//]]>
Graph Structures for Knowledge Representation and Reasoning by Croitoru, Madalina. Publication: . VII, 209 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Swarm and Evolutionary Computation by Rutkowski, Leszek. Publication: . X, 440 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
LATIN 2012: Theoretical Informatics by Fernández-Baca, David. Publication: . XVII, 669 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Computing, Networking and Security by Thilagam, P. Santhi. Publication: . XVII, 641 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Genetic Programming by Moraglio, Alberto. Publication: . XII, 279p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolutionary Computation in Combinatorial Optimization by Hao, Jin-Kao. Publication: . XII, 264p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Approximation and Online Algorithms by Solis-Oba, Roberto. Publication: . X, 278 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Petri Nets and Other Models of Concurrency V by Jensen, Kurt. Publication: . XVII, 293 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics by Giacobini, Mario. Publication: . XIII, 255p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2012 by Pointcheval, David. Publication: . XIV, 758 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Artificial Intelligent Systems by Corchado, Emilio. Publication: . XXXII, 708 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Artificial Intelligent Systems by Corchado, Emilio. Publication: . XXXII, 606 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection by Lopez, Javier. Publication: . XIV, 357 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Cramer, Ronald. Publication: . Approx. 670 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security VII by Shi, Yun Q. Publication: . IX, 115p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Compiler Construction by O’Boyle, Michael. Publication: . XVI, 245 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Degano, Pierpaolo. Publication: . XIV, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Latent Variable Analysis and Signal Separation by Theis, Fabian. Publication: . XVI, 538p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Taft, Nina. Publication: . XI, 264 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XV by Gavrilova, Marina L. Publication: . XIII, 217 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart