|
|
Advances in Information and Computer Security
by Sakiyama, Kazuo.
Publication:
. XII, 319 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model and Data Engineering
by Cuzzocrea, Alfredo.
Publication:
. XII, 291 p. 109 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Collaboration and Technology
by Antunes, Pedro.
Publication:
. XIV, 323 p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Semantic Web – ISWC 2013
by Alani, Harith.
Publication:
. XXXII, 468 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Semantic Web – ISWC 2013
by Alani, Harith.
Publication:
. XXXII, 740 p. 181 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification
by Hutter, Michael.
Publication:
. XIV, 177 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Adams, Andrew A.
Publication:
. XII, 239 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rough Sets and Knowledge Technology
by Lingras, Pawan.
Publication:
. XIV, 414 p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Measurement Methodology and Tools
by Fàbrega, Lluís.
Publication:
. VIII, 205 p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research in Attacks, Intrusions, and Defenses
by Stolfo, Salvatore J.
Publication:
. XII, 476 p. 139 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Data Engineering and Automated Learning – IDEAL 2013
by Yin, Hujun.
Publication:
. XVIII, 639 p. 215 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
From Sounds to Music and Emotions
by Aramaki, Mitsuko.
Publication:
. XIV, 502 p. 159 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Semantic Web: ESWC 2013 Satellite Events
by Cimiano, Philipp.
Publication:
. XXII, 347 p. 102 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Information Systems Engineering – WISE 2013
by Lin, Xuemin.
Publication:
. XXVIII, 526 p. 174 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Susilo, Willy.
Publication:
. X, 347 p. 36 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Gierlichs, Benedikt.
Publication:
. XIV, 191 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Large-Scale Data- and Knowledge-Centered Systems X
by Hameurlain, Abdelkader.
Publication:
. XII, 201 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing
by Ciucci, Davide.
Publication:
. XIV, 398 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Methods and Software Engineering
by Groves, Lindsay.
Publication:
. XVIII, 466 p. 136 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
New Trends in Image Analysis and Processing – ICIAP 2013
by Petrosino, Alfredo.
Publication:
. XXIV, 561 p. 229 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|