//]]>
Information Hiding by Böhme, Rainer. Publication: . X, 277p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ubiquitous Knowledge Discovery by May, Michael. Publication: . X, 255p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Property Testing by Goldreich, Oded. Publication: . XI, 359p. 5 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Bao, Feng. Publication: . XIII, 460p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Semantic Web Rules by Dean, Mike. Publication: . XIII, 305p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Heng, Swee-Huay. Publication: . X, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integrated Formal Methods by Méry, Dominique. Publication: . X, 337p. 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science VIII by Gavrilova, Marina L. Publication: . XIV, 167p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Facing the Multicore-Challenge by Keller, Rainer. Publication: . X, 156p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Discovery Science by Pfahringer, Bernhard. Publication: . XIII, 384p. 108 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Comparative Genomics by Tannier, Eric. Publication: . XII, 303p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Computing and Applications by Zhu, Rongbo. Publication: . XX, 608p. 206 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops by Dan, Asit. Publication: . XXXIV, 584p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Learning Theory by Hutter, Marcus. Publication: . XIII, 421p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security by Armando, Alessandro. Publication: . IX, 185p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Metaheuristics by Blesa, María J. Publication: . X, 223p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Dolev, Shlomi. Publication: . XVI, 614p. 150 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science IX by Gavrilova, Marina L. Publication: . XIII, 203p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Latent Variable Analysis and Signal Separation by Vigneron, Vincent. Publication: . XVIII, 655p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Pattern Recognition by Martínez-Trinidad, José Francisco. Publication: . XIV, 384p. 178 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart