|
|
Combinatorial Algorithms
by Iliopoulos, Costas S.
Publication:
. XI, 418 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Erlingsson, Úlfar.
Publication:
. XI, 273p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Watermarking
by Kim, Hyoung-Joong.
Publication:
. X, 317p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
DNA Computing and Molecular Programming
by Sakakibara, Yasubumi.
Publication:
. X, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Implementation and Application of Automata
by Domaratzki, Michael.
Publication:
. XII, 332p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Soriano, Miguel.
Publication:
. XIV, 474p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Heng, Swee-Huay.
Publication:
. XIII, 355p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Computation
by Cheong, Otfried.
Publication:
. XVIII, 465p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Computation
by Cheong, Otfried.
Publication:
. XVIII, 474p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Retrieval Technology
by Cheng, Pu-Jen.
Publication:
. XIII, 627p. 152 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Theoretic Concepts in Computer Science
by Thilikos, Dimitrios M.
Publication:
. XIII, 338p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Large-Scale Data- and Knowledge-Centered Systems II
by Hameurlain, Abdelkader.
Publication:
. XI, 141p. 65 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Objects and Databases
by Dearle, Alan.
Publication:
. XIV, 161p. 58 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Transformations
by Ehrig, Hartmut.
Publication:
. XII, 419p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy in Statistical Databases
by Domingo-Ferrer, Josep.
Publication:
. XI, 297p. 47 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms – ESA 2010
by Berg, Mark.
Publication:
. XVII, 245p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms – ESA 2010
by Berg, Mark.
Publication:
. XVIII, 587p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Database and XML Technologies
by Lee, Mong Li.
Publication:
. VI, 156p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Intrusion Detection
by Jha, Somesh.
Publication:
. 524p. 160 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
by Serna, Maria.
Publication:
. XIII, 782p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|