|
|
Transactions on Computational Collective Intelligence I
by Nguyen, Ngoc Thanh.
Publication:
. VII, 207p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fields of Logic and Computation
by Blass, Andreas.
Publication:
. XIII, 627p. 49 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sion, Radu.
Publication:
. X, 257p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Logic in Multi-Agent Systems
by Dix, Jürgen.
Publication:
. XIV, 257p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Coordination, Organizations, Institutions and Norms in Agent Systems V
by Padget, Julian.
Publication:
. XVIII, 335p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Future Internet - FIS 2009
by Zseby, Tanja.
Publication:
. IX, 117p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Social Network Mining and Analysis
by Giles, Lee.
Publication:
. XI, 131p. 47 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Spaces and Next Generation Wired/Wireless Networking
by Balandin, Sergey.
Publication:
. XVI, 486p. 212 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Programming Multi-Agent Systems
by Braubach, Lars.
Publication:
. XII, 285p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Wimmer, Maria A.
Publication:
. XIV, 437p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-Hoc, Mobile and Wireless Networks
by Nikolaidis, Ioanis.
Publication:
. X, 222p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Network Security
by Kotenko, Igor.
Publication:
. XIII, 345p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Algorithms, Systems, and Applications
by Pandurangan, Gopal.
Publication:
. XV, 256p. 156 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2010
by Rabin, Tal.
Publication:
. XIV, 744p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Diagrammatic Representation and Inference
by Goel, Ashok K.
Publication:
. XIII, 356p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 263p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Database Systems for Advanced Applications
by Yoshikawa, Masatoshi.
Publication:
. XIX, 472p. 192 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Atallah, Mikhail J.
Publication:
. X, 291p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Kurosawa, Kaoru.
Publication:
. X, 249p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Services and Formal Methods
by Laneve, Cosimo.
Publication:
. VII, 197p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|