|
|
Outlier Analysis
by Aggarwal, Charu C.
Publication:
. XV, 446 p. 49 illus., 10 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
by Subrahmanian, V.S.
Publication:
. XIV, 231 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence Management
by Akhgar, Babak.
Publication:
. XVI, 232 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Canadian Semantic Web
by Du, Weichang.
Publication:
. XV, 217p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Association Rule Hiding for Data Mining
by Gkoulalas-Divanis, Aris.
Publication:
. XX, 138p. 120 illus., 60 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multi-Modal User Interactions in Controlled Environments
by Djeraba, Chaabane.
Publication:
. XVI, 216p. 40 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Mining and Knowledge Discovery Handbook
by Maimon, Oded.
Publication:
. XX, 1285p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Informatics
by Yang, Christopher C.
Publication:
. VI, 206p. 120 illus., 60 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|