//]]>
Radio Frequency Identification: Security and Privacy Issues by Ors Yalcin, Siddika Berna. Publication: . X, 271p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XV, 514p. 257 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Shen, Heng Tao. Publication: . XXII, 260p. 122 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XV, 472p. 269 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XXVII, 534p. 217 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
HCI in Work and Learning, Life and Leisure by Leitner, Gerhard. Publication: . XVIII, 532p. 144 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Smart Internet by Chignell, Mark. Publication: . XII, 319p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Robotics and Applications by Liu, Honghai. Publication: . XXIII, 771p. 560 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Robotics and Applications by Liu, Honghai. Publication: . XXIII, 779p. 525 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends and Developments in Social Software by Breslin, John G. Publication: . XII, 177p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic and Trusted Computing by Xie, Bing. Publication: . XVII, 328p. 112 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Informatics by Bolc, Leonard. Publication: . XII, 249p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Leveraging Applications of Formal Methods, Verification, and Validation by Margaria, Tiziana. Publication: . XV, 498p. 157 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Leveraging Applications of Formal Methods, Verification, and Validation by Margaria, Tiziana. Publication: . XX, 708p. 220 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
AI Approaches to the Complexity of Legal Systems. Complex Systems, the Semantic Web, Ontologies, Argumentation, and Dialogue by Casanovas, Pompeu. Publication: . X, 243p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human-Centred Software Engineering by Bernhaupt, Regina. Publication: . X, 223p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Martinelli, Fabio. Publication: . X, 303p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge Engineering and Management by the Masses by Cimiano, Philipp. Publication: . XXV, 588p. 152 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ubiquitous Knowledge Discovery by May, Michael. Publication: . X, 255p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Bao, Feng. Publication: . XIII, 460p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية