//]]>
Advances in Multimedia Information Processing - PCM 2010 by Qiu, Guoping. Publication: . XXII, 745p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Multimedia Information Processing - PCM 2010 by Qiu, Guoping. Publication: . XXII, 759p. 433 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Schoitsch, Erwin. Publication: . X, 482p. 197 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in the Message Passing Interface by Keller, Rainer. Publication: . XIV, 308p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automated Technology for Verification and Analysis by Bouajjani, Ahmed. Publication: . VIII, 404p. 112 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthly Global Computing by Wirsing, Martin. Publication: . XII, 380p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Testing – Practice and Research Techniques by Bottaci, Leonardo. Publication: . XIII, 219p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Product Lines: Going Beyond by Bosch, Jan. Publication: . XXI, 534p. 159 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Databases and Information Systems by Catania, Barbara. Publication: . XV, 600p. 230 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Data Management by Jonker, Willem. Publication: . X, 172p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reasoning Web. Semantic Technologies for Software Engineering by Aßmann, Uwe. Publication: . IX, 183p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in Intrusion Detection by Jha, Somesh. Publication: . 524p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2010 by Gritzalis, Dimitris. Publication: . XIV, 718p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Incentives, Overlays, and Economic Traffic Control by Stiller, Burkhard. Publication: . X, 109p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Active Media Technology by An, Aijun. Publication: . XVI, 548p. 245 illus. Availability: No items available:
Actions: Add to Cart
Swarm Intelligence by Dorigo, Marco. Publication: . XVIII, 582p. 190 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Intelligence: Methodology, Systems, and Applications by Dicheva, Darina. Publication: . XIV, 286p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Access Communications by Vinel, Alexey. Publication: . XIII, 287p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agents and Data Mining Interaction by Cao, Longbing. Publication: . X, 192p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Entertainment Computing - ICEC 2010 by Yang, Hyun Seung. Publication: . XVII, 521p. 303 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية