|
|
Engineering Applications of Neural Networks
by Iliadis, Lazaros.
Publication:
. XXIV, 532 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pattern Recognition, Machine Intelligence and Biometrics
by Wang, Patrick S. P.
Publication:
. 800p. 100 illus., 10 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Policies and Research in Identity Management
by Leeuw, Elisabeth.
Publication:
. X, 145p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Life System Modeling and Intelligent Computing
by Li, Kang.
Publication:
. XVIII, 255p. 113 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Life System Modeling and Intelligent Computing
by Li, Kang.
Publication:
. XVIII, 261p. 132 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Goel, Sanjay.
Publication:
. XII, 171p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Digital Forensics
by Weerasinghe, Dasun.
Publication:
. 196p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Methods in Biometric Authentication
by Schuckers, Michael E.
Publication:
. XXV, 317p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
3D Biometrics
by Zhang, David.
Publication:
. XII, 290 p. 230 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Biometrics and Kansei Engineering
by Saeed, Khalid.
Publication:
. XII, 275 p. 177 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Iris Biometrics
by Rathgeb, Christian.
Publication:
. XXII, 358 p. 177 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Authentication
by Jakobsson, Markus.
Publication:
. XIV, 113 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Mining Applications Using Artificial Adaptive Systems
by Tastle, William J.
Publication:
. VII, 275 p. 135 illus., 111 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Financial and Medical Identity Theft
by Camp, L. Jean.
Publication:
. XI, 166p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Biometrics
by Campisi, Patrizio.
Publication:
. X, 438 p. 114 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Service Mining
by Zheng, George.
Publication:
. XVI, 152p. 40 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multi-Modal User Interactions in Controlled Environments
by Djeraba, Chaabane.
Publication:
. XVI, 216p. 40 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transparent User Authentication
by Clarke, Nathan.
Publication:
. XVIII, 229p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Visual Analysis of Behaviour
by Gong, Shaogang.
Publication:
. XIX, 356p. 131 illus., 101 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Biometrics for Large-Scale Systems
by Ashbourn, Julian.
Publication:
. XIV, 202 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|