|
|
Fundamentals of Computation Theory
by Owe, Olaf.
Publication:
. XIII, 373 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algebra and Coalgebra in Computer Science
by Corradini, Andrea.
Publication:
. XI, 420p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
by Goldberg, Leslie Ann.
Publication:
. XV, 702 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Furnell, Steven.
Publication:
. XII, 223 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial General Intelligence
by Schmidhuber, Jürgen.
Publication:
. XIV, 416 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Spaces and Next Generation Wired/Wireless Networking
by Balandin, Sergey.
Publication:
. XVI, 634 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Bioinformatics and Computational Biology
by Norberto de Souza, Osmar.
Publication:
. IX, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2011
by Rogaway, Phillip.
Publication:
. XV, 782p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computing and Combinatorics
by Fu, Bin.
Publication:
. XIII, 650p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation
by Goldreich, Oded.
Publication:
. XI, 563p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Optimization and Applications
by Wang, Weifan.
Publication:
. XII, 562 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Decision for Artificial Intelligence
by Torra, Vicenç.
Publication:
. XIII, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rule-Based Reasoning, Programming, and Applications
by Bassiliades, Nick.
Publication:
. XIII, 385 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Parampalli, Udaya.
Publication:
. XIII, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Immune Systems
by Liò, Pietro.
Publication:
. XVI, 468p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
User Modeling, Adaption and Personalization
by Konstan, Joseph A.
Publication:
. XIX, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scientific and Statistical Database Management
by Bayard Cushing, Judith.
Publication:
. XVII, 602p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXV
by Li, Yingjiu.
Publication:
. XI, 309p.
Availability:
Copies available:
AUM Main Library
(1),
|
|