//]]>
Data and Knowledge Engineering by Xiang, Yang. Publication: . XII, 251 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph-Theoretic Concepts in Computer Science by Golumbic, Martin Charles. Publication: . XIV, 346 p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Bogdanov, Andrey. Publication: . XII, 173 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning and Intelligent Optimization by Hamadi, Youssef. Publication: . XXIV, 514 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computer Entertainment by Nijholt, Anton. Publication: . XXIV, 599 p. 337 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods and Software Engineering by Aoki, Toshiaki. Publication: . XIV, 512 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Grossklags, Jens. Publication: . XII, 309 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Visual Media by Hu, Shi-Min. Publication: . XII, 268 p. 116 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Geometry by Márquez, Alberto. Publication: . X, 283 p. 176 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applications of Graph Transformations with Industrial Relevance by Schürr, Andy. Publication: . XII, 255 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structural, Syntactic, and Statistical Pattern Recognition by Gimel’farb, Georgy. Publication: . XVIII, 755 p. 236 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Intelligent Data Analysis XI by Hollmén, Jaakko. Publication: . XIV, 426 p. 136 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Chim, Tat Wing. Publication: . XVI, 506 p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pattern Recognition in Bioinformatics by Shibuya, Tetsuo. Publication: . XII, 278 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Hanaoka, Goichiro. Publication: . XII, 261 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Learning Theory by Bshouty, Nader H. Publication: . XII, 381 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Computing and Applications by Liu, Baoxiang. Publication: . XX, 782 p. 262 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Canteaut, Anne. Publication: . XII, 463 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2012. Workshops and Demonstrations by Fusiello, Andrea. Publication: . XXIV, 684 p. 325 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2012. Workshops and Demonstrations by Fusiello, Andrea. Publication: . XXII, 611 p. 323 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart