نتایج جستجو
![Exchange rate regimes: choices and consequences, Volume 1](http://cdn.ketabkoo.com/covers/6/635705-n.jpg)
Exchange rate regimes: choices and consequences, Volume 1
Atish R. Ghosh, 2002![Call Admission Control in Mobile Cellular Networks](http://cdn.ketabkoo.com/covers/6/678148-n.jpg)
Call Admission Control in Mobile Cellular Networks
Sanchita Ghosh, 2013![Handbook of Transcription Factor NF-kappaB](http://cdn.ketabkoo.com/covers/7/709052-n.jpg)
Handbook of Transcription Factor NF-kappaB
Sankar Ghosh, 2006![Algorithm Design for Networked Information Technology Systems](http://cdn.ketabkoo.com/covers/7/710088-n.jpg)
Algorithm Design for Networked Information Technology Systems
Sumit Ghosh, 2003![Algorithm design for networked information technology systems](http://cdn.ketabkoo.com/covers/7/710089-n.jpg)
Algorithm design for networked information technology systems
Sumit Ghosh, 2004![Algorithm design for networked information technology systems](http://cdn.ketabkoo.com/covers/7/710090-n.jpg)
Algorithm design for networked information technology systems
Sumit Ghosh, 2004![The Indian Ocean Nodule Field: Geology and Resource Potential](http://cdn.ketabkoo.com/covers/7/710981-n.jpg)
The Indian Ocean Nodule Field: Geology and Resource Potential
Ranadhir Mukhopadhyay, Anil K. Ghosh, 2008![Nature, Economy and Society: Understanding the Linkages](http://cdn.ketabkoo.com/covers/7/720082-n.jpg)
Nature, Economy and Society: Understanding the Linkages
Nilanjan Ghosh, 2016![Biotechnology in India II](http://cdn.ketabkoo.com/covers/7/724842-n.jpg)
Biotechnology in India II
Purnendu Ghosh, 2003![Essentials of LTE and LTE-A](http://cdn.ketabkoo.com/covers/7/728909-n.jpg)
Essentials of LTE and LTE-A
Amitabha Ghosh, 2011![Essentials of LTE and LTE-A (The Cambridge Wireless Essentials Series)](http://cdn.ketabkoo.com/covers/7/728910-n.jpg)
Essentials of LTE and LTE-A (The Cambridge Wireless Essentials Series)
Amitabha Ghosh, 2011![Guarding Your Business: A Management Approach to Security](http://cdn.ketabkoo.com/covers/7/735888-n.jpg)
Guarding Your Business: A Management Approach to Security
Sumit Ghosh, 2004![Principles of Secure Network Systems Design](http://cdn.ketabkoo.com/covers/7/735889-n.jpg)
Principles of Secure Network Systems Design
Sumit Ghosh (auth.), 2002![Flood of Fire (Ibis Triology Part 3)](http://cdn.ketabkoo.com/covers/7/736089-n.jpg)
Flood of Fire (Ibis Triology Part 3)
Amitav Ghosh, 2015![How to learn calculus of one variable](http://cdn.ketabkoo.com/covers/7/753729-n.jpg)
How to learn calculus of one variable
J.D. Ghosh, 2004![Visibility Algorithms in the Plane](http://cdn.ketabkoo.com/covers/7/754870-n.jpg)
Visibility Algorithms in the Plane
Ghosh S.K., 2007![Proceedings of the 6th SIAM International Conference on Data Mining](http://cdn.ketabkoo.com/covers/7/763444-n.jpg)
Proceedings of the 6th SIAM International Conference on Data Mining
Joydeep Ghosh, 2006![Foundations of Data Organization](http://cdn.ketabkoo.com/covers/7/766883-n.jpg)
Foundations of Data Organization
Sakti P. Ghosh (auth.), 1987![Proceedings of the Sixth SIAM International Conference on Data Mining](http://cdn.ketabkoo.com/covers/7/778264-n.jpg)
Proceedings of the Sixth SIAM International Conference on Data Mining
Joydeep Ghosh, 2006![Diabetes](http://cdn.ketabkoo.com/covers/7/790912-n.jpg)