//]]>
Active Media Technology by Zhong, Ning. Publication: . XIV, 356 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analysis of Social Media and Ubiquitous Data by Atzmueller, Martin. Publication: . VIII, 163p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Data Management by Jonker, Willem. Publication: . X, 170p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Warehousing and Knowledge Discovery by Cuzzocrea, Alfredo. Publication: . XIV, 498p. 180 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Energy-Aware Communications by Lehnert, Ralf. Publication: . XIII, 227 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Wang, Haixun. Publication: . XVI, 667p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic and Trusted Computing by Calero, Jose M. Alcaraz. Publication: . XII, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Algorithms, Systems, and Applications by Cheng, Yu. Publication: . XIV, 434p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Semantics in Data and Knowledge Bases by Schewe, Klaus-Dieter. Publication: . IX, 135p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Participation by Tambouris, Efthimios. Publication: . XI, 315 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Case-Based Reasoning Research and Development by Ram, Ashwin. Publication: . XI, 498 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
CONCUR 2011 – Concurrency Theory by Katoen, Joost-Pieter. Publication: . XIV, 560p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database and Expert Systems Applications by Hameurlain, Abdelkader. Publication: . XXVI, 608 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database and Expert Systems Applications by Hameurlain, Abdelkader. Publication: . XXV, 562p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations of Security Analysis and Design VI by Aldini, Alessandro. Publication: . VII, 275p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 Workshops by Casares-Giner, Vicente. Publication: . XVI, 290p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reasoning Web. Semantic Technologies for the Web of Data by Polleres, Axel. Publication: . IX, 535 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government and the Information Systems Perspective by Andersen, Kim Normann. Publication: . XIV, 410p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques by Goldberg, Leslie Ann. Publication: . XV, 702 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Furnell, Steven. Publication: . XII, 223 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية