//]]>
Trustworthly Global Computing by Wirsing, Martin. Publication: . XII, 380p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Life System Modeling and Intelligent Computing by Li, Kang. Publication: . XXII, 518p. 245 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Management by Hull, Richard. Publication: . XIII, 359p. 140 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Life System Modeling and Intelligent Computing by Li, Kang. Publication: . XVIII, 719p. 305 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Life System Modeling and Intelligent Computing by Li, Kang. Publication: . XXI, 518p. 230 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical Software – ICMS 2010 by Fukuda, Komei. Publication: . XIV, 368p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2010 by Daniilidis, Kostas. Publication: . XXII, 611p. 282 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2010 by Daniilidis, Kostas. Publication: . XXIII, 815p. 393 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2010 by Daniilidis, Kostas. Publication: . XXIII, 813p. 398 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2010 by Daniilidis, Kostas. Publication: . XXIII, 807p. 370 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2010 by Daniilidis, Kostas. Publication: . XXIII, 813p. 340 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2010 by Daniilidis, Kostas. Publication: . XXIII, 811p. 409 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in Intrusion Detection by Jha, Somesh. Publication: . 524p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2010 by Gritzalis, Dimitris. Publication: . XIV, 718p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grammatical Inference: Theoretical Results and Applications by Sempere, José M. Publication: . XI, 317p. 47 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Incentives, Overlays, and Economic Traffic Control by Stiller, Burkhard. Publication: . X, 109p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Swarm Intelligence by Dorigo, Marco. Publication: . XVIII, 582p. 190 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Access Communications by Vinel, Alexey. Publication: . XIII, 287p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles and Practice of Constraint Programming – CP 2010 by Cohen, David. Publication: . XX, 650p. 145 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Data Engineering and Automated Learning – IDEAL 2010 by Fyfe, Colin. Publication: . XVI, 398p. 134 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart