//]]>
Algorithms – ESA 2013 by Bodlaender, Hans L. Publication: . XVIII, 829 p. 134 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Lightweight Cryptography for Security and Privacy by Avoine, Gildas. Publication: . X, 143 p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scalable Uncertainty Management by Liu, Weiru. Publication: . XIV, 387 p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet of Things, Smart Spaces, and Next Generation Networking by Balandin, Sergey. Publication: . XIV, 440 p. 203 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Space-Efficient Data Structures, Streams, and Algorithms by Brodnik, Andrej. Publication: . XXVIII, 363 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database Systems for Advanced Applications by Hong, Bonghee. Publication: . XVIII, 245 p. 99 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2013 by Crampton, Jason. Publication: . XVIII, 794 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Networked Systems by Gramoli, Vincent. Publication: . X, 332 p. 112 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Data Structures by Dehne, Frank. Publication: . XIV, 538 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Large-Scale Data- and Knowledge-Centered Systems IX by Hameurlain, Abdelkader. Publication: . X, 123 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Management in Cloud, Grid and P2P Systems by Hameurlain, Abdelkader. Publication: . X, 125 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Euro-Par 2013 Parallel Processing by Wolf, Felix. Publication: . XXVIII, 890 p. 314 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Prouff, Emmanuel. Publication: . X, 215 p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Capitani di Vimercati, Sabrina. Publication: . X, 195 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Computing Technologies by Malyshkin, Victor. Publication: . XVI, 444 p. 183 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agreement Technologies by Chesñevar, Carlos Iván. Publication: . X, 241 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Access Flexibility by Bianchi, Giuseppe. Publication: . XII, 159 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Algorithms, Systems, and Applications by Ren, Kui. Publication: . XIV, 536 p. 231 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Wang, G. Alan. Publication: . X, 117 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2013 by Murgante, Beniamino. Publication: . XXXVI, 679 p. 276 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية