//]]>
Algorithm Engineering by Müller-Hannemann, Matthias. Publication: . XVI, 513 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Programming Multi-Agent Systems by Braubach, Lars. Publication: . XII, 285p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Methods and Tools of Parallel Programming Multicomputers by Hsu, Ching-Hsien. Publication: . XIV, 302p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theoretical Aspects of Computing – ICTAC 2010 by Cavalcanti, Ana. Publication: . XIII, 397p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Wimmer, Maria A. Publication: . XIV, 437p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-Hoc, Mobile and Wireless Networks by Nikolaidis, Ioanis. Publication: . X, 222p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Natural Language Processing by Loftsson, Hrafn. Publication: . 448p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive Multimedia Retrieval. Identifying, Summarizing, and Recommending Image and Music by Detyniecki, Marcin. Publication: . X, 185p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Spatial Cognition VII by Hölscher, Christoph. Publication: . XI, 347p. 108 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Interfaces: Explorations in Logic, Language and Computation by Icard, Thomas. Publication: . VII, 167p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Behavior Understanding by Salah, Albert Ali. Publication: . IV, 173p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – LATINCRYPT 2010 by Abdalla, Michel. Publication: . XII, 323p. 47 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Network Security by Kotenko, Igor. Publication: . XIII, 345p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Finite-State Methods and Natural Language Processing by Yli-Jyrä, Anssi. Publication: . X, 147p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Object Databases by Norrie, Moira C. Publication: . IX, 167p. 38 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Learning by Tsang, Philip. Publication: . XV, 534p. 147 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Algorithms, Systems, and Applications by Pandurangan, Gopal. Publication: . XV, 256p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
New Frontiers in Applied Data Mining by Theeramunkong, Thanaruk. Publication: . XII, 169p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2010 by Rabin, Tal. Publication: . XIV, 744p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Diagrammatic Representation and Inference by Goel, Ashok K. Publication: . XIII, 356p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart