|
|
Numerical Analysis and Its Applications
by Dimov, Ivan.
Publication:
. XII, 572 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data
by Sun, Maosong.
Publication:
. XIV, 354 p. 87 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Riis Nielson, Hanne.
Publication:
. XIV, 321 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Hämmerli, Bernhard M.
Publication:
. XIV, 277 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructure Security
by Bologna, Sandro.
Publication:
. XII, 227 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Distributed Computing Systems
by Pathan, Mukaddim.
Publication:
. XI, 400 p. 179 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Intelligent Data Analysis XII
by Tucker, Allan.
Publication:
. XIV, 464 p. 140 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Game Theory
by Vöcking, Berthold.
Publication:
. XII, 271 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Sakiyama, Kazuo.
Publication:
. XII, 319 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model and Data Engineering
by Cuzzocrea, Alfredo.
Publication:
. XII, 291 p. 109 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Collaboration and Technology
by Antunes, Pedro.
Publication:
. XIV, 323 p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Semantic Web – ISWC 2013
by Alani, Harith.
Publication:
. XXXII, 468 p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Semantic Web – ISWC 2013
by Alani, Harith.
Publication:
. XXXII, 740 p. 181 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification
by Hutter, Michael.
Publication:
. XIV, 177 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Adams, Andrew A.
Publication:
. XII, 239 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rough Sets and Knowledge Technology
by Lingras, Pawan.
Publication:
. XIV, 414 p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Measurement Methodology and Tools
by Fàbrega, Lluís.
Publication:
. VIII, 205 p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research in Attacks, Intrusions, and Defenses
by Stolfo, Salvatore J.
Publication:
. XII, 476 p. 139 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Data Engineering and Automated Learning – IDEAL 2013
by Yin, Hujun.
Publication:
. XVIII, 639 p. 215 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
From Sounds to Music and Emotions
by Aramaki, Mitsuko.
Publication:
. XIV, 502 p. 159 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|