|
|
Mathematical Foundations of Computer Science 2013
by Chatterjee, Krishnendu.
Publication:
. XVI, 854 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Nature of Computation. Logic, Algorithms, Applications
by Bonizzoni, Paola.
Publication:
. XVIII, 446 p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems
by Gomes, Carla.
Publication:
. XII, 403 p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Parallel and Scientific Computing
by Manninen, Pekka.
Publication:
. XIV, 568 p. 186 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
WALCOM: Algorithms and Computation
by Ghosh, Subir Kumar.
Publication:
. XIV, 348 p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Gollmann, Dieter.
Publication:
. XIV, 402 p. 87 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Parameterized and Exact Computation
by Thilikos, Dimitrios M.
Publication:
. X, 275 p. 14 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mathematical Foundations of Computer Science 2012
by Rovan, Branislav.
Publication:
. XV, 825 p. 102 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Cramer, Ronald.
Publication:
. Approx. 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Drawing
by Kreveld, Marc.
Publication:
. XIV, 458 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Lai, Xuejia.
Publication:
. XIII, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Ishai, Yuval.
Publication:
. XII, 631 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
WALCOM: Algorithms and Computation
by Katoh, Naoki.
Publication:
. XI, 233p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Drawing
by Brandes, Ulrik.
Publication:
. XIV, 414p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Burmester, Mike.
Publication:
. XIV, 446p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mathematical Software – ICMS 2010
by Fukuda, Komei.
Publication:
. XIV, 368p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Drawing
by Eppstein, David.
Publication:
. 426p. 199 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Micciancio, Daniele.
Publication:
. 607p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
WALCOM: Algorithms and Computation
by Rahman, Md. Saidur.
Publication:
. XIII, 305p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Parameterized and Exact Computation
by Gutin, Gregory.
Publication:
. XII, 375 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|