//]]>
Multi-Agent-Based Simulation XI by Bosse, Tibor. Publication: . X, 167 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Approximation and Online Algorithms by Jansen, Klaus. Publication: . X, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
DNA Computing and Molecular Programming by Sakakibara, Yasubumi. Publication: . X, 187p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Rough Sets XIII by Peters, James F. Publication: . VIII, 277p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Verification, Model Checking, and Abstract Interpretation by Jhala, Ranjit. Publication: . XI, 419p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Petri Nets and Other Models of Concurrency IV by Jensen, Kurt. Publication: . XVIII, 225p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Performance Evaluation, Measurement and Characterization of Complex Systems by Nambiar, Raghunath. Publication: . XVI, 233p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Toward Autonomous, Adaptive, and Context-Aware Multimodal Interfaces. Theoretical and Practical Issues by Esposito, Anna. Publication: . XXII, 474p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agents for Games and Simulations II by Dignum, Frank. Publication: . X, 206 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Burmester, Mike. Publication: . XIV, 446p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Membrane Computing by Gheorghe, Marian. Publication: . IX, 393p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Implementation and Application of Automata by Domaratzki, Michael. Publication: . XII, 332p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Dam, Wim. Publication: . VIII, 187 p. 14 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Verification of Object-Oriented Software by Beckert, Bernhard. Publication: . X, 199p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge Representation for Health-Care by Riaño, David. Publication: . X, 153p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Logic and Its Applications by Banerjee, Mohua. Publication: . X, 219p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Generative and Transformational Techniques in Software Engineering III by Fernandes, João M. Publication: . X, 499 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Models for the Web-Graph by Kumar, Ravi. Publication: . VIII, 163p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Language, Games, and Evolution by Benz, Anton. Publication: . VII, 189p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Chung, Yongwha. Publication: . XIII, 352p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية