|
|
Advances in Multidisciplinary Retrieval
by Cunningham, Hamish.
Publication:
. IX, 167p. 52 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Grid and Pervasive Computing
by Bellavista, Paolo.
Publication:
. XVII, 701p. 365 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2010
by Nguyen, Phong Q.
Publication:
. XIII, 519p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Lectures on Software Engineering
by Müller, Peter.
Publication:
. VII, 189p. 99 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Towards Trustworthy Elections
by Chaum, David.
Publication:
. VIII, 403p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2010
by Crovella, Mark.
Publication:
. XVI, 410p. 181 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Sendrier, Nicolas.
Publication:
. X, 241p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Intelligence: Theories, Models and Applications
by Konstantopoulos, Stasinos.
Publication:
. XV, 430p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security, Practice and Experience
by Kwak, Jin.
Publication:
. XIII, 399p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Argumentation in Multi-Agent Systems
by McBurney, Peter.
Publication:
. X, 321p. 36 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Modeling of Objects Represented in Images
by Barneva, Reneta P.
Publication:
. XV, 326p. 178 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2010
by Bernstein, Daniel J.
Publication:
. XIII, 437p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pervasive Computing
by Floréen, Patrik.
Publication:
. XV, 446p. 203 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ethics and Policy of Biometrics
by Kumar, Ajay.
Publication:
. VIII, 169p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations of Computer Software. Future Trends and Techniques for Development
by Choppy, Christine.
Publication:
. IX, 275p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Natural Language Processing and Information Systems
by Horacek, Helmut.
Publication:
. XVIII, 318p. 65 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Application
by Gollmann, Dieter.
Publication:
. X, 239p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects in Security and Trust
by Degano, Pierpaolo.
Publication:
. X, 279p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices
by Samarati, Pierangela.
Publication:
. XIII, 386p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Traffic Monitoring and Analysis
by Ricciato, Fabio.
Publication:
. X, 199p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|