|
|
Towards a Service-Based Internet. ServiceWave 2010 Workshops
by Cezon, Michel.
Publication:
. XXIX, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Languages, Methodologies, and Development Tools for Multi-Agent Systems
by Dastani, Mehdi.
Publication:
. IX, 153 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Computer Mathematics
by Davenport, James H.
Publication:
. XIII, 312 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ECOOP 2011 – Object-Oriented Programming
by Mezini, Mira.
Publication:
. XIV, 660p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Edutainment VI
by Pan, Zhigeng.
Publication:
. XI, 266 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Journal on Data Semantics XV
by Spaccapietra, Stefano.
Publication:
. XV, 193 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XIII
by Gavrilova, Marina L.
Publication:
. XX, 205 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Decision for Artificial Intelligence
by Torra, Vicenç.
Publication:
. XIII, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Graphics
by Dickmann, Lutz.
Publication:
. XI, 203 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rule-Based Reasoning, Programming, and Applications
by Bassiliades, Nick.
Publication:
. XIII, 385 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Parampalli, Udaya.
Publication:
. XIII, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Networks
by Frey, Hannes.
Publication:
. XI, 361p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Cuellar, Jorge.
Publication:
. X, 271 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Collaborative Agents - Research and Development
by Guttmann, Christian.
Publication:
. VIII, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Engineering Techniques
by Huzar, Zbigniew.
Publication:
. XI, 291 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Immune Systems
by Liò, Pietro.
Publication:
. XVI, 468p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
User Modeling, Adaption and Personalization
by Konstan, Joseph A.
Publication:
. XIX, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scientific and Statistical Database Management
by Bayard Cushing, Judith.
Publication:
. XVII, 602p.
Availability:
Copies available:
AUM Main Library
(1),
|
|