|
|
Social Web Artifacts for Boosting Recommenders
by Ziegler, Cai-Nicolas.
Publication:
. XX, 187 p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Data Mining and Applications
by Cao, Longbing.
Publication:
. XIII, 576p. 198 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pattern Recognition in Bioinformatics
by Dijkstra, Tjeerd M. H.
Publication:
. XII, 442p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Information and Database Systems
by Nguyen, Ngoc Thanh.
Publication:
. XXIII, 477p. 196 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Matching
by Christen, Peter.
Publication:
. XIX, 270 p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Event-Driven Surveillance
by Denecke, Kerstin.
Publication:
. X, 76 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Data Mining
by Liu, Bing.
Publication:
. XX, 624 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Semantic Web Technologies
by Domingue, John.
Publication:
. XX, 1056p. eReference. In 2 volumes, not available separately.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust for Intelligent Recommendation
by Bhuiyan, Touhid.
Publication:
. XIV, 119 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
by Subrahmanian, V.S.
Publication:
. XIV, 231 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|