//]]>
Human Factors in Augmented Reality Environments by Huang, Weidong. Publication: . X, 273 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Social Networks by Altshuler, Yaniv. Publication: . VI, 253 p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Visual Indexing and Retrieval by Benois-Pineau, Jenny. Publication: . VIII, 107p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Era of Interactive Media by Jin, Jesse S. Publication: . XVI, 681 p. 319 illus., 5 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Power Distribution and Performance Analysis for Wireless Communication Networks by Zhao, Dongmei. Publication: . IX, 99p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mining Text Data by Aggarwal, Charu C. Publication: . XI, 522p. 37 illus., 10 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic Cooperative Networking by Wódczak, Michał. Publication: . XIV, 100p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy III by Schneier, Bruce. Publication: . X, 283 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Design of Cloud Workflow Systems by Liu, Xiao. Publication: . XIV, 97p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Performance of Web Services by Tari, Zahir. Publication: . XII, 244p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Financial and Medical Identity Theft by Camp, L. Jean. Publication: . XI, 166p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Primer of Multicast Routing by Rosenberg, Eric. Publication: . X, 117p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantitative Security Risk Assessment of Enterprise Networks by Ou, Xinming. Publication: . XIII, 28p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Intention Recognition by Kiefer, Peter. Publication: . XVI, 168 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Effects of Traffic Structure on Application and Network Performance by Aikat, Jay. Publication: . VIII, 298 p. 394 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Semantic Web Services for Web Databases by Ouzzani, Mourad. Publication: . XXI, 134p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service Level Agreements for Cloud Computing by Wieder, Philipp. Publication: . XXVI, 358 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intermittently Connected Mobile Ad Hoc Networks by Jamalipour, Abbas. Publication: . XVIII, 110p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bootstrapping Trust in Modern Computers by Parno, Bryan. Publication: . IX, 101p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Science by Blum, Edward K. Publication: . X, 470 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية