//]]>
Logic, Rationality, and Interaction by Ditmarsch, Hans. Publication: . XI, 403 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2011 by Preneel, Bart. Publication: . XIV, 524 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in Intrusion Detection by Sommer, Robin. Publication: . 398p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Mathematics of Language by Kanazawa, Makoto. Publication: . IV, 227p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Optical Supercomputing by Dolev, Shlomi. Publication: . X, 131 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Rough Sets XIV by Peters, James F. Publication: . VII, 235p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management by Atallah, Mikhail. Publication: . XIII, 390p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coding and Cryptology by Chee, Yeow Meng. Publication: . VIII, 295 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Ogihara, Mitsunori. Publication: . XVI, 564 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Search Computing by Ceri, Stefano. Publication: . XIII, 273 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Ishai, Yuval. Publication: . XII, 631 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rainbow of Computer Science by Calude, Cristian S. Publication: . XII, 285p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
High Performance Computing for Computational Science – VECPAR 2010 by Palma, José M. Laginha M. Publication: . XIV, 470 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Algorithms by Iliopoulos, Costas S. Publication: . XI, 418 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Erlingsson, Úlfar. Publication: . XI, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Watermarking by Kim, Hyoung-Joong. Publication: . X, 317p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Petri Nets and Other Models of Concurrency IV by Jensen, Kurt. Publication: . XVIII, 225p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Dam, Wim. Publication: . VIII, 187 p. 14 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XI by Gavrilova, Marina L. Publication: . XVIII, 294p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Soriano, Miguel. Publication: . XIV, 474p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart