Coverart for item
The Resource Advances in computer science and information technology : Networks and Communications : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I, edited by Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai, (electronic resource)

Advances in computer science and information technology : Networks and Communications : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I, edited by Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai, (electronic resource)

Label
Advances in computer science and information technology : Networks and Communications : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I
Title
Advances in computer science and information technology
Title remainder
Networks and Communications : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings
Title number
Part I
Statement of responsibility
edited by Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai
Title variation
CCSIT 2012
Creator
Contributor
Provider
Subject
Genre
Language
eng
Summary
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security
Member of
Cataloging source
GW5XE
Image bit depth
0
LC call number
QA75.5
LC item number
.I58 2012
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2012
http://bibfra.me/vocab/lite/meetingName
International Conference on Computer Science and Information Technology (2011- )
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
1977-
http://library.link/vocab/relatedWorkOrContributorName
  • SpringerLink
  • Meghanathan, Natarajan
  • Chaki, Nabendu
  • Nagamalai, Dhinaharan
Series statement
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
Series volume
84
http://library.link/vocab/subjectName
  • Computer science
  • Information technology
  • Computer science
  • Information technology
  • Informatique
Label
Advances in computer science and information technology : Networks and Communications : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I, edited by Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai, (electronic resource)
Instantiates
Publication
Note
International conference proceedings
Antecedent source
mixed
Bibliography note
Includes bibliographical references and author index
Color
not applicable
Contents
  • A Node Stability Index-Based Connected Dominating Set Algorithm for Mobile Ad Hoc Networks
  • Natarajan Meghanathan
  • Energy Efficient Dynamic Routing Protocol for Wireless Sensor Networks
  • Md Golam Murshed and Alastair R. Allen
  • Generalized Projective Synchronization of Hyperchaotic Lü and Hyperchaotic Cai Systems via Active Control
  • Sarasu Pakiriswamy and Sundarapandian Vaidyanathan
  • Energy Efficient Stable Connected Dominating Set Construction in Mobile Ad Hoc Networks
  • R. Ramalakshmi and S. Radhakrishnan
  • Hybrid Synchronization of Arneodo and Rössler Chaotic Systems by Active Nonlinear Control
  • Sundarapandian Vaidyanathan and Suresh Rasappan
  • Part 1.
  • Realization of SDR in Partial Reconfigurable FPGA Using Different Types of Modulation Techniques
  • Neenu Joseph and P. Nirmal Kumar
  • A Recommender System for Sweaty Sock Syndrome
  • L. Arockiam, S. Charles, C. Lalitha and I. Carol
  • Enhanced AODV Routing Protocol for Wireless Sensor Network Based on ZigBee
  • Dilip Kumar Ahirwar, Prashant Verma and Jitendra Daksh
  • Sliding Mode Controller Design for the Global Chaos Synchronization of Coullet Systems
  • Sundarapandian Vaidyanathan and Sivaperumal Sampath
  • Networks and Communications
  • Adaptive Quorum Based MAC Protocol in Non Uniform Node Distribution of Wireless Sensor Networks
  • L. Sherly Puspha Annabel and K. Murugan
  • Mobile Agent in InVANET - Traffic Management
  • V. Arun and K. L. Shunmuganathan
  • The Design of Observers for Nonlinear Control Systems around Equilibria
  • Sundarapandian Vaidyanathan
  • A Novel Approach for MIMO OFDM Systems to Estimate I/Q Imbalance, CFO, Channel Response Using Training Sequences
  • J. Tarun Kumar and K. Anitha Sheela
  • A Trust Based Routing Scheme for Wireless Sensor Networks
  • Aveek Chakrabarti, Vishal Parekh and Atin Ruia
  • Survey of Trust Schemes on Ad-Hoc Network
  • Renu Dalal, Manju Khari and Yudhvir Singh
  • Improve Service Discovery Performance over Different Networks Utilization and Sizes
  • Intisar Al-Mejibli, Martin Colley and Salah Al-Majeed
  • Adaptive K-Means Clustering to Handle Heterogeneous Data Using Basic Rough Set Theory
  • B. K. Tripathy, Adhir Ghosh and G. K. Panda
  • Geralized Projective Synchronization of Double-Scroll Chaotic Systems Using Active Feedback Control
  • Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata
  • Himadri Nath Saha, Debika Bhattachayya and P. K. Banerjee
  • A Location Dependent Semantic Cache Replacement Strategy in Mobile Environment
  • Kahkashan Tabassum, Mahmood Quadri Syed and A. Damodaram
  • Connectivity of Autonomous Agents Using Ad-Hoc Mobile Router Networks
  • Emi Mathews and Ciby Mathew
  • A New Approach to Stegnography
  • Soumik Mukherjee, Moumita Deb, Pratik Kumar Agarwal and Abhinava Roy
  • Survey on Key Pre Distribution for Security in Wireless Sensor Networks
  • T. P. Rani and C. Jaya Kumar
  • Sundarapandian Vaidyanathan and Sarasu Pakiriswamy
  • Mobile Ad Hoc Networks Security Attacks and Secured Routing Protocols: A Survey
  • Supriya and Manju Khari
  • Privacy and Security in Digital Networks from the Perspective of Modeling and Software Development
  • Erich Ortner
  • A Logical Topology to Find Alternate Routes in WDM Lightwave Network
  • Santosh Das and Abhijit Makhal
  • Handover Latency Measurement of Mobile IPv6 in a Testbed Environment
  • Muhammad Arif Amin, Kamalrulnizam Bin Abu Bakar, Abdul Hanan Abdullah, Mahesh Nair and Rashid Hafeez Khokhar
  • Different Strategy for Data Management in Mobile Computing
  • Chandrani Chakravorty and J. Usha
  • Generic Network Visualization Tool for Monitoring Adhoc Wireless Networks
  • Girish Revadigar and Chitra Javali
  • Adaptive MMSE Equalizer through LMS Algorithm Based CMA Channel Equalization
  • R. Nirmala Devi, Tara Saikumar and K. Kishan Rao
  • Weighted Angle Based Approach for Face Recognition
  • M. Koteswara Rao, K. Veeraswamy, K. Anitha Sheela and B. Chandra Mohan
  • Part 2.
  • Multiple Mobile Agents based Data Dissemination Protocol for Wireless Sensor Networks
  • Govind P. Gupta, Manoj Misra and Kumkum Garg
  • Enhanced Cluster Based Routing Protocol for MANETS
  • Kartheek Srungaram and M. H. M. Krishna Prasad
  • Soft Computing Technique Based Call Admission Control Decision Mechanism
  • H. S. Ramesh Babu, Gowrishankar, G. Mahesh and P. S. Satyanarayana
  • Mechanisms Supporting Mobility in WSNs
  • Saimadhavi and Y. S. Kumarswamy
  • Wireless and Mobile Networks
  • A Link Distance Ratio Based Stable Multicast Routing Protocol for Mobile Ad Hoc Networks
  • Natarajan Meghanathan
  • A New Security Solution Architecture (SSA) for MANETS against Network Layer Attacks
  • G. S. Mamatha
  • Analysis of Different Associative Memory Neural Network for GPS/INS Data Fusion
  • S. Angel Deborah
  • Energy Efficient Hierarchical Clustering Routing Protocol for Wireless Sensor Networks
  • Diwakar Meenakshi and Sushil Kumar
  • An Analysis on Energy Efficient System Design in Grid Computing
  • D. Ramesh and A. Krishnan
  • Cluster-based Power Aware Scheduling (CPAS) Algorithm for Network Longevity in WSN
  • K. Arthi and P. Vanaja Ranjan
  • Development of System for GPS Data Transmission to Web Server for Online over Head Conductor Sag Measurement
  • Sangeeta Kamboj and Ratna Dahiya
  • A Comparative Study of Partitioning Algorithms for Wireless Sensor Networks
  • Zeenat Rehena, Debasree Das, Sarbani Roy and Nandini Mukherjee
  • An Optimal RPC Based Approach to Increase Fault in Wireless Ad-Hoc Network
  • Sensor-Cloud: Assimilation of Wireless Sensor Network and the Cloud
  • Sanjit Kumar Dash, Jyoti Prakash Sahoo, Subasish Mohapatra and Sarada Prasanna Pati
  • Game Theoretic Model for Selfish Node Avoidance in Ad Hoc Networks
  • Upasana Dohare, D. K. Lobiyal and Sushil Kumar
  • Performance Evaluation of VANET Using Realistic Vehicular Mobility
  • Nidhi and D. K. Lobiyal
  • Ensuring Data Confidentiality and Privacy in Mobile Ad Hoc Networks
  • Hamza Aldabbas, Helge Janicke, Radwan AbuJassar and Tariq Alwada'n
  • Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)
  • Dhyanendra Jain, Pallavi Khatri, Rishi Soni and Brijesh Kumar Chaurasia
  • Rabindra Kumar Shial, K. Hemant Ku. Reddy and K. L. Narayana
  • Location Management and Resource Allocation Using Load Balancing in Wireless Heterogeneous Networks
  • G. Adiline Macriga and V. S. Surya
  • Cross Language Information Retrieval Approach in Peer-to-Peer Network
  • M. Archana and K. A. Sumithra Devi
  • Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach
  • Saurabh Upadhyay and Brijesh Kumar Chaurasia
  • Securing the National Knowledge Network
  • S. V. Nagaraj
  • Pattern Based IDS Using Supervised, Semi-supervised and Unsupervised Approaches
  • Vinod K. Pachghare, Vaibhav K. Khatavkar and Parag Kulkarni
  • A Secure Session Transfer Protocol for Downloading a Large File across a Cluster of Servers in the Presence of Network Congestion
  • Natarajan Meghanathan and Bhadrachalam Chitturi
  • An Improved Anti Spam Filter Based on Content, Low Level Features and Noise
  • Anand Gupta, Chhavi Singhal and Somya Aggarwal
  • Part 3.
  • Network Security
  • Dependable Solutions Design by Agile Modeled Layered Security Architectures
  • M. Upendra Kumar, D. Sravan Kumar, B. Padmaja Rani, K. Venkateswar Rao and A. V. Krishna Prasad, et al.
  • Block Lanczos to Solve Integer Factorization Problem Using GPU's
  • Harish Malla, Vilas SantKaustubh, Rajasekharan Ganesh and Padmavathy R.
  • Lattice Based Tools for Cryptanalysis in Various Applications
  • R. Santosh Kumar, C. Narasimham and S. Pallam Setty
  • Modified Chain Code Histogram Feature for Handwritten Character Recognition
  • Jitendra Jain, Soyuj Kumar Sahoo, S. R. Mahadeva Prasanna and G. Siva Reddy
  • A Novel Image Edge Detection Method Using Simplified Gabor Wavelet
  • C. Sujatha and D. Selvathi
  • Low Power Spatial Modulation Scheme for Wide Band Multiple Input and Multiple Output Wireless Communication Systems
  • Dhirendra Kumar Tripathi, S. Saravanan and HarNarayan Upadhyay
  • Diameter Single Sign On - Secure and Personalized Service Provision via Authentication and Authorization Mechanisms
  • Robayet Nasim
  • Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems
  • K. G. Srinivasa
  • A New Symmetric Key Cryptosystem Based on Feistel Network: Parallel Dependent Feistel Network (PDFN)
  • Indrajit Das and R. Saravanan
  • Survey of Shape Based Boundary Methods for Leaf Retrieval
  • Komal Asrani, Renu Jain and Deepak Asrani
Dimensions
unknown
Extent
1 online resource (xxix, 645 p.)
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642272981
Level of compression
uncompressed
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)793002488
  • (OCoLC)ocn793002488
Label
Advances in computer science and information technology : Networks and Communications : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I, edited by Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai, (electronic resource)
Publication
Note
International conference proceedings
Antecedent source
mixed
Bibliography note
Includes bibliographical references and author index
Color
not applicable
Contents
  • A Node Stability Index-Based Connected Dominating Set Algorithm for Mobile Ad Hoc Networks
  • Natarajan Meghanathan
  • Energy Efficient Dynamic Routing Protocol for Wireless Sensor Networks
  • Md Golam Murshed and Alastair R. Allen
  • Generalized Projective Synchronization of Hyperchaotic Lü and Hyperchaotic Cai Systems via Active Control
  • Sarasu Pakiriswamy and Sundarapandian Vaidyanathan
  • Energy Efficient Stable Connected Dominating Set Construction in Mobile Ad Hoc Networks
  • R. Ramalakshmi and S. Radhakrishnan
  • Hybrid Synchronization of Arneodo and Rössler Chaotic Systems by Active Nonlinear Control
  • Sundarapandian Vaidyanathan and Suresh Rasappan
  • Part 1.
  • Realization of SDR in Partial Reconfigurable FPGA Using Different Types of Modulation Techniques
  • Neenu Joseph and P. Nirmal Kumar
  • A Recommender System for Sweaty Sock Syndrome
  • L. Arockiam, S. Charles, C. Lalitha and I. Carol
  • Enhanced AODV Routing Protocol for Wireless Sensor Network Based on ZigBee
  • Dilip Kumar Ahirwar, Prashant Verma and Jitendra Daksh
  • Sliding Mode Controller Design for the Global Chaos Synchronization of Coullet Systems
  • Sundarapandian Vaidyanathan and Sivaperumal Sampath
  • Networks and Communications
  • Adaptive Quorum Based MAC Protocol in Non Uniform Node Distribution of Wireless Sensor Networks
  • L. Sherly Puspha Annabel and K. Murugan
  • Mobile Agent in InVANET - Traffic Management
  • V. Arun and K. L. Shunmuganathan
  • The Design of Observers for Nonlinear Control Systems around Equilibria
  • Sundarapandian Vaidyanathan
  • A Novel Approach for MIMO OFDM Systems to Estimate I/Q Imbalance, CFO, Channel Response Using Training Sequences
  • J. Tarun Kumar and K. Anitha Sheela
  • A Trust Based Routing Scheme for Wireless Sensor Networks
  • Aveek Chakrabarti, Vishal Parekh and Atin Ruia
  • Survey of Trust Schemes on Ad-Hoc Network
  • Renu Dalal, Manju Khari and Yudhvir Singh
  • Improve Service Discovery Performance over Different Networks Utilization and Sizes
  • Intisar Al-Mejibli, Martin Colley and Salah Al-Majeed
  • Adaptive K-Means Clustering to Handle Heterogeneous Data Using Basic Rough Set Theory
  • B. K. Tripathy, Adhir Ghosh and G. K. Panda
  • Geralized Projective Synchronization of Double-Scroll Chaotic Systems Using Active Feedback Control
  • Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata
  • Himadri Nath Saha, Debika Bhattachayya and P. K. Banerjee
  • A Location Dependent Semantic Cache Replacement Strategy in Mobile Environment
  • Kahkashan Tabassum, Mahmood Quadri Syed and A. Damodaram
  • Connectivity of Autonomous Agents Using Ad-Hoc Mobile Router Networks
  • Emi Mathews and Ciby Mathew
  • A New Approach to Stegnography
  • Soumik Mukherjee, Moumita Deb, Pratik Kumar Agarwal and Abhinava Roy
  • Survey on Key Pre Distribution for Security in Wireless Sensor Networks
  • T. P. Rani and C. Jaya Kumar
  • Sundarapandian Vaidyanathan and Sarasu Pakiriswamy
  • Mobile Ad Hoc Networks Security Attacks and Secured Routing Protocols: A Survey
  • Supriya and Manju Khari
  • Privacy and Security in Digital Networks from the Perspective of Modeling and Software Development
  • Erich Ortner
  • A Logical Topology to Find Alternate Routes in WDM Lightwave Network
  • Santosh Das and Abhijit Makhal
  • Handover Latency Measurement of Mobile IPv6 in a Testbed Environment
  • Muhammad Arif Amin, Kamalrulnizam Bin Abu Bakar, Abdul Hanan Abdullah, Mahesh Nair and Rashid Hafeez Khokhar
  • Different Strategy for Data Management in Mobile Computing
  • Chandrani Chakravorty and J. Usha
  • Generic Network Visualization Tool for Monitoring Adhoc Wireless Networks
  • Girish Revadigar and Chitra Javali
  • Adaptive MMSE Equalizer through LMS Algorithm Based CMA Channel Equalization
  • R. Nirmala Devi, Tara Saikumar and K. Kishan Rao
  • Weighted Angle Based Approach for Face Recognition
  • M. Koteswara Rao, K. Veeraswamy, K. Anitha Sheela and B. Chandra Mohan
  • Part 2.
  • Multiple Mobile Agents based Data Dissemination Protocol for Wireless Sensor Networks
  • Govind P. Gupta, Manoj Misra and Kumkum Garg
  • Enhanced Cluster Based Routing Protocol for MANETS
  • Kartheek Srungaram and M. H. M. Krishna Prasad
  • Soft Computing Technique Based Call Admission Control Decision Mechanism
  • H. S. Ramesh Babu, Gowrishankar, G. Mahesh and P. S. Satyanarayana
  • Mechanisms Supporting Mobility in WSNs
  • Saimadhavi and Y. S. Kumarswamy
  • Wireless and Mobile Networks
  • A Link Distance Ratio Based Stable Multicast Routing Protocol for Mobile Ad Hoc Networks
  • Natarajan Meghanathan
  • A New Security Solution Architecture (SSA) for MANETS against Network Layer Attacks
  • G. S. Mamatha
  • Analysis of Different Associative Memory Neural Network for GPS/INS Data Fusion
  • S. Angel Deborah
  • Energy Efficient Hierarchical Clustering Routing Protocol for Wireless Sensor Networks
  • Diwakar Meenakshi and Sushil Kumar
  • An Analysis on Energy Efficient System Design in Grid Computing
  • D. Ramesh and A. Krishnan
  • Cluster-based Power Aware Scheduling (CPAS) Algorithm for Network Longevity in WSN
  • K. Arthi and P. Vanaja Ranjan
  • Development of System for GPS Data Transmission to Web Server for Online over Head Conductor Sag Measurement
  • Sangeeta Kamboj and Ratna Dahiya
  • A Comparative Study of Partitioning Algorithms for Wireless Sensor Networks
  • Zeenat Rehena, Debasree Das, Sarbani Roy and Nandini Mukherjee
  • An Optimal RPC Based Approach to Increase Fault in Wireless Ad-Hoc Network
  • Sensor-Cloud: Assimilation of Wireless Sensor Network and the Cloud
  • Sanjit Kumar Dash, Jyoti Prakash Sahoo, Subasish Mohapatra and Sarada Prasanna Pati
  • Game Theoretic Model for Selfish Node Avoidance in Ad Hoc Networks
  • Upasana Dohare, D. K. Lobiyal and Sushil Kumar
  • Performance Evaluation of VANET Using Realistic Vehicular Mobility
  • Nidhi and D. K. Lobiyal
  • Ensuring Data Confidentiality and Privacy in Mobile Ad Hoc Networks
  • Hamza Aldabbas, Helge Janicke, Radwan AbuJassar and Tariq Alwada'n
  • Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)
  • Dhyanendra Jain, Pallavi Khatri, Rishi Soni and Brijesh Kumar Chaurasia
  • Rabindra Kumar Shial, K. Hemant Ku. Reddy and K. L. Narayana
  • Location Management and Resource Allocation Using Load Balancing in Wireless Heterogeneous Networks
  • G. Adiline Macriga and V. S. Surya
  • Cross Language Information Retrieval Approach in Peer-to-Peer Network
  • M. Archana and K. A. Sumithra Devi
  • Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach
  • Saurabh Upadhyay and Brijesh Kumar Chaurasia
  • Securing the National Knowledge Network
  • S. V. Nagaraj
  • Pattern Based IDS Using Supervised, Semi-supervised and Unsupervised Approaches
  • Vinod K. Pachghare, Vaibhav K. Khatavkar and Parag Kulkarni
  • A Secure Session Transfer Protocol for Downloading a Large File across a Cluster of Servers in the Presence of Network Congestion
  • Natarajan Meghanathan and Bhadrachalam Chitturi
  • An Improved Anti Spam Filter Based on Content, Low Level Features and Noise
  • Anand Gupta, Chhavi Singhal and Somya Aggarwal
  • Part 3.
  • Network Security
  • Dependable Solutions Design by Agile Modeled Layered Security Architectures
  • M. Upendra Kumar, D. Sravan Kumar, B. Padmaja Rani, K. Venkateswar Rao and A. V. Krishna Prasad, et al.
  • Block Lanczos to Solve Integer Factorization Problem Using GPU's
  • Harish Malla, Vilas SantKaustubh, Rajasekharan Ganesh and Padmavathy R.
  • Lattice Based Tools for Cryptanalysis in Various Applications
  • R. Santosh Kumar, C. Narasimham and S. Pallam Setty
  • Modified Chain Code Histogram Feature for Handwritten Character Recognition
  • Jitendra Jain, Soyuj Kumar Sahoo, S. R. Mahadeva Prasanna and G. Siva Reddy
  • A Novel Image Edge Detection Method Using Simplified Gabor Wavelet
  • C. Sujatha and D. Selvathi
  • Low Power Spatial Modulation Scheme for Wide Band Multiple Input and Multiple Output Wireless Communication Systems
  • Dhirendra Kumar Tripathi, S. Saravanan and HarNarayan Upadhyay
  • Diameter Single Sign On - Secure and Personalized Service Provision via Authentication and Authorization Mechanisms
  • Robayet Nasim
  • Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems
  • K. G. Srinivasa
  • A New Symmetric Key Cryptosystem Based on Feistel Network: Parallel Dependent Feistel Network (PDFN)
  • Indrajit Das and R. Saravanan
  • Survey of Shape Based Boundary Methods for Leaf Retrieval
  • Komal Asrani, Renu Jain and Deepak Asrani
Dimensions
unknown
Extent
1 online resource (xxix, 645 p.)
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642272981
Level of compression
uncompressed
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)793002488
  • (OCoLC)ocn793002488

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...