//]]>
Combinatorial Optimization and Applications by Wu, Weili. Publication: . XVI, 424p. 105 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography - Pairing 2010 by Joye, Marc. Publication: . XIII, 467p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2010 by Gong, Guang. Publication: . XVI, 366p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2010 by Abe, Masayuki. Publication: . XIV, 634p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
From Active Data Management to Event-Based Systems and More by Sachs, Kai. Publication: . XIV, 337p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Alpcan, Tansu. Publication: . X, 281p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Retrieval Technology by Cheng, Pu-Jen. Publication: . XIII, 627p. 152 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms for Sensor Systems by Scheideler, Christian. Publication: . X, 190p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Motion in Games by Boulic, Ronan. Publication: . XII, 436p. 210 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems, OTM 2010 by Meersman, Robert. Publication: . XXII, 466p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2010 by Meersman, Robert. Publication: . XXII, 703p. 230 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Theoretic Concepts in Computer Science by Thilikos, Dimitrios M. Publication: . XIII, 338p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods and Software Engineering by Dong, Jin Song. Publication: . XIV, 712p. 202 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modelling Autonomic Communication Environments by Brennan, Rob. Publication: . X, 125p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Echizen, Isao. Publication: . XIII, 371p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification: Security and Privacy Issues by Ors Yalcin, Siddika Berna. Publication: . X, 271p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Soft Computing by Sidorov, Grigori. Publication: . XXIV, 515p. 200 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XV, 514p. 257 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XV, 472p. 269 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XXVII, 534p. 217 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Refine your search