//]]>
Global Sourcing of Information Technology and Business Processes by Oshri, Ilan. Publication: . VIII, 271p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Compiler Design by Wilhelm, Reinhard. Publication: . XIII, 187p. 86 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Music Recommendation and Discovery by Celma, Ã’scar. Publication: . XVI, 194p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Programming by Rauber, Thomas. Publication: . X, 456 p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise by Dimitrakos, Theo. Publication: . XV, 210 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Semantic Web Technologies by Domingue, John. Publication: . XX, 1056p. eReference. In 2 volumes, not available separately. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Unsupervised Information Extraction by Text Segmentation by Cortez, Eli. Publication: . XV, 94 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Python Programming Fundamentals by Lee, Kent D. Publication: . XII, 241p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Discrete Calculus by Grady, Leo J. Publication: . XVI, 366p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modeling and Simulating Bodies and Garments by Magnenat-Thalmann, Nadia. Publication: . XVIII, 186p. 142 illus., 22 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Essential PIC18® Microcontroller by Katzen, Sid. Publication: . XII, 612p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fundamentals of Predictive Text Mining by Weiss, Sholom M. Publication: . XIV, 283p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Methods in Biometric Authentication by Schuckers, Michael E. Publication: . XXV, 317p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Support Vector Machines for Pattern Classification by Abe, Shigeo. Publication: . XX, 473p. 228 illus., 114 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods: State of the Art and New Directions by Boca, Paul. Publication: . XXVI, 273 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust for Intelligent Recommendation by Bhuiyan, Touhid. Publication: . XIV, 119 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Health Informatics in the Cloud by Braunstein, Mark L. Publication: . XVI, 98 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba by Subrahmanian, V.S. Publication: . XIV, 231 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy III by Schneier, Bruce. Publication: . X, 283 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Computer Science by Torbert, Shane. Publication: . X, 202 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart