//]]>
Advances in Visual Computing by Bebis, George. Publication: . XXXVII, 733 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Engineering for Resilient Systems by Avgeriou, Paris. Publication: . X, 181 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2012 by Foresti, Sara. Publication: . XVII, 896 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reasoning Web. Semantic Technologies for Advanced Query Answering by Eiter, Thomas. Publication: . IX, 387 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Argumentation in Multi-Agent Systems by McBurney, Peter. Publication: . X, 231 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
From Animals to Animats 12 by Ziemke, Tom. Publication: . XII, 454 p. 205 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Architectures for Parallel Processing by Xiang, Yang. Publication: . XXI, 563 p. 241 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Databases and Information Systems by Morzy, Tadeusz. Publication: . XVI, 442 p. 143 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Architectures for Parallel Processing by Xiang, Yang. Publication: . XXIV, 331 p. 159 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Bao, Zhifeng. Publication: . XXX, 362 p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Geographic Information Science by Xiao, Ningchuan. Publication: . XIII, 369 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Case-Based Reasoning Research and Development by Agudo, Belén Díaz. Publication: . XI, 416 p. 132 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Keromytis, Angelos D. Publication: . XI, 416 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
CONCUR 2012 – Concurrency Theory by Koutny, Maciej. Publication: . XIV, 582 p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Cryptography for Networks by Visconti, Ivan. Publication: . XI, 582 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Datalog in Academia and Industry by Barceló, Pablo. Publication: . XIV, 191 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Management by Barros, Alistair. Publication: . XV, 354 p. 128 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Data Management by Jonker, Willem. Publication: . X, 177 p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communication Technologies by Szabó, Róbert. Publication: . X, 450 p. 164 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . VIII, 239 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart