//]]>
FM 2011: Formal Methods by Butler, Michael. Publication: . XIV, 450p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multidisciplinary Information Retrieval by Hanbury, Allan. Publication: . X, 149p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence in Security for Information Systems by Herrero, Álvaro. Publication: . XIV, 310p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Inductive Logic Programming by Frasconi, Paolo. Publication: . XI, 278p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Artificial Intelligent Systems by Corchado, Emilio. Publication: . XXIX, 490 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Artificial Intelligent Systems by Corchado, Emilio. Publication: . XXX, 472 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Models in Software Engineering by Dingel, Juergen. Publication: . XII, 416p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management by Atallah, Mikhail. Publication: . XIII, 390p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semanic Web: Research and Applications by Antoniou, Grigoris. Publication: . XXIV, 520p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication by Ardagna, Claudio A. Publication: . XIII, 392 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web: Research and Applications by Antoniou, Grigoris. Publication: . XXIV, 520p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Bao, Feng. Publication: . XIII, 448p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Knowledge Discovery and Data Mining by Huang, Joshua Zhexue. Publication: . XXIV, 558 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Knowledge Discovery and Data Mining by Huang, Joshua Zhexue. Publication: . XXIV, 564 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 by Domingo-Pascual, Jordi. Publication: . XXII, 381 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 by Domingo-Pascual, Jordi. Publication: . XXI, 473 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Fehr, Serge. Publication: . X, 227 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
GeoSpatial Semantics by Claramunt, Christophe. Publication: . XII, 235 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2011 by Paterson, Kenneth G. Publication: . XIV, 628p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics by Pizzuti, Clara. Publication: . X, 183 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية