//]]>
Pattern Recognition by Goesele, Michael. Publication: . XXI, 574p. 262 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2010 by Carlet, Claude. Publication: . X, 465p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Neural Networks – ICANN 2010 by Diamantaras, Konstantinos. Publication: . XVII, 575p. 213 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Neural Networks – ICANN 2010 by Diamantaras, Konstantinos. Publication: . XVI, 543p. 217 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Neural Networks – ICANN 2010 by Diamantaras, Konstantinos. Publication: . XXXI, 587p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing by Lynch, Nancy A. Publication: . XV, 532p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthly Global Computing by Wirsing, Martin. Publication: . XII, 380p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Life System Modeling and Intelligent Computing by Li, Kang. Publication: . XXII, 518p. 245 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2010 by Gritzalis, Dimitris. Publication: . XIV, 718p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Incentives, Overlays, and Economic Traffic Control by Stiller, Burkhard. Publication: . X, 109p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Swarm Intelligence by Dorigo, Marco. Publication: . XVIII, 582p. 190 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Access Communications by Vinel, Alexey. Publication: . XIII, 287p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Data Engineering and Automated Learning – IDEAL 2010 by Fyfe, Colin. Publication: . XVI, 398p. 134 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Cryptography for Networks by Garay, Juan A. Publication: . VII, 474p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
From Animals to Animats 11 by Doncieux, Stéphane. Publication: . XVI, 662p. 308 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Katsikas, Sokratis. Publication: . XII, 252p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Management in Grid and Peer-to-Peer Systems by Hameurlain, Abdelkader. Publication: . X, 161p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structural, Syntactic, and Statistical Pattern Recognition by Hancock, Edwin R. Publication: . XV, 758p. 246 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Spaces and Next Generation Wired/Wireless Networking by Balandin, Sergey. Publication: . XVI, 486p. 212 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Methods and Tools of Parallel Programming Multicomputers by Hsu, Ching-Hsien. Publication: . XIV, 302p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart