|
|
Information Hiding
by Böhme, Rainer.
Publication:
. X, 277p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ubiquitous Knowledge Discovery
by May, Michael.
Publication:
. X, 255p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Property Testing
by Goldreich, Oded.
Publication:
. XI, 359p. 5 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Bao, Feng.
Publication:
. XIII, 460p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Semantic Web Rules
by Dean, Mike.
Publication:
. XIII, 305p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Heng, Swee-Huay.
Publication:
. X, 279p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Integrated Formal Methods
by Méry, Dominique.
Publication:
. X, 337p. 110 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science VIII
by Gavrilova, Marina L.
Publication:
. XIV, 167p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Facing the Multicore-Challenge
by Keller, Rainer.
Publication:
. X, 156p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Discovery Science
by Pfahringer, Bernhard.
Publication:
. XIII, 384p. 108 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Comparative Genomics
by Tannier, Eric.
Publication:
. XII, 303p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Computing and Applications
by Zhu, Rongbo.
Publication:
. XX, 608p. 206 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops
by Dan, Asit.
Publication:
. XXXIV, 584p. 177 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Learning Theory
by Hutter, Marcus.
Publication:
. XIII, 421p. 45 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
by Armando, Alessandro.
Publication:
. IX, 185p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hybrid Metaheuristics
by Blesa, María J.
Publication:
. X, 223p. 43 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Stabilization, Safety, and Security of Distributed Systems
by Dolev, Shlomi.
Publication:
. XVI, 614p. 150 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science IX
by Gavrilova, Marina L.
Publication:
. XIII, 203p. 87 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Latent Variable Analysis and Signal Separation
by Vigneron, Vincent.
Publication:
. XVIII, 655p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Pattern Recognition
by Martínez-Trinidad, José Francisco.
Publication:
. XIV, 384p. 178 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|