//]]>
Wireless Algorithms, Systems, and Applications by Pandurangan, Gopal. Publication: . XV, 256p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
New Frontiers in Applied Data Mining by Theeramunkong, Thanaruk. Publication: . XII, 169p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2010 by Rabin, Tal. Publication: . XIV, 744p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Diagrammatic Representation and Inference by Goel, Ashok K. Publication: . XIII, 356p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 263p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database Systems for Advanced Applications by Yoshikawa, Masatoshi. Publication: . XIX, 472p. 192 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sion, Radu. Publication: . XII, 432p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence Methods for Bioinformatics and Biostatistics by Masulli, Francesco. Publication: . XIII, 320p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dependency Structures and Lexicalized Grammars by Kuhlmann, Marco. Publication: . XII, 137p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Focused Retrieval and Evaluation by Geva, Shlomo. Publication: . 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics by Lee, Der-Tsai. Publication: . XI, 339p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Immune Systems by Hart, Emma. Publication: . XI, 329p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Entertainment for Education. Digital Techniques and Systems by Zhang, Xiaopeng. Publication: . XVI, 635p. 310 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Atallah, Mikhail J. Publication: . X, 291p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Unifying Theories of Programming by Butterfield, Andrew. Publication: . IX, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Number Theory by Hanrot, Guillaume. Publication: . XI, 397p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Edutainment IV by Pan, Zhigeng. Publication: . X, 277p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Rough Sets XII by Peters, James F. Publication: . X, 339p. 5 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Services and Formal Methods by Laneve, Cosimo. Publication: . VII, 197p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart