//]]>
Transactions on Data Hiding and Multimedia Security VI by Shi, Yun Q. Publication: . XI, 110p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Défago, Xavier. Publication: . XIV, 452 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Discovery Science by Elomaa, Tapio. Publication: . XIII, 381 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Similarity-Based Pattern Recognition by Pelillo, Marcello. Publication: . XIII, 333 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in the Message Passing Interface by Cotronis, Yiannis. Publication: . XIV, 358 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimodal Brain Image Analysis by Liu, Tianming. Publication: . IX, 162 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Model and Data Engineering by Bellatreche, Ladjel. Publication: . XI, 288 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Learning Theory by Kivinen, Jyrki. Publication: . XIII, 453 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and Parallel Computing by Altman, Erik. Publication: . XIII, 368 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Photogrammetric Image Analysis by Stilla, Uwe. Publication: . XIII, 309 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers of Combining Systems by Tinelli, Cesare. Publication: . VIII, 275 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Architecture by Varbanescu, Ana Lucia. Publication: . XXVII, 378p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Machine Learning in Medical Imaging by Suzuki, Kenji. Publication: . XIII, 371 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Boyen, Xavier. Publication: . XIII, 399 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Modeling and Analysis of Timed Systems by Fahrenberg, Uli. Publication: . XI, 353 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reachability Problems by Delzanno, Giorgio. Publication: . XII, 245 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Flammini, Francesco. Publication: . XI, 482p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Logistics by Böse, Jürgen W. Publication: . XI, 371 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology - ICISC 2010 by Rhee, Kyung-Hyune. Publication: . XIII, 435p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Filler, Tomáš. Publication: . XII, 343p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart