//]]>
Software Architecture by Babar, Muhammad Ali. Publication: . XII, 534p. 162 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Management in Grid and Peer-to-Peer Systems by Hameurlain, Abdelkader. Publication: . X, 161p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Warehousing and Knowledge Discovery by Bach Pedersen, Torben. Publication: . X, 338p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge Management and Acquisition for Smart Systems and Services by Kang, Byeong-Ho. Publication: . X, 313p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Collective Intelligence I by Nguyen, Ngoc Thanh. Publication: . VII, 207p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sion, Radu. Publication: . X, 257p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coordination, Organizations, Institutions and Norms in Agent Systems V by Padget, Julian. Publication: . XVIII, 335p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Internet - FIS 2009 by Zseby, Tanja. Publication: . IX, 117p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Social Network Mining and Analysis by Giles, Lee. Publication: . XI, 131p. 47 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Spaces and Next Generation Wired/Wireless Networking by Balandin, Sergey. Publication: . XVI, 486p. 212 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Wimmer, Maria A. Publication: . XIV, 437p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-Hoc, Mobile and Wireless Networks by Nikolaidis, Ioanis. Publication: . X, 222p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Algorithms, Systems, and Applications by Pandurangan, Gopal. Publication: . XV, 256p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2010 by Rabin, Tal. Publication: . XIV, 744p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 263p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database Systems for Advanced Applications by Yoshikawa, Masatoshi. Publication: . XIX, 472p. 192 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Services and Formal Methods by Laneve, Cosimo. Publication: . VII, 197p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resource Discovery by Lacroix, Zoé. Publication: . IX, 141p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart