//]]>
Computational Modeling of Objects Represented in Images by Barneva, Reneta P. Publication: . XV, 326p. 178 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2010 by Bernstein, Daniel J. Publication: . XIII, 437p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
High Performance Computing Systems and Applications by Mewhort, Douglas J. K. Publication: . XIII, 418p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pervasive Computing by Floréen, Patrik. Publication: . XV, 446p. 203 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethics and Policy of Biometrics by Kumar, Ajay. Publication: . VIII, 169p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations of Computer Software. Future Trends and Techniques for Development by Choppy, Christine. Publication: . IX, 275p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Natural Language Processing and Information Systems by Horacek, Helmut. Publication: . XVIII, 318p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Application by Gollmann, Dieter. Publication: . X, 239p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Applications by Elomaa, Tapio. Publication: . X, 261p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects in Security and Trust by Degano, Pierpaolo. Publication: . X, 279p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Auditory Display by Ystad, Sølvi. Publication: . XIII, 493p. 185 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Development of Multimodal Interfaces: Active Listening and Synchrony by Esposito, Anna. Publication: . XVII, 446p. 193 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices by Samarati, Pierangela. Publication: . XIII, 386p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Traffic Monitoring and Analysis by Ricciato, Fabio. Publication: . X, 199p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Multimedia Processing by Jiang, Xiaoyi. Publication: . X, 287p. 141 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Krishnamurthy, Arvind. Publication: . X, 233p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Processing of the Portuguese Language by Pardo, Thiago Alexandre Salgueiro. Publication: . XII, 167p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Search Computing by Ceri, Stefano. Publication: . X, 321p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information Retrieval by Gurrin, Cathal. Publication: . XIX, 677p. 222 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Models in Software Engineering by Ghosh, Sudipto. Publication: . X, 360p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart