//]]>
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks by Raghavan, S.V. Publication: . XVI, 348 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Practice of Computation by Nishizaki, Shin-ya. Publication: . XII, 295 p. 130 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Natural Computing and Beyond by Suzuki, Yasuhiro. Publication: . XII, 155 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent-Based Approaches in Economic and Social Complex Systems VII by Murata, Tadahiko. Publication: . X, 262 p. 98 illus., 15 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Methods, Techniques, and Applications in Modeling and Simulation by Kim, Jong-Hyun. Publication: . XIV, 527 p. 330 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Practice of Computation by Nishizaki, Shin-ya. Publication: . X, 215p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Aided Surgery by Dohi, Takeyoshi. Publication: . XII, 155p. 121 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Natural Computing by Peper, F. Publication: . XII, 390p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Efficient Solving of Large Arithmetic Constraint Systems with Complex Boolean Structure by Herde, Christian. Publication: . XVII, 163p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analysis and Correctness of Algebraic Graph and Model Transformations by Golas, Ulrike. Publication: . XVI, 226p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Design and Simulation of Spectrum Management Methods for Wireless Local Area Networks by Könsgen, Andreas. Publication: . XXV, 236p. 108 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Context-Based Routing in Dynamic Networks by Wenning, Bernd-Ludwig. Publication: . XXV, 187p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structural Failure Models for Fault-Tolerant Distributed Computing by Warns, Timo. Publication: . XV, 216p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture and Methods for Flexible Content Management in Peer-to-Peer Systems by Bartlang, Udo. Publication: . 240p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Domain-Specific Model-Driven Testing by Baerisch, Stefan. Publication: . 260p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Using Microsoft Dynamics AX 2009 by Luszczak, Andreas. Publication: . XIV, 341p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ISSE 2009 Securing Electronic Business Processes by Pohlmann, Norbert. Publication: . XVI, 368p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Clustering-Based Support for Software Architecture Restructuring by Streekmann, Niels. Publication: . XIX, 241p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evaluation of State-of-the-Art Hardware Architectures for Fast Cone-Beam CT Reconstruction by Scherl, Holger. Publication: . XVIII, 138p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Efficient Usage of Adabas Replication by Storr, Dieter W. Publication: . XVIII, 229p. 220 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart