|
|
Multiple Access Communications
by Bellalta, Boris.
Publication:
. XII, 183 p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – ASIACRYPT 2012
by Wang, Xiaoyun.
Publication:
. XVI, 780 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2012
by Galbraith, Steven.
Publication:
. XIV, 566 p. 118 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Distributed Computing Systems
by Xiang, Yang.
Publication:
. XIV, 289 p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multi-Agent Systems
by Cossentino, Massimo.
Publication:
. XII, 259 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Wu, Chuan-Kun.
Publication:
. X, 394 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Knowledge Engineering
by Xiang, Yang.
Publication:
. XII, 251 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Bogdanov, Andrey.
Publication:
. XII, 173 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Computer Entertainment
by Nijholt, Anton.
Publication:
. XXIV, 599 p. 337 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Grossklags, Jens.
Publication:
. XII, 309 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Visual Media
by Hu, Shi-Min.
Publication:
. XII, 268 p. 116 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Structural, Syntactic, and Statistical Pattern Recognition
by Gimel’farb, Georgy.
Publication:
. XVIII, 755 p. 236 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Intelligent Data Analysis XI
by Hollmén, Jaakko.
Publication:
. XIV, 426 p. 136 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Hanaoka, Goichiro.
Publication:
. XII, 261 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Computing and Applications
by Liu, Baoxiang.
Publication:
. XX, 782 p. 262 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Canteaut, Anne.
Publication:
. XII, 463 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Vision – ECCV 2012. Workshops and Demonstrations
by Fusiello, Andrea.
Publication:
. XXIV, 684 p. 325 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Vision – ECCV 2012. Workshops and Demonstrations
by Fusiello, Andrea.
Publication:
. XXII, 611 p. 323 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Vision – ECCV 2012. Workshops and Demonstrations
by Fusiello, Andrea.
Publication:
. XXII, 611 p. 276 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Practice of Natural Computing
by Dediu, Adrian-Horia.
Publication:
. X, 227 p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|