//]]>
Genetic Programming by Moraglio, Alberto. Publication: . XII, 279p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolutionary Computation in Combinatorial Optimization by Hao, Jin-Kao. Publication: . XII, 264p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Approximation and Online Algorithms by Solis-Oba, Roberto. Publication: . X, 278 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Petri Nets and Other Models of Concurrency V by Jensen, Kurt. Publication: . XVII, 293 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics by Giacobini, Mario. Publication: . XIII, 255p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2012 by Pointcheval, David. Publication: . XIV, 758 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Artificial Intelligent Systems by Corchado, Emilio. Publication: . XXXII, 708 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Artificial Intelligent Systems by Corchado, Emilio. Publication: . XXXII, 606 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection by Lopez, Javier. Publication: . XIV, 357 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Cramer, Ronald. Publication: . Approx. 670 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security VII by Shi, Yun Q. Publication: . IX, 115p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Compiler Construction by O’Boyle, Michael. Publication: . XVI, 245 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Degano, Pierpaolo. Publication: . XIV, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Latent Variable Analysis and Signal Separation by Theis, Fabian. Publication: . XVI, 538p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Taft, Nina. Publication: . XI, 264 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XV by Gavrilova, Marina L. Publication: . XIII, 217 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive and Learning Agents by Vrancx, Peter. Publication: . VII, 135 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Areas in Cryptography by Miri, Ali. Publication: . XIII, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Pan, Jeng-Shyang. Publication: . XIX, 529 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Pan, Jeng-Shyang. Publication: . XX, 575p. 230 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart