|
|
Pairing-Based Cryptography - Pairing 2010
by Joye, Marc.
Publication:
. XIII, 467p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2010
by Gong, Guang.
Publication:
. XVI, 366p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology - ASIACRYPT 2010
by Abe, Masayuki.
Publication:
. XIV, 634p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing
by Maglio, Paul P.
Publication:
. XX, 737p. 285 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Architecting Dependable Systems VII
by Casimiro, Antonio.
Publication:
. XII, 324p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Alpcan, Tansu.
Publication:
. X, 281p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Programming Languages and Systems
by Ueda, Kazunori.
Publication:
. X, 440p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Current Trends in Web Engineering
by Daniel, Florian.
Publication:
. XXVII, 595p. 202 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Middleware 2010
by Gupta, Indranil.
Publication:
. XIII, 398p. 166 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems, OTM 2010
by Meersman, Robert.
Publication:
. XXII, 466p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Move to Meaningful Internet Systems: OTM 2010
by Meersman, Robert.
Publication:
. XXII, 703p. 230 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Echizen, Isao.
Publication:
. XIII, 371p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification: Security and Privacy Issues
by Ors Yalcin, Siddika Berna.
Publication:
. X, 271p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Collective Intelligence. Technologies and Applications
by Pan, Jeng-Shyang.
Publication:
. XV, 514p. 257 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Collective Intelligence. Technologies and Applications
by Pan, Jeng-Shyang.
Publication:
. XV, 472p. 269 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Collective Intelligence. Technologies and Applications
by Pan, Jeng-Shyang.
Publication:
. XXVII, 534p. 217 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomic and Trusted Computing
by Xie, Bing.
Publication:
. XVII, 328p. 112 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Leveraging Applications of Formal Methods, Verification, and Validation
by Margaria, Tiziana.
Publication:
. XV, 498p. 157 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Leveraging Applications of Formal Methods, Verification, and Validation
by Margaria, Tiziana.
Publication:
. XX, 708p. 220 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Intelligence and Computational Intelligence
by Wang, Fu Lee.
Publication:
. XXI, 498p. 203 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|