|
|
Human Factors in Augmented Reality Environments
by Huang, Weidong.
Publication:
. X, 273 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Social Networks
by Altshuler, Yaniv.
Publication:
. VI, 253 p. 49 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Visual Indexing and Retrieval
by Benois-Pineau, Jenny.
Publication:
. VIII, 107p. 17 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Era of Interactive Media
by Jin, Jesse S.
Publication:
. XVI, 681 p. 319 illus., 5 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Power Distribution and Performance Analysis for Wireless Communication Networks
by Zhao, Dongmei.
Publication:
. IX, 99p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mining Text Data
by Aggarwal, Charu C.
Publication:
. XI, 522p. 37 illus., 10 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomic Cooperative Networking
by Wódczak, Michał.
Publication:
. XIV, 100p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy III
by Schneier, Bruce.
Publication:
. X, 283 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Design of Cloud Workflow Systems
by Liu, Xiao.
Publication:
. XIV, 97p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Performance of Web Services
by Tari, Zahir.
Publication:
. XII, 244p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Financial and Medical Identity Theft
by Camp, L. Jean.
Publication:
. XI, 166p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Primer of Multicast Routing
by Rosenberg, Eric.
Publication:
. X, 117p. 58 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantitative Security Risk Assessment of Enterprise Networks
by Ou, Xinming.
Publication:
. XIII, 28p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Intention Recognition
by Kiefer, Peter.
Publication:
. XVI, 168 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Effects of Traffic Structure on Application and Network Performance
by Aikat, Jay.
Publication:
. VIII, 298 p. 394 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Semantic Web Services for Web Databases
by Ouzzani, Mourad.
Publication:
. XXI, 134p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service Level Agreements for Cloud Computing
by Wieder, Philipp.
Publication:
. XXVI, 358 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intermittently Connected Mobile Ad Hoc Networks
by Jamalipour, Abbas.
Publication:
. XVIII, 110p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bootstrapping Trust in Modern Computers
by Parno, Bryan.
Publication:
. IX, 101p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Science
by Blum, Edward K.
Publication:
. X, 470 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|