//]]>
Contemporary Computing by Ranka, Sanjay. Publication: . XXIV, 613p. 264 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Intelligent Computing Theories and Applications by Huang, De-Shuang. Publication: . XVI, 580p. 243 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Contemporary Computing by Ranka, Sanjay. Publication: . XXIV, 275p. 134 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evaluation of Novel Approaches to Software Engineering by Maciaszek, Leszek A. Publication: . X, 324p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Matters Computational by Arndt, Jörg. Publication: . XIV, 978p. 475 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Enabling Real-Time Business Intelligence by Castellanos, Malu. Publication: . III, 175p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Specification and Verification of Declarative Open Interaction Models by Montali, Marco. Publication: . XXII, 411p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Logical Analysis of Hybrid Systems by Platzer, André. Publication: . XXX, 426p. 137 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Networks and Communications by Meghanathan, Natarajan. Publication: . XIX, 725p. 352 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Network Security and Applications by Meghanathan, Natarajan. Publication: . 651p. 286 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards Hardware-Intrinsic Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 407 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Locally Decodable Codes and Private Information Retrieval Schemes by Yekhanin, Sergey. Publication: . XII, 82 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Balanced Automation Systems for Future Manufacturing Networks by Ortiz, Ángel. Publication: . XIV, 310p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Exploring Services Science by Morin, Jean-Henry. Publication: . XI, 301p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Statistical Steganalysis by Böhme, Rainer. Publication: . XVI, 288 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Networked Digital Technologies by Zavoral, Filip. Publication: . XXIII, 730p. 289 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Efficient Secure Two-Party Protocols by Hazay, Carmit. Publication: . XIII, 263 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Networked Digital Technologies by Zavoral, Filip. Publication: . XXIII, 580p. 231 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Identity Management for Life by Bezzi, Michele. Publication: . XI, 316p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning to Rank for Information Retrieval by Liu, Tie-Yan. Publication: . XX, 292p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart