|
|
Natural and Artificial Computation in Engineering and Medical Applications
by Ferrández Vicente, José Manuel.
Publication:
. XXVI, 474 p. 210 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Gaborit, Philippe.
Publication:
. X, 259 p. 17 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Integrated Formal Methods
by Johnsen, Einar Broch.
Publication:
. XIV, 443 p. 95 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Intelligence and Soft Computing
by Rutkowski, Leszek.
Publication:
. XXII, 625 p. 208 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business Process Models. Change Management
by Gerth, Christian.
Publication:
. XVI, 218 p. 125 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Reliable Software Technologies – Ada-Europe 2013
by Keller, Hubert B.
Publication:
. XII, 177 p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Techniques for Distributed Systems
by Beyer, Dirk.
Publication:
. XIV, 321 p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Applied Artificial Intelligence
by Ali, Moonis.
Publication:
. XX, 697 p. 279 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automated Deduction – CADE-24
by Bonacina, Maria Paola.
Publication:
. XVI, 466 p. 95 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Processing in Computer-Assisted Interventions
by Barratt, Dean.
Publication:
. X, 111 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Wang, Jianyong.
Publication:
. XXVIII, 812 p. 326 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2013
by Youssef, Amr.
Publication:
. XIV, 453 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Applications and Interoperable Systems
by Dowling, Jim.
Publication:
. XII, 205 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Science – Theory and Applications
by Bulatov, Andrei A.
Publication:
. XII, 445 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
by Cavallaro, Lorenzo.
Publication:
. XVI, 145 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Experimental Algorithms
by Bonifaci, Vincenzo.
Publication:
. XII, 416 p. 81 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Kutyłowski, Mirosław.
Publication:
. XII, 393 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hybrid Metaheuristics
by Blesa, María J.
Publication:
. X, 213 p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Collective Intelligence X
by Nguyen, Ngoc-Thanh.
Publication:
. XII, 207 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Coordination Models and Languages
by Nicola, Rocco.
Publication:
. XIV, 251 p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|