|
|
Mathematical Morphology and Its Applications to Image and Signal Processing
by Soille, Pierre.
Publication:
. XII, 484p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Optimization
by Pahl, Julia.
Publication:
. XIV, 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Pattern Matching
by Giancarlo, Raffaele.
Publication:
. XV, 480p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management
by Atallah, Mikhail.
Publication:
. XIII, 390p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Integer Programming and Combinatoral Optimization
by Günlük, Oktay.
Publication:
. XIII, 432p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics
by Pizzuti, Clara.
Publication:
. X, 183 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Practice of Algorithms in (Computer) Systems
by Marchetti-Spaccamela, Alberto.
Publication:
. X, 266 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Languages and Compilers for Parallel Computing
by Cooper, Keith.
Publication:
. X, 278 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Algorithms
by Iliopoulos, Costas S.
Publication:
. XI, 418 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Erlingsson, Úlfar.
Publication:
. XI, 273p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Watermarking
by Kim, Hyoung-Joong.
Publication:
. X, 317p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
DNA Computing and Molecular Programming
by Sakakibara, Yasubumi.
Publication:
. X, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Implementation and Application of Automata
by Domaratzki, Michael.
Publication:
. XII, 332p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Soriano, Miguel.
Publication:
. XIV, 474p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Heng, Swee-Huay.
Publication:
. XIII, 355p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Computation
by Cheong, Otfried.
Publication:
. XVIII, 465p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Computation
by Cheong, Otfried.
Publication:
. XVIII, 474p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Retrieval Technology
by Cheng, Pu-Jen.
Publication:
. XIII, 627p. 152 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Theoretic Concepts in Computer Science
by Thilikos, Dimitrios M.
Publication:
. XIII, 338p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Large-Scale Data- and Knowledge-Centered Systems II
by Hameurlain, Abdelkader.
Publication:
. XI, 141p. 65 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|