//]]>
Wireless Sensor Networks by Marrón, Pedro José. Publication: . X, 227 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
WALCOM: Algorithms and Computation by Katoh, Naoki. Publication: . XI, 233p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2011 by Kiayias, Aggelos. Publication: . XIII, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Drawing by Brandes, Ulrik. Publication: . XIV, 414p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Numerical Methods and Applications by Dimov, Ivan. Publication: . XIV, 512 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SOFSEM 2011: Theory and Practice of Computer Science by Černá, Ivana. Publication: . XIV, 572p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multi-Agent-Based Simulation XI by Bosse, Tibor. Publication: . X, 167 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Approximation and Online Algorithms by Jansen, Klaus. Publication: . X, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
DNA Computing and Molecular Programming by Sakakibara, Yasubumi. Publication: . X, 187p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Rough Sets XIII by Peters, James F. Publication: . VIII, 277p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Verification, Model Checking, and Abstract Interpretation by Jhala, Ranjit. Publication: . XI, 419p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Petri Nets and Other Models of Concurrency IV by Jensen, Kurt. Publication: . XVIII, 225p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Performance Evaluation, Measurement and Characterization of Complex Systems by Nambiar, Raghunath. Publication: . XVI, 233p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Burmester, Mike. Publication: . XIV, 446p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Implementation and Application of Automata by Domaratzki, Michael. Publication: . XII, 332p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Dam, Wim. Publication: . VIII, 187 p. 14 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Logic and Its Applications by Banerjee, Mohua. Publication: . X, 219p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Models for the Web-Graph by Kumar, Ravi. Publication: . VIII, 163p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Language, Games, and Evolution by Benz, Anton. Publication: . VII, 189p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Chung, Yongwha. Publication: . XIII, 352p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart