//]]>
Fundamentals of Computation Theory by Owe, Olaf. Publication: . XIII, 373 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algebra and Coalgebra in Computer Science by Corradini, Andrea. Publication: . XI, 420p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques by Goldberg, Leslie Ann. Publication: . XV, 702 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Furnell, Steven. Publication: . XII, 223 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial General Intelligence by Schmidhuber, Jürgen. Publication: . XIV, 416 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Spaces and Next Generation Wired/Wireless Networking by Balandin, Sergey. Publication: . XVI, 634 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Bioinformatics and Computational Biology by Norberto de Souza, Osmar. Publication: . IX, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2011 by Rogaway, Phillip. Publication: . XV, 782p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computing and Combinatorics by Fu, Bin. Publication: . XIII, 650p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation by Goldreich, Oded. Publication: . XI, 563p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Camenisch, Jan. Publication: . XII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Optimization and Applications by Wang, Weifan. Publication: . XII, 562 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modeling Decision for Artificial Intelligence by Torra, Vicenç. Publication: . XIII, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rule-Based Reasoning, Programming, and Applications by Bassiliades, Nick. Publication: . XIII, 385 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Parampalli, Udaya. Publication: . XIII, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Holz, Thorsten. Publication: . X, 235p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Immune Systems by Liò, Pietro. Publication: . XVI, 468p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
User Modeling, Adaption and Personalization by Konstan, Joseph A. Publication: . XIX, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scientific and Statistical Database Management by Bayard Cushing, Judith. Publication: . XVII, 602p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXV by Li, Yingjiu. Publication: . XI, 309p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart