//]]>
Reliable and autonomous computational science : , international conference, RACS 2010, Atlanta, Ga, USA, October 27-30, 2010 /   Publication: [Basel] : Springer Basel AG, 2011 . 408 p. : 23 cm. Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundational and practical aspects of resource analysis : , First International Workshop, FOPARA 2009, Eindhoven, the Netherlands, November 6, 2010, revised selected papers /   Publication: Berlin : Springer, 2010 . viii, 162 p. : Date:2010 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Abstract state machines, Alloy, B And Z : , Second International Conference, ABZ 2010 Orford, QC, Canada, February 22-25, 2010 : Proceedings /   Publication: Berlin : Springer, 2010 . xiv, 416 p. : Date:2010 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Computational Geometry and Graphs by Akiyama, Jin. Publication: . X, 163 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Algorithms by Lecroq, Thierry. Publication: . XXII, 474 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Stam, Martijn. Publication: . XII, 365 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph-Theoretic Concepts in Computer Science by Brandstädt, Andreas. Publication: . XX, 430 p. 114 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Computation by Cai, Leizhen. Publication: . XVIII, 747 p. 145 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning and Intelligent Optimization by Nicosia, Giuseppe. Publication: . XV, 470 p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 542 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 546 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Number Theory and Cryptography by Fischlin, Marc. Publication: . XII, 281 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Numerical Analysis and Its Applications by Dimov, Ivan. Publication: . XII, 572 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Sakiyama, Kazuo. Publication: . XII, 319 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles and Practice of Constraint Programming by Schulte, Christian. Publication: . XVIII, 898 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms in Bioinformatics by Darling, Aaron. Publication: . XIV, 378 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms – ESA 2013 by Bodlaender, Hans L. Publication: . XVIII, 829 p. 134 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques by Raghavendra, Prasad. Publication: . XIV, 716 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical Foundations of Computer Science 2013 by Chatterjee, Krishnendu. Publication: . XVI, 854 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Space-Efficient Data Structures, Streams, and Algorithms by Brodnik, Andrej. Publication: . XXVIII, 363 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>