|
|
Service-Oriented Computing - ICSOC 2011 Workshops
by Pallis, George.
Publication:
. XII, 334 p. 106 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Algorithms, Systems, and Applications
by Wang, Xinbing.
Publication:
. XII, 680 p. 295 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bisociative Knowledge Discovery
by Berthold, Michael R.
Publication:
. IX, 485 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agents and Peer-to-Peer Computing
by Beneventano, Domenico.
Publication:
. XIV, 153p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Methodologies and Technologies for Networked Enterprises
by Anastasi, Giuseppe.
Publication:
. XX, 453 p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 319p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Networks
by Li, Xiang-Yang.
Publication:
. XIV, 486p. 214 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages, and Programming
by Czumaj, Artur.
Publication:
. 860p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages, and Programming
by Czumaj, Artur.
Publication:
. 700p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVI
by Cuppens-Boulahia, Nora.
Publication:
. X, 340 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Parallel Processing and Applied Mathematics
by Wyrzykowski, Roman.
Publication:
. XXVII, 663 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Parallel Processing and Applied Mathematics
by Wyrzykowski, Roman.
Publication:
. XXVII, 765 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - AFRICACRYPT 2012
by Mitrokotsa, Aikaterini.
Publication:
. XI, 424p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Autonomous and Intelligent Systems
by Kamel, Mohamed.
Publication:
. VIII, 270 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Bao, Feng.
Publication:
. XIV, 580p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scientific and Statistical Database Management
by Ailamaki, Anastasia.
Publication:
. XVII, 654p. 318 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pervasive Computing
by Kay, Judy.
Publication:
. Approx. 495 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2012
by Murgante, Beniamino.
Publication:
. XXII, 765p. 260 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2012
by Murgante, Beniamino.
Publication:
. XXI, 661p. 251 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2012
by Murgante, Beniamino.
Publication:
. XXXIX, 759p. 317 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|