//]]>
Multi-disciplinary Trends in Artificial Intelligence by Sombattheera, Chattrakul. Publication: . 444p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Retrieval Technology by Salem, Mohamed Vall Mohamed. Publication: . XV, 626 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Computation by Asano, Takao. Publication: . XVIII, 775 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2011 by Bernstein, Daniel J. Publication: . XIII, 401 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges by Hummel, Karin Anna. Publication: . XII, 255 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning and Intelligent Optimization by Coello, Carlos A. Coello. Publication: . XVII, 636 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Chen, Liqun. Publication: . XIII, 497 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Lin, Dongdai. Publication: . XII, 313 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Network Economics by Chen, Ning. Publication: . XII, 420 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Biometric Recognition by Sun, Zhenan. Publication: . XIV, 290p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Yang, Bo-Yin. Publication: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011 Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – ASIACRYPT 2011 by Lee, Dong Hoon. Publication: . XIV, 760 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
RFID. Security and Privacy by Juels, Ari. Publication: . X, 260p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 362p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Baras, John S. Publication: . X, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Artificial Intelligence by Lozano, Jose A. Publication: . XV, 506 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Computing and Applications by Liu, Baoxiang. Publication: . XVIII, 775 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XIV by Gavrilova, Marina L. Publication: . XIII, 239 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Qing, Sihan. Publication: . XIII, 432p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Visual Informatics: Sustaining Research and Innovations by Zaman, Halimah Badioze. Publication: . XX, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية