|
|
Wireless Algorithms, Systems, and Applications
by Pandurangan, Gopal.
Publication:
. XV, 256p. 156 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 263p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Intelligence Methods for Bioinformatics and Biostatistics
by Masulli, Francesco.
Publication:
. XIII, 320p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Frontiers in Algorithmics
by Lee, Der-Tsai.
Publication:
. XI, 339p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Immune Systems
by Hart, Emma.
Publication:
. XI, 329p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Atallah, Mikhail J.
Publication:
. X, 291p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Number Theory
by Hanrot, Guillaume.
Publication:
. XI, 397p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Kurosawa, Kaoru.
Publication:
. X, 249p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Developments in Language Theory
by Gao, Yuan.
Publication:
. XII, 446p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information, Security and Cryptology – ICISC 2009
by Lee, Donghoon.
Publication:
. XIII, 387p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Self-Organizing Architectures
by Weyns, Danny.
Publication:
. X, 301p. 110 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Parallel Processing and Applied Mathematics
by Wyrzykowski, Roman.
Publication:
. XXIV, 596p. 272 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Parallel Processing and Applied Mathematics
by Wyrzykowski, Roman.
Publication:
. XXIV, 628p. 242 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Aspects in Information and Management
by Chen, Bo.
Publication:
. XI, 336p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security V
by Shi, Yun Q.
Publication:
. XI, 129p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Current Topics in Artificial Intelligence
by Meseguer, Pedro.
Publication:
. XII, 302p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Kreibich, Christian.
Publication:
. XII, 219p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Applications of Satisfiability Testing – SAT 2010
by Strichman, Ofer.
Publication:
. XIII, 400p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages and Programming
by Abramsky, Samson.
Publication:
. XXIII, 754p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages and Programming
by Abramsky, Samson.
Publication:
. XXIV, 614p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|