//]]>
Job Scheduling Strategies for Parallel Processing by Frachtenberg, Eitan. Publication: . XI, 223p. 99 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computation and Intelligence by Cai, Zhihua. Publication: . XV, 536p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human-Centred Software Engineering by Bernhaupt, Regina. Publication: . X, 223p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Implementation and Application of Functional Languages by Morazán, Marco T. Publication: . IX, 237p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Martinelli, Fabio. Publication: . X, 303p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge Engineering and Management by the Masses by Cimiano, Philipp. Publication: . XXV, 588p. 152 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Böhme, Rainer. Publication: . X, 277p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ubiquitous Knowledge Discovery by May, Michael. Publication: . X, 255p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Conceptual Modeling – Applications and Challenges by Trujillo, Juan. Publication: . XII, 296p. 95 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Conceptual Modeling – ER 2010 by Parsons, Jeffrey. Publication: . XIV, 490p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Property Testing by Goldreich, Oded. Publication: . XI, 359p. 5 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ubiquitous Intelligence and Computing by Yu, Zhiwen. Publication: . XVII, 696p. 295 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Bao, Feng. Publication: . XIII, 460p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
String Processing and Information Retrieval by Chavez, Edgar. Publication: . XIV, 408p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rewriting Logic and Its Applications by Ölveczky, Peter Csaba. Publication: . X, 264p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modeling Decisions for Artificial Intelligence by Torra, Vicenç. Publication: . XI, 299p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Semantic Web Rules by Dean, Mike. Publication: . XIII, 305p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Heng, Swee-Huay. Publication: . X, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Model-Based Engineering of Embedded Real-Time Systems by Giese, Holger. Publication: . XV, 385p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integrated Formal Methods by Méry, Dominique. Publication: . X, 337p. 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية