//]]>
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIV, 614p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Steinfeld, Ron. Publication: . XII, 403p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computing and Combinatorics by Thai, My T. Publication: . 553p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Programs, Proofs, Processes by Ferreira, Fernando. Publication: . XIV, 450p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Hong, Seokhie. Publication: . XI, 385p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Logic, Language, Information and Computation by Dawar, Anuj. Publication: . X, 259p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning and Intelligent Optimization by Blum, Christian. Publication: . XIV, 344p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Arithmetic of Finite Fields by Hasan, M. Anwar. Publication: . 280p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithm Theory - SWAT 2010 by Kaplan, Haim. Publication: . 448p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Zhou, Jianying. Publication: . XIII, 564p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Kratochvíl, Jan. Publication: . XIV, 480p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems by Lodi, Andrea. Publication: . XI, 369p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Geometric Modeling and Processing by Mourrain, Bernard. Publication: . X, 315p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structural Information and Communication Complexity by Patt-Shamir, Boaz. Publication: . 273p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2010 by Gilbert, Henri. Publication: . XIV, 694p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Science – Theory and Applications by Ablayev, Farid. Publication: . XI, 397p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fun with Algorithms by Boldi, Paolo. Publication: . IX, 382p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Complexity by Calamoneri, Tiziana. Publication: . XI, 384p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integer Programming and Combinatorial Optimization by Eisenbrand, Friedrich. Publication: . XIII, 466p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2010 by Nguyen, Phong Q. Publication: . XIII, 519p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Refine your search