : Macmillan Technical Pub TK5102.94 A32  
8

Pabrai, U. O. and Gurbani, V. K. (1996). Internet and TCP/IP network security : securing protocols and applications. New York : McGraw-Hill.

TK5105.59 P33  
9

Loeb, L. (1998). Secure electronic transactions : introduction and technical reference. Boston, MA : Artech House Pub

HF5548.32 L63  
10

O'Mahony, D., Peirce, M. and Tewari, H. (1997). Electronic payment systems. Boston, MA : Artech House.

HG1710 O45 (LOST ON FLOOD)  

 

 

AT70.15 Advanced Topics in Internet Technology
No. Text/References Available Free Online
1

Crowcroft, J., Handley, M. and Wakeman, I. (1998). Internetworking Multimedia. Calif. : Morgan Kaufmann. Available at : https://www.cl.cam.ac.uk/~jac22/out/mm.pdf

  Available free online.
2

Kurose J. F. & Keith, W. R. (2000). Computer Networking : a top - down approach featuring the Internet. Boston, MA : Addison-Wesley.

(Not Available.)  
3 Kurose J. F. and Keith, W. R. (2011). Computer networking : a top-down approach featuring the Internet. (3rd ed.) New Delhi : Pearson.

K5105.875 I57 K88 2005j

 
4

Peterson, L. L. and Devie, B. S. (2000). Computer networks : a systems approach. (5th ed.) Burlington, MA : Morgan Kaufmann.

TK5105.5 P479 2011  
5 Stephen, A. T. (1996). IPng and the TCP/IP protocols: implementing the next generation Internet. New York : John Wiley & Sons (Not Available)  
6

Stevens, W. R., (1994). TCP/IP Illustrated. (Vol.1) Boston, MA.. : Addison-Wesley Longman Pub. Available at : http://www.cs.newpaltz.edu/~pletcha/NET_PY/

the-protocols-tcp-ip-illustrated-volume-1.9780201633467.24290.pdf

  Available free online.
7 Hersent, O., Gurle, D. & Petit, J.-P. (2000). IP telephony: packet-based multimedia communications system. Boston, MA.. : Addison-Wesley Longman Pub. (Not Available)  

 

 

AT70.16 Computational Geometry and Applications
No. Text/References Available Free Online
1 Mark de Berg (et al.). 2008. Compulational geometry : algorithms and applications. (2nd ed.) Berlin : Springer. (Not Available.)  
2

Berg, Mark de (et al.). (2008). Computational geometry : algorithms and applications. (3rd ed.) Berlin : Springer.

QA448 D38 C65 2008eb  
3 Boissonnat, J.-D. and Yvinec, M. (1998). Algorithmic geometry. New York : Cambridge University Press. (Not Available.)  
4 Mulmuley, K. (1998). Computational geometry : an Introduction through randomized algorithms. Upper Saddle River, N.J. : Prentice Hall. (Not Available)  
5 O'Rourke, Joseph. (1988). Computational geometry in C. (2nd ed.) Cambridge, UK : Cambridge University Press. QA448 D38 O76 1998  
6

Preparata, F. P. and Shamos, M. I. (1988). Computational geometry : an introduction. New York : Springer Verlag.

QA447 P735 1985b  

 

 

AT70.17 XML: Foundations, Techniques and Applications
No. Text/References Available Free Online
1 Holzner, S. (2003). Real world XML. (2nd ed.) Berkeley, CA. : Peachpit Press. (Not Available)  
2 Harold, E. R. (1999). XML bible. Foster City, CA : IDG Books Worldwide. QA76.76 H94 H34  
3

Holzner, S. (2000). Inside XML. Thousand Oaks, CA : New Riders Pub .

(Not Available)  
4 Abiteboul, S., Buneman, P. and Suciu, D. (2000). Data on the web : from relations to semi structured data and XML. San Francisco, CA : Morgan Kaufmann. QA76.9 D3 A258  

 

 

AT70.18 : Software Architecture Design
No. Text/References Available Free Online
1 Fowler, M. (2003). Patterns of enterprise application architecture. Boston, MA : Addison-Wesley. QA76.9 S88 F69  
2 Hohpe, G. and Woolf, B. (2004). Enterprise integration patterns : designing, building, and deploying messaging solutions. Boston, MA : Addison-Wesley

TK5102.5 H5882

 
3

Erl, T. (2009). SOA design patterns. Upper Saddle River, NJ : Prentice Hall.

(Not Available.)

 
4 Bass, Len., Clements, P. and Kazman, R. (2003). Software architecture in practice. (2nd ed.) Boston, MA : Addison-Wesley. QA76.754 B37 2003 (LOST ON FLOOD.)  
5 Bruke, B. and Monson-Haefel, M. (2006). Enterprise JavaBeans 3.0. (5th ed.) Sebastopol, CA : O'Reilly. Available free online.
6 Buschmann, F., Henney, K. and Schmidt, D. C. (2007).Pattern-oriented software architecture : a pattern language for distributed computing. (vol. 4) Hoboken, NJ : John Wiley & Sons. (Not Available)  
7 Larman, C. (2005). Applying UML and patterns : an introduction to object-oriented analysis and design and iterative development. (3rd ed.) Upper Saddle River, NJ : Prentice Hall PTR. QA76.9 O35 L37 2004  
8 Margolis, B. (2007). SOA for the business developer: concepts, BPEL, and SCA. LLC : MC Press. (Not Available)  
9 Rademakers, T. and Dirksen, S. (2008). Open-Source ESBs in action. Greenwich, CT : Manning Pub. (Not Available)  

 

 

AT70.19 : Software Development and Quality Improvement
No. Text/References Available Free Online
1 Stevens, P. (2006). Using UML: software engineering with objects and components. Bosto, MA. : Addison-Wesley Longman Pub. (Not Available)  
2 Sommerville, I. (2007). Software engineering. (8th ed.) Harlow, Eng. : Addison-Wesley.

QA76.758 S657 2007

 
3 Larman, C. (2004). Applying UML and patterns : an introduction to object-oriented analysis and design and iterative development. (3rd ed.) Upper Saddle River, N.J. : Prentice Hall PTR. QA76.9 O35 L37 2004  
4 Pressman, R. S. (2000). Software engineering : a practitioner's approach. (5th ed.) Boston, Mass. : McGraw Hill. QA76.6 P73 2000  
5 Bruegge, B. (2004). Object-oriented software engineering : using UML, PATTERNS, and JAVA. (2nd ed.) Upper Saddle River, NJ : Prentice Hall. (Not Available)  
6 Fowler, M. (2004). UML distilled : a brief guide to the standard object modeling language. (3rd ed.) Boston, MA : Addison-Wesley. QA76.9 O35 F695 2004  
7 Brown, W. H. (et. al.). (1998). Antipatterns: refactoring software, architectures, and projects in crisis. New York : John Wiley & Son. (Not Available.)  
8 Brooks, F. P., Jr. (1982). The mythical man-month : essays on software engineering. (Reprint with corr.) Reading, Mass. : Addison-Wesley Pub. QA76.6 B75 1982  
9 Gamma, E. (et. al.). (1995). Design patterns : elements of reusable object-oriented software. Reading, Mass. : Addison-Wesley. QA76.64 D47  

 

 

AT70.20 : Machine Vision for Robotics and HCI
No. Text/References Available Free Online
1 Hartley, R. and Zisserman, A. (2003). Multiple view geometry in computer vision. (2nd ed.) Cambridge, UK : Cambridge University Press. TA1634 H38 2003p  
2 Bishop, C. M. (2004). Pattern recognition and machine learning. New York : Springer. Q327 B52  
3 Trucco, E. and Verri, A. (1998). Introductory techniques for 3-D computer vision. Upper Saddle River, NJ : Prentice Hal. TA1634 T78 (LOST ON FLOOD.)  
4 Forsyth, D. A. and Ponce, J. (2003). Computer vision : a modern approach. Upper Saddle River, N.J. : Prentice Hall. TA1634 F65  (LOST ON FLOOD.)  

 

 

AT70.9003 Selected Topic: Computer Organization and Architecture
No. Text/References Available Free Online
1 Patterson, D. A. and Hennessy, J. L. (2009). Computer organization and design : the hardware/software interface. (4th ed.) Burlington, MA : Morgan Kaufmann Pub. QA76.9 C643 P37 2009a  
2 Carpinelli, J. D. (2000). Computer systems organization and architecture. Boston, MA : Addison-Wesley Longman Pub. (Not Available.)  
3 Patterson, D. A. and Hennessy J. L. (2003). Computer architecture : a quantitative approach. (3rd ed.) Amsterdam : Morgan Kaufmann Pub.

QA76.9 A73 P377 2003 (LOST ON FLOOD.)

 
4 Tanenbaum, A. S. (1990). Structured computer organization. (4th ed.) Englewood Cliffs, N.J. : Prentice Hall. QA76.6 T38 1990  
5 Williams, R. (2001). Computer systems architecture: a networking approach. Boston, MA : Addison-Wesley Longman Pub. (Not Available.)  
6 Williams, R. (2006). Computer systems architecture: a networking approach. (2nd ed.) Boston, MA : Addison-Wesley Longman Pub. Available free online.

 

 

AT70.9004 Selected Topic: Object-oriented Analysis and Design
No. Text/References Available Free Online
1 UML visual modeling tools: IBM Rational Rose and IBM Rational Software Architect. Standard Edition (Not Available)  
2 Hunt, A. and Thomas, D. (2000). The pragmatic programmer : from journeyman to master. Boston, MA : Addison-Wesley. QA76.76 H857  
3 Evans, E. (2004). Domain-driven design: tackling complexity in the heart of software. Boston, MA : Addison-Wesley.   Available free online
4 Buschmann, F. (1996). Pattern-Oriented software architecture : a system of patterns. (Vol. 1). New York : John Wiley & Sons. (Not Available)  
5 Bass, L., Clements, and P. Kazman, R. (2003). Software architecture in practice. (2nd ed.) Boston, MA : Addison-Wesley. QA76.754 B37 2003 (LOST ON FLOOD)  
6 Siau, K. and Halpin, T. (2001). Unified modeling language : systems analysis, design and development issues. (2nd ed.) Hershey, PA : Idea Group Pub . (Not Available.)  
7 Siau, K. and Halpin, T. A. (2001). Unified modeling language : systems analysis, design and development issues. Hershey, PA : Idea Group Pub. QA76.9 O35 S54  
8 Gamma, E. (et. al.). (1995). Design patterns : elements of reusable object-oriented software. Reading, Mass. : Addison-Wesley

QA76.64 D47

 
9 Fowler, M. (et. al.) (1999). Refactoring: improving the design of existing code. Boston, MA : Addison-Wesley Longman Pub.   Available free online.
10 Bloch, J. (2008). Effective Java. (2nd ed.) Upper Saddle River, NJ : Prentice Hall.  

Available free online.

11 Quatrani, T. (2003). Visual modeling with rational rose 2002 and UML. (3rd ed.). Boston, MA : Addison-Wesley Professional. (Not Available.)  
12 Quatrani, T. and Palistrant, J. (2006). Visual modeling with IBM rational software architectand UML. Armonk, New York : IBM Press (Not Available.)  

 

 

AT70.9007 Selected Topic: Introduction to Machine Vision for Robotics and HCI
No. Text/References Available Free Online
1 Forsyth, D. A. and Ponce, J. (2003). Computer vision : a modern approach. Upper Saddle River, N.J. : Prentice Hall. TA1634 F65 (LOST ON FLOOD.)  
2 Tomasi, C. Convolution, smoothing, and image derivatives. Not available  
3 Tomasi, C. (n.d.) Estimating Gaussian mixture densities with EM - A Tutorial. Available at : https://www.cs.ait.ac.th/~mdailey/cvreadings/Tomasi-EM.pdf   Available free online.

 

 

AT70.9008 Selected Topic: Security, Multiagent Systems, Trust and Online Trading Mechanisms
No. Text/References Available Free Online
1 Gollmann, D. (1999). Computer security. Hoboken, NJ. : John Wiley & Sons.

(Not Available.)

 
2 Gollmann, D. (2006). Computer security. (2nd ed.) Hoboken, NJ. : John Wiley & Sons. QA76.9 A25 G65 2006  
3 Wiess, G. (ed.). (1999). Multiagent systems : a modern approach to distributed artificial intelligence. Cambridge, MA : MIT Press.

QA76.76 I58 M85 (LOST ON FLOOD.)

 
4 Myerson, R. B. (1991). Game theory : analysis of conflict. Cambridge. Mass. : Harvard University Press. H61.25 M94  

 

 

AT70.9009 Selected Topic: Web Application Engineering
No. Text/References Available Free Online
1

Andersson, E. A., Greenspun, P. and Grumet, A. (2006). Software engineering for Internet applications. Cambridge, Mass. : MIT Press.

QA76.625 A55  
2 Norman, D. (2002). The design of everyday things. New York : Basic Books. (Not Available.)
 
3 Nielsen, J. (1999). Designing web usability: the practice of simplicity. San Francisco, NJ : New Riders Press.  
(Not Available.)  
4 Niederst, J. (2001). Web design in a nutshell : a desktop quick reference. (2nd ed.) Sebastopol, CA : O'Reilly.
(Not Available.)  
5 Murugesan, S. & Deshpande, Y. (eds.). (2001). Web engineering : managing diversity and complexity of web application development. New York : Springer. (Not Available.)
 
6 Fu, K., Sit, E., Smith, K. and Feamster, N. (2001). Dos and don'ts of client authentication on the web. MIT Laboratory for Computer Science   Available free online.
7

Weiss, M. (2003). Patterns for web applications. Patterns Languages of Programming (PLoP) Proceeding

(Not Available.)  
8

Rosenfeld, L. and Morville, P. (2002). Information architecture for the World Wide Web. Cambridge : O'Reilly.

K5105.888 R67  
9 Greenspun, P. (2014). SQL for Web Nerds. Available at : http://philip.greenspun.com/sql/   Available free online.
10

Cerami, E. (2002). Web services essentials : distributed applications with XML-RPC, SOAP, UDDI & WSDL. Sebastopol, CA : O'Reilly.

(Not Available.)  
11

Laurent, S. St., Dumbill, E. and Johnston, J. (2001). Programming Web services with XML-RPC. Sebastopol, CA : O'Reilly

(Not Available.)
 
12 Harold, E. R. and Means, S. (2004). XML in Nutshell. (3rd ed.) Sebastopol, CA : O'Reilly.

(Not Available.)

 

 

 

AT70.9010 Selected Topic: Network and Service Management
No. Text/References Available Free Online
1

Subramanian, M. (2000). Network management : principles and practice. Chennai, India : Pearson

(Not Available.)  
2 Subramanian, M. (2011). Network management : principles and practice. (2nd ed.) Chennai, India : Pearson TK5105.5 S83 2011  

 

 

AT70.9011 Selected Topic: Machine Vision for Robotics and HCI
No. Text/References Available Free Online
1

Hartley, R. and Zisserman, A. (2003). Multiple view geometry in computer vision. Cambridge, UK : Cambridge University Press.

TA1634 H38 2003p  
2

Bishop, C. M. (2006). Pattern recognition and machine learning. Singapore : Springer.

 

Available free online.

3

Trucco, E. and Verri, A. (1998). Introductory techniques for 3-D computer vision. Upper Saddle River, NJ : Prentice Hall.

TA1634 T78 (LOST ON FLOOD.)  
4

Forsyth, D. A. and Ponce, J. (2003). Computer vision : a modern approach. Upper Saddle River, N.J. : Prentice Hall.

TA1634 F65 (LOST ON FLOOD.)  

 

 

AT70.9012 Selected Topic: Security, Trust and Repuration
No. Text/References Available Free Online
1

Gollmann, D. (1999). Computer security. Hoboken, NJ. : John Wiley & Sons.

(Not Available.)

 
2

Gollmann, D. (2006). Computer security. (2nd ed.) Hoboken, NJ. : John Wiley & Sons.

QA76.9 A25 G65 2006  
3

Weiss, G. (ed.). (1999). Multiagent systems : a modern approach to distributed artificial intelligence. Cambridge, MA : MIT Press.

QA76.76 I58 M85 (LOST ON FLOOD)

 

 

 

AT70.9013 Selected Topic: Software Architecture Design I
No. Text/References Available Free Online
1

Larman, C. (20011). Applying UML and patterns : an introduction to object-oriented analysis and design and iterative development. (3rd ed.) New Delhi : Pearson
Education.

QA76.9 O35 L37 2005m  
2

Arlow, J. and Neustadt, I. (2005). UML 2 and the unified process : practical object- oriented analysis and design. (2nd ed.) Upper Saddle River, N.J. : Addison- Wesley.

QA76.9 O35 A74 2005  
3

Booch, G. (2006). Handbook of software architecture.

(Not Available.)  
4

Booch, G., Rumbaugh, J. and Jacobson, I. (2005). Unified modeling language user guide. (2nd ed.) Boston, MA : Addison-Wesley Professional.

(Not Available.)  
5

Fowler, M. (2003). UML Distilled: a brief guide to the standard object modeling language. (3rd ed.) Upper Saddle River, N.J. : Addison-Wesley.

 

Available free online.

6

Pilone, D. and Pitman, N. (2005). UML 2.0 in a Nutshell. Newton, MA : O'Reilly Media.

(Not Available.)

 

 

 

AT70.9014 Selected Topic: Software Development Methodologies
No. Text/References Available Free Online
1

Pressman, R. S. (2004). Software engineering : a practitioner's approach. (6th ed.) Boston, Mass. : McGraw Hill.

(Not Available.)  
2

Pressman, R. S. (2000). Software engineering : a practitioner's approach. (5th ed.) Boston, Mass. : McGraw Hill.

QA76.6 P73 2000  
3

Brooks, F. P. Jr. (1995). The mythical man-month : essays on software engineering. (2nded.) Reading, Mass. : Addison-Wesley Pub.

 (Not Available.)  
4

Brooks, F. P. Jr. (1982). The mythical man-month : essays on software engineering. (Rep. ed.) Reading, Mass. : Addison-Wesley Pub.

QA76.6 B75 1982  
5

Brown, W. J. (et. al.). (1998). AntiPatterns: refactoring software, architectures, and projects in crisis. Hoboken, NJ : John Wiley & Sons.

(Not Available.)  
6

Bruegge, B.and Dutoit, A. H. (2004). Object-oriented software engineering : using UML, PATTERNS, and JAVA. (2nd ed.) Upper Saddle River, NJ : Prentice Hall.

(Not Available.)
 
7

Gamma, H. (eds.) (et. al.). (1995). Design patterns : elements of reusable object-oriented software. Reading, Mass. : Addison-Wesley.

QA76.64 D47  
8

Fowler, M. (2003). Patterns of enterprise application architecture. Boston, MA : Addison-Wesley.

QA76.9 S88 F69  
9

Larman, C. (2004). Applying UML and patterns : an introduction to object-oriented analysis and design and iterative development. (3rd ed.) New Delhi : Pearson Education.

QA76.9 O35 L37 2005m  
10

Martin, R. C. (2003). Agile software development, principles, patterns, and practices. Boston, MA : Addison Wesley.

(Not Available.)  
11

McConnell, S. (2004). Code complete : a practical handbook of software construction. (2nd ed.) Redmond, Wash. : Microsoft Press.

(Not Available.)  
12

McConnell, S. (1993). Code complete : a practical handbook of software construction. Redmond, Wash. : Microsoft Press.

QA76.76 D47 M39  
13

Sommerville, I. (2007). Software engineering. (8th ed.) Harlow, Eng. : Addison-Wesley.

QA76.758 S657 2007  
14

Stevens, P. & Pooley, R. (2006). Using UML: Software Engineering with Objects and Components. (2nd ed.) sBoston, MA : Addison Wesley.

(Not Available.)  

 

 

AT70.9015 Selected Topic: Software Architecture Design II
No. Text/References Available Free Online
1

Fowler, M. (2003). Patterns of enterprise application architecture. Boston, MA : Addison-Wesley.

QA76.9 S88 F69  
2 Bass, Len., Clements, P. and Kazman, R. (2003). Software architecture in practice. (2nd ed.) Boston, MA : Addison-Wesley. QA76.754 B37 2003 (LOST ON FLOOD.)  
3

Brooks, F. P. Jr. (1995). The mythical man-month : essays on software engineering. (2nded.) Reading, Mass. : Addison-Wesley Pub.

(Not Available.)  
4 Booch, G. (2006). Handbook of software architecture. (Not Available.)  
5

Brooks, F. P. Jr. (1982). The mythical man-month : essays on software engineering. (2nded.) Reading, Mass. : Addison-Wesley Pub.

QA76.6 B75 1982  
6

Bruke, B. and Monson-Haefel, M. (2006). Enterprise JavaBeans 3.0. (5th ed.) Sebastopol, CA : O'Reilly.

  Available free online.
7

Gamma, H. (et. al.). (1995). Design patterns : elements of reusable object-oriented software. Reading, Mass. : Addison-Wesley.

QA76.64 D47  
8

Garland, J. and Anthony, R. (2003). Large-scale software architecture : a practical guide using UML. Chichester, Eng. : John Wiley.

QA76.754 G37  
9

Keen, M. (et. al.). (2004). Patterns : SOA with an enterprise service bus. Armonk, New York : IBM Redbooks pub.

(Not Available.)  
10

Larman, C. (2011). Applying UML and patterns : an introduction to object-oriented analysis and design and iterative development. (3rd ed.) New Delhi : Pearson Education.

QA76.9 O35 L37 2005m  
11

Maier, M. W. & Rechtin, E. (2007). The art of systems architecting. Boca Raton, FL : CRC

Press.
(Not Available.)  
12

Margolis, B. (2007). SOA for the business developer: concepts, BPEL, and SCA. LLC : MC Press.

(Not Available.)  
13

Sommerville, I. (2007). Software engineering. (8th ed.) Harlow, Eng. : Addison-Wesley.

QA76.758 S657 2007  

 

 

AT70.9016 Selected Topic: Software Quality Improvement
No. Text/References Available Free Online
1

Brown, W. J. (et. al.). (1998). AntiPatterns: refactoring software, architectures, and projects in crisis. Hoboken, NJ : John Wiley & Sons.

(Not Available.)  
2

CMMI Product Team. (2006). CMMI for Development, Version 1.2. Pittsburgh, PA : Carnegie Mellon

  Available free online.
3

Gamma, E. (et. al.). (1994). Design patterns : elements of reusable object-oriented software. Boston, MA. : Addison-Wesley Professional.

  Available free online.
4

Pfleeger, S. L. (2001). Software engineering: theory and practice. Upper Saddle River, NJ : Prentice-Hall.

(Not Available.)  
5

Pressman, R. S. (2004). Software engineering : a practitioner's approach. (6th ed.) Boston, Mass. : McGraw Hill.

(Not Available.)  
6

Pressman, R. S. (2000). Software engineering : a practitioner's approach. (5th ed.)Boston, Mass. : McGraw Hill.

QA76.6 P73 2000

 
7

Sommerville, I. (2007). Software engineering. (8th ed.) Harlow, Eng. : Addison-Wesley.

QA76.758 S657 2007

 

 

 

AT70.9018 Selected Topic: Data Mining
No. Text/References Available Free Online
1 Han, J. and Kamber, M. (2006). Data mining : concepts and techniques. (2nd ed.) Amsterdam, Netherlands : Elsevier.

QA76.9 D343 H36 2006

 
2

Berry, M. J. A. and Linoff, G. (1997).  Data mining techniques : for marketing, sales, and customer support. New York : John Wiley.

HF5415.125 B47  
3

Witten, I. H. and Frank, E. (2001). Data mining: practical machine learning tools and techniques. (2nd ed.) San Francisco, CA : Morgan Kaufmann

  Available free online.
4

Soukup, T. and Davidson, I. (2002). Visual data mining: techniques and tools for data visualization and mining. Hoboken, NJ : John Wiley & Sons.

(Not Available.)  
5

Tan, P.-N., Steinbach, M. and Kumar, V. (2005). Introduction to Data Mining. Boston, MA : Addison-Wesley Longman.

(Not Available.)  
6

Larose, D. T.  (2006). Data mining methods and models. Hoboken, NJ : John Wiley & Sons.

(Not Available.)  

 

 

AT70.9019 Selected Topic: Digital Information Technology Development and Policy
No. Text/References Available Free Online
1

Murai, J., Takei, J. and Sato, M. (2010). IT policy and technology : Japan and global it environment. Japan : Keio University.

(Not Available.)  

 

 

AT70.9020 Selected Topic: Biologically Inspired Robotics I
No. Text/References Available Free Online
1

Hirose, S. (1993). Biologically inspired robots : snake-like locomotors and manipulators. Oxford, UK : Oxford University Press.

(Not Available.)  
2

Siegwart, R. Nourbakhsh, I. and Scaramuzza, D. (2004). Introduction to autonomous mobile robots. Cambridge, MA : MIT Press.

(Not Available.)  
3

Siegwart, R., Nourbakhsh, I. and Scaramuzza, D. (2011). Introduction to autonomous mobile robots. (2nd ed.) Cambridge, MA : MIT Press.

TJ211.415 S54 2011  
4

Choset, H. M. (et. al.). (2005). Principles of robot motion : theory, algorithms, and implementations. Cambridge, MA : MIT Press.

TJ211.4 P75  
5

Hirose, S. (1993). Biologically inspired robots : snake-like locomotors and manipulators. Oxford, UK : Oxford University Press.

(Not Available)  
6

Siegwart, R. Nourbakhsh, I. and Scaramuzza, D. (2004). Introduction to autonomous mobile robots. Cambridge, MA : MIT Press.

(Not Available)

 
7

Siegwart, R. Nourbakhsh, I. and Scaramuzza, D. (2004). Introduction to autonomous mobile robots. (2nd ed.) Cambridge, MA : MIT Press.

TJ211.415 S54 2011  
8

Choset, H. M. (et. al.). (2005). Principles of robot motion : theory, algorithms, and implementations. Cambridge, MA : MIT Press.

TJ211.4 P75

 

 

 

AT70.9022 Selected Topic: Machine Learning
No. Text/References Available Free Online
1 Bishop, C. (2006). Pattern recognition and machine learning. Singapore : Springer.   Available Free online
2

Duda, R. O., Hart, P. E. and Stork, D. G. (2001). Pattern classification. (2nd ed.) New York : Wiley.

Q327 D833 200  

 

 

AT70.9023 Selected Topic: Theory of Modeling and Simulation: Application to Serious Games
No. Text/References Available Free Online
1 Zeigler, B. P., Praehofer, H. and Kim, T. G. (2000). Theory of modeling and simulation : integrating discrete event and continuous complex dynamic system. (2nd ed.) San Diego, CA : Academic Press. QA76.9 C65 Z44 2000  
2

Chung, A. (2003). Simulation modeling handbook: a practical approach. Boca Raton, FL : CRC Press.

(Not Available.)  
3

Nutaro, J. (2011). Building software for simulation: theory and algorithms, with applications in C++. Hoboken, NJ : John Wiley & Sons.

(Not Available.)  
4

Wainer, G. A. (2009). Discrete-event modeling and simulation: a practitioner's approach. Boca Raton, FL : CRC Press

(Not Available.)  

 

 

AT70.9026 Selected Topic: The Semantic Web and Linked Open Data
No. Text/References Available Free Online
1

 Hitzler, P., Krötzsch, M. and Rudolph, S. (2010). Foundations of semantic web technologies. Boca Raton : CRC Press.

(Not Available.)

 
2

Wood, D. (eds.). (2011). Linking government data. New York : Springer.

  Available free online
3

Allemang, D. and  Hendler, J. (2008). Semantic web for the working ontologist: effective modeling in RDFS and OWL. Waltham, MA : Morgan Kaufmann/Elsevier.

 

Available free online.

4

Hebeler, J., Fisher, M., Blace, R. and Perez-Lopez, A. (2009).  Semantic web programming. Indianapolis : Wiley.

(Not Available.)  
5

Antoniou, G. and Harmelen, F. van. (2008). A semantic web primer. (2nd ed.) Cambridge, MA : MIT Press.

(Not Available.)  

 

 

AT70.9028 Selected Topic: Internet Technology and Governance
No. Text/References Available Free Online
1 Zittrain, J. (2008). The future of the internet. New Haven, CT : Yale University Press.   Available free online.