//]]>
Reliable Software Technologies – Ada-Europe 2013 by Keller, Hubert B. Publication: . XII, 177 p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Techniques for Distributed Systems by Beyer, Dirk. Publication: . XIV, 321 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Applied Artificial Intelligence by Ali, Moonis. Publication: . XX, 697 p. 279 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automated Deduction – CADE-24 by Bonacina, Maria Paola. Publication: . XVI, 466 p. 95 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Processing in Computer-Assisted Interventions by Barratt, Dean. Publication: . X, 111 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Wang, Jianyong. Publication: . XXVIII, 812 p. 326 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2013 by Youssef, Amr. Publication: . XIV, 453 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Applications and Interoperable Systems by Dowling, Jim. Publication: . XII, 205 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Science – Theory and Applications by Bulatov, Andrei A. Publication: . XII, 445 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems by Cavallaro, Lorenzo. Publication: . XVI, 145 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Experimental Algorithms by Bonifaci, Vincenzo. Publication: . XII, 416 p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Kutyłowski, Mirosław. Publication: . XII, 393 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Metaheuristics by Blesa, María J. Publication: . X, 213 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Collective Intelligence X by Nguyen, Ngoc-Thanh. Publication: . XII, 207 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coordination Models and Languages by Nicola, Rocco. Publication: . XIV, 251 p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Artificial Intelligence by Zaïane, Osmar R. Publication: . XIV, 372 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wired/Wireless Internet Communication by Tsaoussidis, Vassilis. Publication: . XII, 277 p. 145 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2013 by Johansson, Thomas. Publication: . XIV, 736 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence Methods for Bioinformatics and Biostatistics by Peterson, Leif E. Publication: . XII, 185 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Systems Engineering – WISE 2011 and 2012 Workshops by Haller, Armin. Publication: . XVI, 350 p. 105 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية