//]]>
Cognitive Agents for Virtual Environments by Dignum, Frank. Publication: . XII, 185 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Process Support and Knowledge Representation in Health Care by Lenz, Richard. Publication: . XIV, 183 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture of Computing Systems – ARCS 2013 by Kubátová, Hana. Publication: . XIV, 354 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Retrieval Meets Information Visualization by Agosti, Maristella. Publication: . X, 177 p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Kirchner, Matthias. Publication: . X, 285 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Chinese Lexical Semantics by Ji, Donghong. Publication: . XVI, 838 p. 129 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography – Pairing 2012 by Abdalla, Michel. Publication: . XVI, 333 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reversible Computation by Glück, Robert. Publication: . X, 241 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agents and Data Mining Interaction by Cao, Longbing. Publication: . XII, 217 p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Assurances for Self-Adaptive Systems by Cámara, Javier. Publication: . X, 341 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation by Ayala, José L. Publication: . IX, 258 p. 150 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Construction and Evolution of Code Generators by Jörges, Sven. Publication: . XXIV, 246 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2013 by Dawson, Ed. Publication: . XIV, 405 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms for Sensor Systems by Bar-Noy, Amotz. Publication: . X, 145 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Language Engineering by Czarnecki, Krzysztof. Publication: . XII, 413 p. 172 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Citizen in Sensor Networks by Nin, Jordi. Publication: . VIII, 95 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Internet Technology by Hota, Chittaranjan. Publication: . XIV, 574 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية