//]]>
Advances in Computational Intelligence by Liu, Jing. Publication: . Approx. 290 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Science – Theory and Applications by Hirsch, Edward A. Publication: . XXIII, 327 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dependable Networks and Services by Sadre, Ramin. Publication: . XIII, 161 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2012 by Helleseth, Tor. Publication: . XII, 339 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Models for the Web Graph by Bonato, Anthony. Publication: . VIII, 179 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Intelligence: Theories and Applications by Maglogiannis, Ilias. Publication: . XV, 384p. 88 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Facing the Multicore - Challenge II by Keller, Rainer. Publication: . X, 173 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fun with Algorithms by Kranakis, Evangelos. Publication: . XI, 397p. 148 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Topology in Image Context by Ferri, Massimo. Publication: . X, 157p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Knowledge Discovery and Data Mining by Tan, Pang-Ning. Publication: . XXIV, 445 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Knowledge Discovery and Data Mining by Tan, Pang-Ning. Publication: . XXIII, 619 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bioinformatics Research and Applications by Bleris, Leonidas. Publication: . XIII, 332p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Bruni, Roberto. Publication: . X, 243p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2012 by Fischlin, Marc. Publication: . XIV, 734 p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXI, 421 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXII, 437 p. 191 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 Workshops by Becvar, Zdenek. Publication: . XVI, 158p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Agrawal, Manindra. Publication: . XV, 622 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in Reinforcement Learning by Sanner, Scott. Publication: . XIII, 345 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Schindler, Werner. Publication: . Approx. 280 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart