|
|
Cognitive Agents for Virtual Environments
by Dignum, Frank.
Publication:
. XII, 185 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Process Support and Knowledge Representation in Health Care
by Lenz, Richard.
Publication:
. XIV, 183 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Architecture of Computing Systems – ARCS 2013
by Kubátová, Hana.
Publication:
. XIV, 354 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Retrieval Meets Information Visualization
by Agosti, Maristella.
Publication:
. X, 177 p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Hiding
by Kirchner, Matthias.
Publication:
. X, 285 p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public-Key Cryptography – PKC 2013
by Kurosawa, Kaoru.
Publication:
. XIV, 518 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Chinese Lexical Semantics
by Ji, Donghong.
Publication:
. XVI, 838 p. 129 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography – Pairing 2012
by Abdalla, Michel.
Publication:
. XVI, 333 p. 18 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Reversible Computation
by Glück, Robert.
Publication:
. X, 241 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agents and Data Mining Interaction
by Cao, Longbing.
Publication:
. XII, 217 p. 81 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Assurances for Self-Adaptive Systems
by Cámara, Javier.
Publication:
. X, 341 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVII
by Christianson, Bruce.
Publication:
. X, 367 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation
by Ayala, José L.
Publication:
. IX, 258 p. 150 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification. Security and Privacy Issues
by Hoepman, Jaap-Henk.
Publication:
. X, 181 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Construction and Evolution of Code Generators
by Jörges, Sven.
Publication:
. XXIV, 246 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2013
by Dawson, Ed.
Publication:
. XIV, 405 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms for Sensor Systems
by Bar-Noy, Amotz.
Publication:
. X, 145 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Language Engineering
by Czarnecki, Krzysztof.
Publication:
. XII, 413 p. 172 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Citizen in Sensor Networks
by Nin, Jordi.
Publication:
. VIII, 95 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Internet Technology
by Hota, Chittaranjan.
Publication:
. XIV, 574 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|