|
|
Agent and Multi-Agent Systems: Technologies and Applications
by O’Shea, James.
Publication:
. XVII, 704p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Caivano, Danilo.
Publication:
. XIII, 353p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Online Communities and Social Computing
by Ozok, A. Ant.
Publication:
. XX, 388p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Design, User Experience, and Usability. Theory, Methods, Tools and Practice
by Marcus, Aaron.
Publication:
. XXXI, 676 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Design, User Experience, and Usability. Theory, Methods, Tools and Practice
by Marcus, Aaron.
Publication:
. XXXI, 718 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by McCune, Jonathan M.
Publication:
. VII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Lai, Xuejia.
Publication:
. XIV, 524p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ambient Assisted Living
by Bravo, José.
Publication:
. XII, 226p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Coordination, Organizations, Institutions, and Norms in Agent Systems VI
by Vos, Marina.
Publication:
. XVI, 377p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
by Ardagna, Claudio A.
Publication:
. XIII, 392 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Bao, Feng.
Publication:
. XIII, 448p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Future Internet
by Domingue, John.
Publication:
. XVI, 465 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Fehr, Serge.
Publication:
. X, 227 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
New Horizons in Web-Based Learning - ICWL 2010 Workshops
by Luo, Xiangfeng.
Publication:
. XXIV, 338 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy and Security Issues in Data Mining and Machine Learning
by Dimitrakakis, Christos.
Publication:
. VII, 141 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Berry, Daniel.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computing with Instinct
by Cai, Yang.
Publication:
. XIII, 163 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects of Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 239 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Computing, Behavioral-Cultural Modeling and Prediction
by Salerno, John.
Publication:
. XIII, 384 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rainbow of Computer Science
by Calude, Cristian S.
Publication:
. XII, 285p.
Availability:
Copies available:
AUM Main Library
(1),
|
|