|
|
Security Protocols XX
by Christianson, Bruce.
Publication:
. X, 277 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agent Based Simulation for a Sustainable Society and Multi-agent Smart Computing
by Cranefield, Stephen.
Publication:
. X, 125 p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and Parallel Computing
by Park, James J.
Publication:
. XX, 647 p. 253 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Coordination, Organizations, Institutions, and Norms in Agent System VII
by Cranefield, Stephen.
Publication:
. XIV, 221 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ubiquitous Computing and Ambient Intelligence
by Bravo, José.
Publication:
. XX, 523 p. 187 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Mitchell, Chris J.
Publication:
. X, 117 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ambient Intelligence
by Paternò, Fabio.
Publication:
. XVI, 461 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Blyth, Jim.
Publication:
. X, 141 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Bogdanov, Andrey.
Publication:
. XII, 173 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human-Centered Software Engineering
by Winckler, Marco.
Publication:
. XII, 370 p. 121 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provenance and Annotation of Data and Processes
by Groth, Paul.
Publication:
. XII, 256 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Robotics
by Ge, Shuzhi Sam.
Publication:
. XVIII, 663 p. 332 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Large-Scale Complex IT Systems. Development, Operation and Management
by Calinescu, Radu.
Publication:
. XII, 417 p. 143 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Leveraging Applications of Formal Methods, Verification and Validation. Applications and Case Studies
by Margaria, Tiziana.
Publication:
. XVI, 361 p. 129 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change
by Margaria, Tiziana.
Publication:
. XVI, 617 p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Game Theory
by Serna, Maria.
Publication:
. X, 263 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human-Computer Interaction, Tourism and Cultural Heritage
by Cipolla-Ficarra, Francisco.
Publication:
. X, 157 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Network Security
by Kotenko, Igor.
Publication:
. XIV, 319 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiagent System Technologies
by Timm, Ingo J.
Publication:
. XII, 179 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Serious Games Development and Applications
by Ma, Minhua.
Publication:
. XII, 269 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|