|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Journal on Data Semantics XV
by Spaccapietra, Stefano.
Publication:
. XV, 193 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XIII
by Gavrilova, Marina L.
Publication:
. XX, 205 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Optimization and Applications
by Wang, Weifan.
Publication:
. XII, 562 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Decision for Artificial Intelligence
by Torra, Vicenç.
Publication:
. XIII, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Hybrid Deliberative Layer for Robotic Agents
by Hartanto, Ronny.
Publication:
. XXII, 215 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rule-Based Reasoning, Programming, and Applications
by Bassiliades, Nick.
Publication:
. XIII, 385 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Parampalli, Udaya.
Publication:
. XIII, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Networks
by Frey, Hannes.
Publication:
. XI, 361p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Cuellar, Jorge.
Publication:
. X, 271 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Collaborative Agents - Research and Development
by Guttmann, Christian.
Publication:
. VIII, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
User Modeling, Adaption and Personalization
by Konstan, Joseph A.
Publication:
. XIX, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Logic in Multi-Agent Systems
by Leite, João.
Publication:
. XV, 383 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scientific and Statistical Database Management
by Bayard Cushing, Judith.
Publication:
. XVII, 602p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXV
by Li, Yingjiu.
Publication:
. XI, 309p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XII
by Gavrilova, Marina L.
Publication:
. XIV, 279 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Data Structures
by Dehne, Frank.
Publication:
. XV, 718p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 285 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Engineering
by Auer, Sören.
Publication:
. XIV, 420p.
Availability:
Copies available:
AUM Main Library
(1),
|
|