|
|
Reliable Software Technologies – Ada-Europe 2013
by Keller, Hubert B.
Publication:
. XII, 177 p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Techniques for Distributed Systems
by Beyer, Dirk.
Publication:
. XIV, 321 p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Applied Artificial Intelligence
by Ali, Moonis.
Publication:
. XX, 697 p. 279 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automated Deduction – CADE-24
by Bonacina, Maria Paola.
Publication:
. XVI, 466 p. 95 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Processing in Computer-Assisted Interventions
by Barratt, Dean.
Publication:
. X, 111 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Wang, Jianyong.
Publication:
. XXVIII, 812 p. 326 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2013
by Youssef, Amr.
Publication:
. XIV, 453 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Applications and Interoperable Systems
by Dowling, Jim.
Publication:
. XII, 205 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Science – Theory and Applications
by Bulatov, Andrei A.
Publication:
. XII, 445 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
by Cavallaro, Lorenzo.
Publication:
. XVI, 145 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Experimental Algorithms
by Bonifaci, Vincenzo.
Publication:
. XII, 416 p. 81 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Kutyłowski, Mirosław.
Publication:
. XII, 393 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hybrid Metaheuristics
by Blesa, María J.
Publication:
. X, 213 p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Collective Intelligence X
by Nguyen, Ngoc-Thanh.
Publication:
. XII, 207 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Coordination Models and Languages
by Nicola, Rocco.
Publication:
. XIV, 251 p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Artificial Intelligence
by Zaïane, Osmar R.
Publication:
. XIV, 372 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wired/Wireless Internet Communication
by Tsaoussidis, Vassilis.
Publication:
. XII, 277 p. 145 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2013
by Johansson, Thomas.
Publication:
. XIV, 736 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Intelligence Methods for Bioinformatics and Biostatistics
by Peterson, Leif E.
Publication:
. XII, 185 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Information Systems Engineering – WISE 2011 and 2012 Workshops
by Haller, Armin.
Publication:
. XVI, 350 p. 105 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|