//]]>
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba by Subrahmanian, V.S. Publication: . XIV, 231 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent-Based Semantic Web Service Composition by Kumar, Sandeep. Publication: . X, 57 p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Interworking of Wireless LANs and Cellular Networks by Song, Wei. Publication: . VIII, 67 p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Group Cell Architecture for Cooperative Communications by Tao, Xiaofeng. Publication: New York, NY : Springer New York : | Imprint: Springer, 2012 Date:2012 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimedia Signals and Systems by Stanković, Srdjan. Publication: . XXV, 349 p. 249 illus., 149 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Factors in Augmented Reality Environments by Huang, Weidong. Publication: . X, 273 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Social Networks by Altshuler, Yaniv. Publication: . VI, 253 p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Visual Indexing and Retrieval by Benois-Pineau, Jenny. Publication: . VIII, 107p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rhodes Framework for Android™ Platform and BlackBerry® Smartphones by Vohra, Deepak. Publication: Boston, MA : Springer US, 2012 Date:2012 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Era of Interactive Media by Jin, Jesse S. Publication: . XVI, 681 p. 319 illus., 5 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Power Distribution and Performance Analysis for Wireless Communication Networks by Zhao, Dongmei. Publication: . IX, 99p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mining Text Data by Aggarwal, Charu C. Publication: . XI, 522p. 37 illus., 10 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic Cooperative Networking by Wódczak, Michał. Publication: . XIV, 100p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Peer-to-Peer Query Processing over Multidimensional Data by Vlachou, Akrivi. Publication: . XII, 84p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Survey of Data Leakage Detection and Prevention Solutions by Shabtai, Asaf. Publication: . VIII, 92 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy III by Schneier, Bruce. Publication: . X, 283 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Design of Cloud Workflow Systems by Liu, Xiao. Publication: . XIV, 97p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Performance of Web Services by Tari, Zahir. Publication: . XII, 244p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Financial and Medical Identity Theft by Camp, L. Jean. Publication: . XI, 166p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Primer of Multicast Routing by Rosenberg, Eric. Publication: . X, 117p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Refine your search