//]]>
Towards a Service-Based Internet. ServiceWave 2010 Workshops by Cezon, Michel. Publication: . XXIX, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Languages, Methodologies, and Development Tools for Multi-Agent Systems by Dastani, Mehdi. Publication: . IX, 153 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Computer Mathematics by Davenport, James H. Publication: . XIII, 312 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ECOOP 2011 – Object-Oriented Programming by Mezini, Mira. Publication: . XIV, 660p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Edutainment VI by Pan, Zhigeng. Publication: . XI, 266 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Camenisch, Jan. Publication: . XII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Journal on Data Semantics XV by Spaccapietra, Stefano. Publication: . XV, 193 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XIII by Gavrilova, Marina L. Publication: . XX, 205 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modeling Decision for Artificial Intelligence by Torra, Vicenç. Publication: . XIII, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Graphics by Dickmann, Lutz. Publication: . XI, 203 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rule-Based Reasoning, Programming, and Applications by Bassiliades, Nick. Publication: . XIII, 385 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Parampalli, Udaya. Publication: . XIII, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-hoc, Mobile, and Wireless Networks by Frey, Hannes. Publication: . XI, 361p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Cuellar, Jorge. Publication: . X, 271 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Collaborative Agents - Research and Development by Guttmann, Christian. Publication: . VIII, 187p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Holz, Thorsten. Publication: . X, 235p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Engineering Techniques by Huzar, Zbigniew. Publication: . XI, 291 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Immune Systems by Liò, Pietro. Publication: . XVI, 468p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
User Modeling, Adaption and Personalization by Konstan, Joseph A. Publication: . XIX, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scientific and Statistical Database Management by Bayard Cushing, Judith. Publication: . XVII, 602p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart