//]]>
Transactions on Data Hiding and Multimedia Security VII by Shi, Yun Q. Publication: . IX, 115p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Compiler Construction by O’Boyle, Michael. Publication: . XVI, 245 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Degano, Pierpaolo. Publication: . XIV, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Latent Variable Analysis and Signal Separation by Theis, Fabian. Publication: . XVI, 538p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Taft, Nina. Publication: . XI, 264 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XV by Gavrilova, Marina L. Publication: . XIII, 217 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive and Learning Agents by Vrancx, Peter. Publication: . VII, 135 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Areas in Cryptography by Miri, Ali. Publication: . XIII, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Pan, Jeng-Shyang. Publication: . XIX, 529 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Pan, Jeng-Shyang. Publication: . XX, 575p. 230 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Pan, Jeng-Shyang. Publication: . XXXI, 503p. 214 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations of Information and Knowledge Systems by Lukasiewicz, Thomas. Publication: . XII, 405 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multi-Agent-Based Simulation XII by Villatoro, Daniel. Publication: . IX, 127 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Security: From Theory to Applications by Naccache, David. Publication: . XIII, 502 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reconfigurable Computing: Architectures, Tools and Applications by Choy, Oliver C. S. Publication: . XIV, 386p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Language and Automata Theory and Applications by Dediu, Adrian-Horia. Publication: . XII, 556p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Building a National Distributed e-Infrastructure–PL-Grid by Bubak, Marian. Publication: . XII, 354 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Partially Supervised Learning by Schwenker, Friedhelm. Publication: . X, 159 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical Modeling and Computational Science by Adam, Gheorghe. Publication: . XII, 336p. 127 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms for Sensor Systems by Erlebach, Thomas. Publication: . X, 239p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart