|
|
Algorithms in Bioinformatics
by Przytycka, Teresa M.
Publication:
. XIII, 378 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mathematical Foundations of Computer Science 2011
by Murlak, Filip.
Publication:
. XV, 618 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fundamentals of Computation Theory
by Owe, Olaf.
Publication:
. XIII, 373 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
by Goldberg, Leslie Ann.
Publication:
. XV, 702 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Furnell, Steven.
Publication:
. XII, 223 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial General Intelligence
by Schmidhuber, Jürgen.
Publication:
. XIV, 416 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Spaces and Next Generation Wired/Wireless Networking
by Balandin, Sergey.
Publication:
. XVI, 634 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Bioinformatics and Computational Biology
by Norberto de Souza, Osmar.
Publication:
. IX, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computing and Combinatorics
by Fu, Bin.
Publication:
. XIII, 650p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Optimization and Applications
by Wang, Weifan.
Publication:
. XII, 562 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Decision for Artificial Intelligence
by Torra, Vicenç.
Publication:
. XIII, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rule-Based Reasoning, Programming, and Applications
by Bassiliades, Nick.
Publication:
. XIII, 385 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Immune Systems
by Liò, Pietro.
Publication:
. XVI, 468p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
User Modeling, Adaption and Personalization
by Konstan, Joseph A.
Publication:
. XIX, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scientific and Statistical Database Management
by Bayard Cushing, Judith.
Publication:
. XVII, 602p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXV
by Li, Yingjiu.
Publication:
. XI, 309p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Developments in Language Theory
by Mauri, Giancarlo.
Publication:
. XIV, 482 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Data Structures
by Dehne, Frank.
Publication:
. XV, 718p.
Availability:
Copies available:
AUM Main Library
(1),
|
|