|
|
Pairing-Based Cryptography - Pairing 2010
by Joye, Marc.
Publication:
. XIII, 467p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2010
by Gong, Guang.
Publication:
. XVI, 366p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology - ASIACRYPT 2010
by Abe, Masayuki.
Publication:
. XIV, 634p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
From Active Data Management to Event-Based Systems and More
by Sachs, Kai.
Publication:
. XIV, 337p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Alpcan, Tansu.
Publication:
. X, 281p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Retrieval Technology
by Cheng, Pu-Jen.
Publication:
. XIII, 627p. 152 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms for Sensor Systems
by Scheideler, Christian.
Publication:
. X, 190p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Motion in Games
by Boulic, Ronan.
Publication:
. XII, 436p. 210 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems, OTM 2010
by Meersman, Robert.
Publication:
. XXII, 466p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems: OTM 2010
by Meersman, Robert.
Publication:
. XXII, 703p. 230 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Theoretic Concepts in Computer Science
by Thilikos, Dimitrios M.
Publication:
. XIII, 338p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Methods and Software Engineering
by Dong, Jin Song.
Publication:
. XIV, 712p. 202 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modelling Autonomic Communication Environments
by Brennan, Rob.
Publication:
. X, 125p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Echizen, Isao.
Publication:
. XIII, 371p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification: Security and Privacy Issues
by Ors Yalcin, Siddika Berna.
Publication:
. X, 271p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Soft Computing
by Sidorov, Grigori.
Publication:
. XXIV, 515p. 200 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Collective Intelligence. Technologies and Applications
by Pan, Jeng-Shyang.
Publication:
. XV, 514p. 257 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Collective Intelligence. Technologies and Applications
by Pan, Jeng-Shyang.
Publication:
. XV, 472p. 269 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Collective Intelligence. Technologies and Applications
by Pan, Jeng-Shyang.
Publication:
. XXVII, 534p. 217 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
by Bloch, Isabelle.
Publication:
. XVII, 571p. 210 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|