//]]>
Applied Cryptography and Network Security by Lopez, Javier. Publication: . XIII, 552 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Optimization by Pahl, Julia. Publication: . XIV, 670 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems by Achterberg, Tobias. Publication: . X, 253p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Models for the Web Graph by Frieze, Alan. Publication: . IX, 127p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management by Atallah, Mikhail. Publication: . XIII, 390p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Neural Networks – ISNN 2011 by Liu, Derong. Publication: . XXII, 642 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Neural Networks – ISNN 2011 by Liu, Derong. Publication: . XXXIV, 634 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Neural Networks – ISNN 2011 by Liu, Derong. Publication: . XXII, 646 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Image Analysis by Aggarwal, Jake K. Publication: . XIV, 496 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Logic, Language, Information and Computation by Beklemishev, Lev D. Publication: . X, 311 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Ogihara, Mitsunori. Publication: . XVI, 564 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integer Programming and Combinatoral Optimization by Günlük, Oktay. Publication: . XIII, 432p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Science – Theory and Applications by Kulikov, Alexander. Publication: . XI, 471 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2011 by Paterson, Kenneth G. Publication: . XIV, 628p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolutionary Computation in Combinatorial Optimization by Merz, Peter. Publication: . XIV, 263 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Discrete Geometry for Computer Imagery by Debled-Rennesson, Isabelle. Publication: . XIV, 526 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2011 by Catalano, Dario. Publication: . XIII, 495p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Algorithms by Iliopoulos, Costas S. Publication: . XI, 418 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
WALCOM: Algorithms and Computation by Katoh, Naoki. Publication: . XI, 233p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2011 by Kiayias, Aggelos. Publication: . XIII, 417p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart