Intelligence and Security Informatics by Wang, G. Alan. Publication: . X, 117 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2013 by Murgante, Beniamino. Publication: . XXXVI, 679 p. 276 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2013 by Murgante, Beniamino. Publication: . XXXVI, 649 p. 234 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2013 by Murgante, Beniamino. Publication: . XXXVI, 715 p. 290 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2013 by Murgante, Beniamino. Publication: . XXXVI, 659 p. 259 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2013 by Murgante, Beniamino. Publication: . XXXVI, 729 p. 317 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory, Practice, and Applications of Rules on the Web by Morgenstern, Leora. Publication: . XVIII, 249 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Gao, Yunjun. Publication: . XXXIV, 396 p. 165 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Integration in the Life Sciences by Baker, Christopher J. O. Publication: . X, 141 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analytical and Stochastic Modeling Techniques and Applications by Dudin, Alexander. Publication: . XII, 474 p. 159 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structured Object-Oriented Formal Language and Method by Liu, Shaoying. Publication: . X, 149 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXVII by Wang, Lingyu. Publication: . XIV, 305 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
RoboCup 2012: Robot Soccer World Cup XVI by Chen, Xiaoping. Publication: . XII, 392 p. 183 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-hoc, Mobile, and Wireless Network by Cichoń, Jacek. Publication: . XIV, 329 p. 150 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages, and Programming by Fomin, Fedor V. Publication: . XXVI, 698 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages, and Programming by Fomin, Fedor V. Publication: . XXVI, 854 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identify by Heather, James. Publication: . X, 211 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Symbolic and Quantitative Approaches to Reasoning with Uncertainty by Gaag, Linda C. Publication: . XII, 536 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Cristofaro, Emiliano. Publication: . X, 265 p. 88 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart