|
|
Graph Structures for Knowledge Representation and Reasoning
by Croitoru, Madalina.
Publication:
. VII, 209 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Swarm and Evolutionary Computation
by Rutkowski, Leszek.
Publication:
. X, 440 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
LATIN 2012: Theoretical Informatics
by Fernández-Baca, David.
Publication:
. XVII, 669 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Computing, Networking and Security
by Thilagam, P. Santhi.
Publication:
. XVII, 641 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Genetic Programming
by Moraglio, Alberto.
Publication:
. XII, 279p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Evolutionary Computation in Combinatorial Optimization
by Hao, Jin-Kao.
Publication:
. XII, 264p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Approximation and Online Algorithms
by Solis-Oba, Roberto.
Publication:
. X, 278 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Petri Nets and Other Models of Concurrency V
by Jensen, Kurt.
Publication:
. XVII, 293 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics
by Giacobini, Mario.
Publication:
. XIII, 255p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2012
by Pointcheval, David.
Publication:
. XIV, 758 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hybrid Artificial Intelligent Systems
by Corchado, Emilio.
Publication:
. XXXII, 708 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hybrid Artificial Intelligent Systems
by Corchado, Emilio.
Publication:
. XXXII, 606 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection
by Lopez, Javier.
Publication:
. XIV, 357 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Cramer, Ronald.
Publication:
. Approx. 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security VII
by Shi, Yun Q.
Publication:
. IX, 115p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Compiler Construction
by O’Boyle, Michael.
Publication:
. XVI, 245 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Degano, Pierpaolo.
Publication:
. XIV, 431 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Latent Variable Analysis and Signal Separation
by Theis, Fabian.
Publication:
. XVI, 538p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Passive and Active Measurement
by Taft, Nina.
Publication:
. XI, 264 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XV
by Gavrilova, Marina L.
Publication:
. XIII, 217 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|