//]]>
Highlights on Practical Applications of Agents and Multi-Agent Systems by Corchado, Juan M. Publication: . XX, 474 p. 190 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Green Communication and Networking by Mauri, Jaime Lloret. Publication: . XII, 121 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Mobile Communication and Healthcare by Godara, Balwant. Publication: . XIV, 457 p. 190 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Collaborative, Trusted and Privacy-Aware e/m-Services by Douligeris, Christos. Publication: . XVI, 350 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evaluating AAL Systems Through Competitive Benchmarking by Chessa, Stefano. Publication: . X, 187 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Tools for High Performance Computing 2012 by Cheptsov, Alexey. Publication: . XI, 162 p. 70 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open and Social Technologies for Networked Learning by Ley, Tobias. Publication: . XII, 211 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Keromytis, Angelos D. Publication: . X, 369 p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Computing, Applications, and Services by Uhler, David. Publication: . XII, 428 p. 198 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Engineering and Technology by Xu, Weixia. Publication: . XIV, 263 p. 164 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems, E-learning, and Knowledge Management Research by Lytras, Miltiadis D. Publication: . XX, 687 p. 169 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Computing and Services by Yuan, Yuyu. Publication: . XVIII, 739 p. 301 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VI by Butts, Jonathan. Publication: . XVI, 233 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Product Lifecycle Management. Towards Knowledge-Rich Enterprises by Rivest, Louis. Publication: . XVI, 658 p. 261 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Testbeds and Research Infrastructure. Development of Networks and Communities by Korakis, Thanasis. Publication: . XVI, 429 p. 224 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Gladyshev, Pavel. Publication: . XII, 297 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Auditing and GRC Automation in SAP by Chuprunov, Maxim. Publication: . XXXII, 525 p. 273 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Applications for Security, Control and System Engineering by Kim, Tai-hoon. Publication: . XX, 488 p. 228 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Shaping the Future of ICT Research. Methods and Approaches by Bhattacherjee, Anol. Publication: . X, 237 p. 34 illus. Availability: No items available:
Actions: Add to Cart
Contemporary Research on E-business Technology and Strategy by Khachidze, Vasil. Publication: . XVI, 730 p. 319 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية