//]]>
Security Protocols XX by Christianson, Bruce. Publication: . X, 277 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent Based Simulation for a Sustainable Society and Multi-agent Smart Computing by Cranefield, Stephen. Publication: . X, 125 p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and Parallel Computing by Park, James J. Publication: . XX, 647 p. 253 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coordination, Organizations, Institutions, and Norms in Agent System VII by Cranefield, Stephen. Publication: . XIV, 221 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ubiquitous Computing and Ambient Intelligence by Bravo, José. Publication: . XX, 523 p. 187 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Mitchell, Chris J. Publication: . X, 117 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ambient Intelligence by Paternò, Fabio. Publication: . XVI, 461 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Blyth, Jim. Publication: . X, 141 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Bogdanov, Andrey. Publication: . XII, 173 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human-Centered Software Engineering by Winckler, Marco. Publication: . XII, 370 p. 121 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provenance and Annotation of Data and Processes by Groth, Paul. Publication: . XII, 256 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Robotics by Ge, Shuzhi Sam. Publication: . XVIII, 663 p. 332 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Large-Scale Complex IT Systems. Development, Operation and Management by Calinescu, Radu. Publication: . XII, 417 p. 143 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Leveraging Applications of Formal Methods, Verification and Validation. Applications and Case Studies by Margaria, Tiziana. Publication: . XVI, 361 p. 129 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change by Margaria, Tiziana. Publication: . XVI, 617 p. 170 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Serna, Maria. Publication: . X, 263 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human-Computer Interaction, Tourism and Cultural Heritage by Cipolla-Ficarra, Francisco. Publication: . X, 157 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Network Security by Kotenko, Igor. Publication: . XIV, 319 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiagent System Technologies by Timm, Ingo J. Publication: . XII, 179 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Serious Games Development and Applications by Ma, Minhua. Publication: . XII, 269 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart