|
|
AI 2012: Advances in Artificial Intelligence
by Thielscher, Michael.
Publication:
. XX, 917 p. 244 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Access Communications
by Bellalta, Boris.
Publication:
. XII, 183 p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – ASIACRYPT 2012
by Wang, Xiaoyun.
Publication:
. XVI, 780 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2012
by Galbraith, Steven.
Publication:
. XIV, 566 p. 118 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Distributed Computing Systems
by Xiang, Yang.
Publication:
. XIV, 289 p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Design and Analysis of Algorithms
by Even, Guy.
Publication:
. X, 261 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multi-Agent Systems
by Cossentino, Massimo.
Publication:
. XII, 259 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Image Analaysis
by Barneva, Reneta P.
Publication:
. XIV, 313 p. 176 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Wu, Chuan-Kun.
Publication:
. X, 394 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Knowledge Engineering
by Xiang, Yang.
Publication:
. XII, 251 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph-Theoretic Concepts in Computer Science
by Golumbic, Martin Charles.
Publication:
. XIV, 346 p. 45 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Bogdanov, Andrey.
Publication:
. XII, 173 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Learning and Intelligent Optimization
by Hamadi, Youssef.
Publication:
. XXIV, 514 p. 132 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Computer Entertainment
by Nijholt, Anton.
Publication:
. XXIV, 599 p. 337 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Methods and Software Engineering
by Aoki, Toshiaki.
Publication:
. XIV, 512 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Grossklags, Jens.
Publication:
. XII, 309 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Visual Media
by Hu, Shi-Min.
Publication:
. XII, 268 p. 116 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Geometry
by Márquez, Alberto.
Publication:
. X, 283 p. 176 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applications of Graph Transformations with Industrial Relevance
by Schürr, Andy.
Publication:
. XII, 255 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Structural, Syntactic, and Statistical Pattern Recognition
by Gimel’farb, Georgy.
Publication:
. XVIII, 755 p. 236 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|