//]]>
Computational Intelligence Methods for Bioinformatics and Biostatistics by Masulli, Francesco. Publication: . XIII, 320p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Focused Retrieval and Evaluation by Geva, Shlomo. Publication: . 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Controlled Natural Language by Fuchs, Norbert E. Publication: . X, 291p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resource Discovery by Lacroix, Zoé. Publication: . IX, 141p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Data Mining. Applications and Theoretical Aspects by Perner, Petra. Publication: . XIII, 654p. 233 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Rome, Erich. Publication: . XII, 213p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Aspects in Information and Management by Chen, Bo. Publication: . XI, 336p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Testing Techniques in Software Engineering by Borba, Paulo. Publication: . IX, 313p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Case-Based Reasoning. Research and Development by Bichindaritz, Isabelle. Publication: . 557p. 180 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Chen, Lei. Publication: . XIX, 785p. 320 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Kreibich, Christian. Publication: . XII, 219p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Conceptual Structures: From Information to Intelligence by Croitoru, Madalina. Publication: . XII, 207p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering: Foundation for Software Quality by Wieringa, Roel. Publication: . XII, 280p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Steinfeld, Ron. Publication: . XII, 403p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence for Knowledge-Based Systems Design by Hüllermeier, Eyke. Publication: . XVII, 771p. 183 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Networked Services and Applications - Engineering, Control and Management by Aagesen, Finn Arve. Publication: . XIII, 275p. 125 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Engineering by Benatallah, Boualem. Publication: . 528p. 231 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Acquisti, Alessandro. Publication: . XIII, 441p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart