|
|
Computational Science and Its Applications – ICCSA 2013
by Murgante, Beniamino.
Publication:
. XXXVI, 729 p. 317 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory, Practice, and Applications of Rules on the Web
by Morgenstern, Leora.
Publication:
. XVIII, 249 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Gao, Yunjun.
Publication:
. XXXIV, 396 p. 165 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Integration in the Life Sciences
by Baker, Christopher J. O.
Publication:
. X, 141 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Analytical and Stochastic Modeling Techniques and Applications
by Dudin, Alexander.
Publication:
. XII, 474 p. 159 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVII
by Wang, Lingyu.
Publication:
. XIV, 305 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Network
by Cichoń, Jacek.
Publication:
. XIV, 329 p. 150 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages, and Programming
by Fomin, Fedor V.
Publication:
. XXVI, 698 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages, and Programming
by Fomin, Fedor V.
Publication:
. XXVI, 854 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identify
by Heather, James.
Publication:
. X, 211 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Symbolic and Quantitative Approaches to Reasoning with Uncertainty
by Gaag, Linda C.
Publication:
. XII, 536 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Cristofaro, Emiliano.
Publication:
. X, 265 p. 88 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Factors in Computing and Informatics
by Holzinger, Andreas.
Publication:
. XXIV, 845 p. 294 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Architecture
by Drira, Khalil.
Publication:
. XVI, 354 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modelling Foundations and Applications
by Gorp, Pieter.
Publication:
. X, 237 p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Emerging Management Mechanisms for the Future Internet
by Doyen, Guillaume.
Publication:
. XVI, 161 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SDL 2013: Model-Driven Dependability Engineering
by Khendek, Ferhat.
Publication:
. XII, 291 p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Huth, Michael.
Publication:
. XIV, 278 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|