|
|
Parameterized and Exact Computation
by Marx, Dániel.
Publication:
. VIII, 273p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2012
by Dunkelman, Orr.
Publication:
. XI, 434p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SOFSEM 2012: Theory and Practice of Computer Science
by Bieliková, Mária.
Publication:
. XVII, 674 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Curves and Surfaces
by Boissonnat, Jean-Daniel.
Publication:
. X, 748 p. 355 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Drawing
by Kreveld, Marc.
Publication:
. XIV, 458 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Distributed Systems
by Fernàndez Anta, Antonio.
Publication:
. XIII, 564 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph-Theoretic Concepts in Computer Science
by Kolman, Petr.
Publication:
. XI, 344 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Computation
by Asano, Takao.
Publication:
. XVIII, 775 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – INDOCRYPT 2011
by Bernstein, Daniel J.
Publication:
. XIII, 401 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Learning and Intelligent Optimization
by Coello, Carlos A. Coello.
Publication:
. XVII, 636 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Chen, Liqun.
Publication:
. XIII, 497 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Lin, Dongdai.
Publication:
. XII, 313 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Network Economics
by Chen, Ning.
Publication:
. XII, 420 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Yang, Bo-Yin.
Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011
Date:2011
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – ASIACRYPT 2011
by Lee, Dong Hoon.
Publication:
. XIV, 760 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XIV
by Gavrilova, Marina L.
Publication:
. XIII, 239 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automated Deduction in Geometry
by Schreck, Pascal.
Publication:
. X, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Algorithms
by Iliopoulos, Costas S.
Publication:
. XI, 387 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Geometry, Graphs and Applications
by Akiyama, Jin.
Publication:
. VIII, 227 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology - ICISC 2010
by Rhee, Kyung-Hyune.
Publication:
. XIII, 435p.
Availability:
Copies available:
AUM Main Library
(1),
|
|