|
|
Language and Automata Theory and Applications
by Dediu, Adrian-Horia.
Publication:
. XII, 556p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Building a National Distributed e-Infrastructure–PL-Grid
by Bubak, Marian.
Publication:
. XII, 354 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Partially Supervised Learning
by Schwenker, Friedhelm.
Publication:
. X, 159 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mathematical Modeling and Computational Science
by Adam, Gheorghe.
Publication:
. XII, 336p. 127 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms for Sensor Systems
by Erlebach, Thomas.
Publication:
. X, 239p. 36 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Sensor Networks
by Picco, Gian Pietro.
Publication:
. XII, 261p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Parallel and Scientific Computing
by Jónasson, Kristján.
Publication:
. XXVII, 339p. 155 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Parallel and Scientific Computing
by Jónasson, Kristján.
Publication:
. XXVIII, 477p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Parameterized and Exact Computation
by Marx, Dániel.
Publication:
. VIII, 273p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2012
by Dunkelman, Orr.
Publication:
. XI, 434p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Verification, Model Checking, and Abstract Interpretation
by Kuncak, Viktor.
Publication:
. X, 457p. 111 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations and Practice of Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIII, 253 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Jung, Souhwan.
Publication:
. XII, 271p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SOFSEM 2012: Theory and Practice of Computer Science
by Bieliková, Mária.
Publication:
. XVII, 674 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computation, Physics and Beyond
by Dinneen, Michael J.
Publication:
. XIII, 427p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. Approx. 335 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Security and Applications
by Mödersheim, Sebastian.
Publication:
. IX, 225 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Prouff, Emmanuel.
Publication:
. XI, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Swarm, Evolutionary, and Memetic Computing
by Panigrahi, Bijaya Ketan.
Publication:
. XXII, 332p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Swarm, Evolutionary, and Memetic Computing
by Panigrahi, Bijaya Ketan.
Publication:
. XXII, 754 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|