//]]>
Radio Frequency Identification: Security and Privacy Issues by Ors Yalcin, Siddika Berna. Publication: . X, 271p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Soft Computing by Sidorov, Grigori. Publication: . XXIV, 515p. 200 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XV, 514p. 257 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XV, 472p. 269 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XXVII, 534p. 217 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications by Bloch, Isabelle. Publication: . XVII, 571p. 210 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Runtime Verification by Barringer, Howard. Publication: . XIII, 492p. 145 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Intelligence and Computational Intelligence by Wang, Fu Lee. Publication: . XXI, 498p. 203 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Intelligence and Computational Intelligence by Wang, Fu Lee. Publication: . XXII, 386p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Job Scheduling Strategies for Parallel Processing by Frachtenberg, Eitan. Publication: . XI, 223p. 99 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computation and Intelligence by Cai, Zhihua. Publication: . XV, 536p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Martinelli, Fabio. Publication: . X, 303p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Böhme, Rainer. Publication: . X, 277p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ubiquitous Knowledge Discovery by May, Michael. Publication: . X, 255p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Property Testing by Goldreich, Oded. Publication: . XI, 359p. 5 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Bao, Feng. Publication: . XIII, 460p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Semantic Web Rules by Dean, Mike. Publication: . XIII, 305p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Heng, Swee-Huay. Publication: . X, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integrated Formal Methods by Méry, Dominique. Publication: . X, 337p. 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science VIII by Gavrilova, Marina L. Publication: . XIV, 167p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart