//]]>
Automatic Malware Analysis by Yin, Heng. Publication: . IX, 73 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Compact Algorithms and Software for Spline Smoothing by Weinert, Howard L. Publication: . VIII, 45 p. 7 illus., 5 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Semantic Analysis and Understanding of Human Behavior in Video Streaming by Amato, Alberto. Publication: . XII, 105 p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structured Peer-to-Peer Systems by Korzun, Dmitry. Publication: . XXII, 366 p. 84 illus., 45 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense II by Jajodia, Sushil. Publication: . XII, 203 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering and Management for Software Development Projects by Chemuturi, Murali. Publication: . XXI, 266 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Soft Computing Approach to Pattern Classification and Object Recognition by Ray, Kumar S. Publication: . XII, 173 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pattern Recognition and Classification by Dougherty, Geoff. Publication: . XI, 196 p. 158 illus., 104 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Computational Approaches to Counterterrorism by Subrahmanian, V.S. Publication: . XVII, 578 p. 187 illus., 116 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Facebook Nation by Lee, Newton. Publication: . XIII, 235 p. 14 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Energy-aware Scheduling on Multiprocessor Platforms by Li, Dawei. Publication: . VII, 59 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dynamic Cloud Collaboration Platform by Hassan, Mohammad Mehedi. Publication: . X, 90 p. 19 illus., 8 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis by Kjærulff, Uffe B. Publication: . XVII, 382 p. 186 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Development by Pooley, Rob. Publication: . XI, 727 p. 190 illus., 112 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Querying Moving Objects Detected by Sensor Networks by Bestehorn, Markus. Publication: . XII, 71 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Spatio-temporal Networks by George, Betsy. Publication: . XII, 73 p. 47 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Programming by Shankar, A. Udaya. Publication: . XVIII, 387 p. 175 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Authentication by Jakobsson, Markus. Publication: . XIV, 113 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Robustness under Large-Scale Attacks by Zhou, Qing. Publication: . VIII, 41 p. 12 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Traffic Measurement on the Internet by Li, Tao. Publication: . IX, 82 p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart