//]]>
Trust and Trustworthy Computing by McCune, Jonathan M. Publication: . VII, 314p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Image Analysis and Recognition by Kamel, Mohamed. Publication: . XX, 409p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Image Analysis and Recognition by Kamel, Mohamed. Publication: . XX, 449 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Satisfiability Testing - SAT 2011 by Sakallah, Karem A. Publication: . XIII, 371p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Classifier Systems by Sansone, Carlo. Publication: . XII, 372p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Lopez, Javier. Publication: . XIII, 552 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Optimization by Pahl, Julia. Publication: . XIV, 670 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Swarm Intelligence by Tan, Ying. Publication: . XXVI, 587p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Lai, Xuejia. Publication: . XIV, 524p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Swarm Intelligence by Tan, Ying. Publication: . XXVI, 639p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
OpenMP in the Petascale Era by Chapman, Barbara M. Publication: . X, 179p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managing the Dynamics of Networks and Services by Chrisment, Isabelle. Publication: . X, 181p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Pattern Matching by Giancarlo, Raffaele. Publication: . XV, 480p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations on Natural and Artificial Computation by Ferrández, José Manuel. Publication: . XXV, 566 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Unconventional Computation by Calude, Cristian S. Publication: . X, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
New Challenges on Bioinspired Applications by Ferrández, José Manuel. Publication: . XXV, 486p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence in Security for Information Systems by Herrero, Álvaro. Publication: . XIV, 310p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems by Achterberg, Tobias. Publication: . X, 253p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Models for the Web Graph by Frieze, Alan. Publication: . IX, 127p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bioinformatics Research and Applications by Chen, Jianer. Publication: . XIV, 454p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية