//]]>
Transactions on Computational Collective Intelligence I by Nguyen, Ngoc Thanh. Publication: . VII, 207p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fields of Logic and Computation by Blass, Andreas. Publication: . XIII, 627p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sion, Radu. Publication: . X, 257p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Logic in Multi-Agent Systems by Dix, Jürgen. Publication: . XIV, 257p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coordination, Organizations, Institutions and Norms in Agent Systems V by Padget, Julian. Publication: . XVIII, 335p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Internet - FIS 2009 by Zseby, Tanja. Publication: . IX, 117p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Social Network Mining and Analysis by Giles, Lee. Publication: . XI, 131p. 47 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Spaces and Next Generation Wired/Wireless Networking by Balandin, Sergey. Publication: . XVI, 486p. 212 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Programming Multi-Agent Systems by Braubach, Lars. Publication: . XII, 285p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Wimmer, Maria A. Publication: . XIV, 437p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-Hoc, Mobile and Wireless Networks by Nikolaidis, Ioanis. Publication: . X, 222p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Network Security by Kotenko, Igor. Publication: . XIII, 345p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Algorithms, Systems, and Applications by Pandurangan, Gopal. Publication: . XV, 256p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2010 by Rabin, Tal. Publication: . XIV, 744p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Diagrammatic Representation and Inference by Goel, Ashok K. Publication: . XIII, 356p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 263p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database Systems for Advanced Applications by Yoshikawa, Masatoshi. Publication: . XIX, 472p. 192 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Atallah, Mikhail J. Publication: . X, 291p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Services and Formal Methods by Laneve, Cosimo. Publication: . VII, 197p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية