|
|
Transactions on Edutainment VI
by Pan, Zhigeng.
Publication:
. XI, 266 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agent-Oriented Software Engineering XI
by Weyns, Danny.
Publication:
. X, 249 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Journal on Data Semantics XV
by Spaccapietra, Stefano.
Publication:
. XV, 193 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XIII
by Gavrilova, Marina L.
Publication:
. XX, 205 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Optimization and Applications
by Wang, Weifan.
Publication:
. XII, 562 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Descriptional Complexity of Formal Systems
by Holzer, Markus.
Publication:
. X, 329p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Decision for Artificial Intelligence
by Torra, Vicenç.
Publication:
. XIII, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Hybrid Deliberative Layer for Robotic Agents
by Hartanto, Ronny.
Publication:
. XXII, 215 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Graphics
by Dickmann, Lutz.
Publication:
. XI, 203 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rule-Based Reasoning, Programming, and Applications
by Bassiliades, Nick.
Publication:
. XIII, 385 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Functional and Constraint Logic Programming
by Kuchen, Herbert.
Publication:
. VII, 157 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Parampalli, Udaya.
Publication:
. XIII, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Optical Supercomputing
by Dolev, Shlomi.
Publication:
. X, 131 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Networks
by Frey, Hannes.
Publication:
. XI, 361p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Cuellar, Jorge.
Publication:
. X, 271 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automated Deduction – CADE-23
by Bjørner, Nikolaj.
Publication:
. XIII, 508 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Collaborative Agents - Research and Development
by Guttmann, Christian.
Publication:
. VIII, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Engineering Techniques
by Huzar, Zbigniew.
Publication:
. XI, 291 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|