|
|
Deterministic Extraction from Weak Random Sources
by Gabizon, Ariel.
Publication:
. XII, 148 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Ecosystems
by Antonio Basile Colugnati, Fernando.
Publication:
. XVI, 305p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theoretical Aspects of Distributed Computing in Sensor Networks
by Nikoletseas, Sotiris.
Publication:
. XXVI, 928p. 94 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Contemporary Computing
by Ranka, Sanjay.
Publication:
. XXIV, 613p. 264 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Intelligent Computing Theories and Applications
by Huang, De-Shuang.
Publication:
. XVI, 580p. 243 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Contemporary Computing
by Ranka, Sanjay.
Publication:
. XXIV, 275p. 134 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Evaluation of Novel Approaches to Software Engineering
by Maciaszek, Leszek A.
Publication:
. X, 324p. 135 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Matters Computational
by Arndt, Jörg.
Publication:
. XIV, 978p. 475 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Enabling Real-Time Business Intelligence
by Castellanos, Malu.
Publication:
. III, 175p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Specification and Verification of Declarative Open Interaction Models
by Montali, Marco.
Publication:
. XXII, 411p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Logical Analysis of Hybrid Systems
by Platzer, André.
Publication:
. XXX, 426p. 137 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Networks and Communications
by Meghanathan, Natarajan.
Publication:
. XIX, 725p. 352 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Network Security and Applications
by Meghanathan, Natarajan.
Publication:
. 651p. 286 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Towards Hardware-Intrinsic Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 407 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Locally Decodable Codes and Private Information Retrieval Schemes
by Yekhanin, Sergey.
Publication:
. XII, 82 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Balanced Automation Systems for Future Manufacturing Networks
by Ortiz, Ángel.
Publication:
. XIV, 310p. 87 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Statistical Steganalysis
by Böhme, Rainer.
Publication:
. XVI, 288 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Networked Digital Technologies
by Zavoral, Filip.
Publication:
. XXIII, 730p. 289 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Efficient Secure Two-Party Protocols
by Hazay, Carmit.
Publication:
. XIII, 263 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Networked Digital Technologies
by Zavoral, Filip.
Publication:
. XXIII, 580p. 231 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|