|
|
Computers and Games
by Herik, H. Jaap.
Publication:
. XVIII, 277p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XI
by Gavrilova, Marina L.
Publication:
. XVIII, 294p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Distributed Systems
by Lu, Chenyang.
Publication:
. XII, 517p. 112 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Heng, Swee-Huay.
Publication:
. XIII, 355p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Network Economics
by Saberi, Amin.
Publication:
. X, 580p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Computation
by Cheong, Otfried.
Publication:
. XVIII, 465p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Computation
by Cheong, Otfried.
Publication:
. XVIII, 474p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Optimization and Applications
by Wu, Weili.
Publication:
. XVI, 416p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Optimization and Applications
by Wu, Weili.
Publication:
. XVI, 424p. 105 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography - Pairing 2010
by Joye, Marc.
Publication:
. XIII, 467p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2010
by Gong, Guang.
Publication:
. XVI, 366p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Alpcan, Tansu.
Publication:
. X, 281p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Theoretic Concepts in Computer Science
by Thilikos, Dimitrios M.
Publication:
. XIII, 338p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sequences and Their Applications – SETA 2010
by Carlet, Claude.
Publication:
. X, 465p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms – ESA 2010
by Berg, Mark.
Publication:
. XVII, 245p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms – ESA 2010
by Berg, Mark.
Publication:
. XVIII, 587p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
by Serna, Maria.
Publication:
. XIII, 782p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2010
by Rabin, Tal.
Publication:
. XIV, 744p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Diagrammatic Representation and Inference
by Goel, Ashok K.
Publication:
. XIII, 356p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information, Security and Cryptology – ICISC 2009
by Lee, Donghoon.
Publication:
. XIII, 387p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|