//]]>
Wireless Algorithms, Systems, and Applications by Pandurangan, Gopal. Publication: . XV, 256p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 263p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence Methods for Bioinformatics and Biostatistics by Masulli, Francesco. Publication: . XIII, 320p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics by Lee, Der-Tsai. Publication: . XI, 339p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Immune Systems by Hart, Emma. Publication: . XI, 329p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Atallah, Mikhail J. Publication: . X, 291p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Number Theory by Hanrot, Guillaume. Publication: . XI, 397p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Developments in Language Theory by Gao, Yuan. Publication: . XII, 446p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Self-Organizing Architectures by Weyns, Danny. Publication: . X, 301p. 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Processing and Applied Mathematics by Wyrzykowski, Roman. Publication: . XXIV, 596p. 272 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Processing and Applied Mathematics by Wyrzykowski, Roman. Publication: . XXIV, 628p. 242 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Aspects in Information and Management by Chen, Bo. Publication: . XI, 336p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security V by Shi, Yun Q. Publication: . XI, 129p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Topics in Artificial Intelligence by Meseguer, Pedro. Publication: . XII, 302p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Kreibich, Christian. Publication: . XII, 219p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Satisfiability Testing – SAT 2010 by Strichman, Ofer. Publication: . XIII, 400p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIII, 754p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIV, 614p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Refine your search