|
|
Journal on Data Semantics XV
by Spaccapietra, Stefano.
Publication:
. XV, 193 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Decision for Artificial Intelligence
by Torra, Vicenç.
Publication:
. XIII, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Parampalli, Udaya.
Publication:
. XIII, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Networks
by Frey, Hannes.
Publication:
. XI, 361p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Cuellar, Jorge.
Publication:
. X, 271 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Engineering Techniques
by Huzar, Zbigniew.
Publication:
. XI, 291 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
User Modeling, Adaption and Personalization
by Konstan, Joseph A.
Publication:
. XIX, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scientific and Statistical Database Management
by Bayard Cushing, Judith.
Publication:
. XVII, 602p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXV
by Li, Yingjiu.
Publication:
. XI, 309p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Natural Language Processing and Information Systems
by Muñoz, Rafael.
Publication:
. XV, 350 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 285 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Engineering
by Auer, Sören.
Publication:
. XIV, 420p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Intelligence in Medicine
by Peleg, Mor.
Publication:
. XVII, 355p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Knowledge Processing and Data Analysis
by Wolff, Karl Erich.
Publication:
. XVI, 321 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVI
by Christianson, Bruce.
Publication:
. IX, 257 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 133p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Aspect-Oriented Software Development VIII
by Katz, Shmuel.
Publication:
. XIII, 221 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2011
by Nitaj, Abderrahmane.
Publication:
. XIII, 387p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Intelligence Methods for Bioinformatics and Biostatistics
by Rizzo, Riccardo.
Publication:
. XIII, 288 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|