|
|
Bioinformatics Research and Applications
by Bleris, Leonidas.
Publication:
. XIII, 332p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Global Computing
by Bruni, Roberto.
Publication:
. X, 243p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2012
by Fischlin, Marc.
Publication:
. XIV, 734 p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012
by Bestak, Robert.
Publication:
. XXI, 421 p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012
by Bestak, Robert.
Publication:
. XXII, 437 p. 191 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012 Workshops
by Becvar, Zdenek.
Publication:
. XVI, 158p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Meadows, Catherine.
Publication:
. X, 239p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Applications of Models of Computation
by Agrawal, Manindra.
Publication:
. XV, 622 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Reinforcement Learning
by Sanner, Scott.
Publication:
. XIII, 345 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Semantic Web
by Pan, Jeff Z.
Publication:
. XIII, 436p. 119 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Schindler, Werner.
Publication:
. Approx. 280 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Concept Analysis
by Domenach, Florent.
Publication:
. XII, 309 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. XII, 185 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Design Science Research in Information Systems. Advances in Theory and Practice
by Peffers, Ken.
Publication:
. XI, 439p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Runtime Verification
by Khurshid, Sarfraz.
Publication:
. XII, 458 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Large-Scale Scientific Computing
by Lirkov, Ivan.
Publication:
. XIV, 681 p. 147 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Services and Formal Methods
by Carbone, Marco.
Publication:
. IX, 143 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Integration of AI and OR Techniques in Contraint Programming for Combinatorial Optimzation Problems
by Beldiceanu, Nicolas.
Publication:
. XI, 409p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Functional and Logic Programming
by Schrijvers, Tom.
Publication:
. X, 333 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Petkova-Nikova, Svetla.
Publication:
. X, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|