|
|
Computing with Instinct
by Cai, Yang.
Publication:
. XIII, 163 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects of Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 239 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Computing, Behavioral-Cultural Modeling and Prediction
by Salerno, John.
Publication:
. XIII, 384 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Selected Areas in Cryptography
by Biryukov, Alex.
Publication:
. XIII, 411 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rainbow of Computer Science
by Calude, Cristian S.
Publication:
. XII, 285p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIV, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Passive and Active Measurement
by Spring, Neil.
Publication:
. XI, 246 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Research Problems in Network Security
by Camenisch, Jan.
Publication:
. VIII, 171 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Architecture of Computing Systems - ARCS 2011
by Berekovic, Mladen.
Publication:
. XIII, 271p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Privacy
by Camenisch, Jan.
Publication:
. Approx. 800 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Edutainment V
by Pan, Zhigeng.
Publication:
. X, 271 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human-Computer Interaction, Tourism and Cultural Heritage
by Cipolla Ficarra, Francisco V.
Publication:
. VIII, 195p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Toward Autonomous, Adaptive, and Context-Aware Multimodal Interfaces. Theoretical and Practical Issues
by Esposito, Anna.
Publication:
. XXII, 474p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Chung, Yongwha.
Publication:
. XIII, 352p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provenance and Annotation of Data and Processes
by McGuinness, Deborah L.
Publication:
. XII, 306p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols
by Christianson, Bruce.
Publication:
. VIII, 257p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Semantic Web – ISWC 2010
by Patel-Schneider, Peter F.
Publication:
. XXI, 833p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Web-Based Learning – ICWL 2010
by Luo, Xiangfeng.
Publication:
. XIV, 412p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Robotics
by Ge, Shuzhi Sam.
Publication:
. XV, 412p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Methods for Components and Objects
by Boer, Frank S.
Publication:
. X, 339p.
Availability:
Copies available:
AUM Main Library
(1),
|
|