//]]>
Smart Spaces and Next Generation Wired/Wireless Networking by Balandin, Sergey. Publication: . XVI, 486p. 212 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithm Engineering by Müller-Hannemann, Matthias. Publication: . XVI, 513 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Methods and Tools of Parallel Programming Multicomputers by Hsu, Ching-Hsien. Publication: . XIV, 302p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-Hoc, Mobile and Wireless Networks by Nikolaidis, Ioanis. Publication: . X, 222p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Finite-State Methods and Natural Language Processing by Yli-Jyrä, Anssi. Publication: . X, 147p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Algorithms, Systems, and Applications by Pandurangan, Gopal. Publication: . XV, 256p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 263p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence Methods for Bioinformatics and Biostatistics by Masulli, Francesco. Publication: . XIII, 320p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics by Lee, Der-Tsai. Publication: . XI, 339p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Immune Systems by Hart, Emma. Publication: . XI, 329p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Atallah, Mikhail J. Publication: . X, 291p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Number Theory by Hanrot, Guillaume. Publication: . XI, 397p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Developments in Language Theory by Gao, Yuan. Publication: . XII, 446p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Self-Organizing Architectures by Weyns, Danny. Publication: . X, 301p. 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Processing and Applied Mathematics by Wyrzykowski, Roman. Publication: . XXIV, 596p. 272 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Processing and Applied Mathematics by Wyrzykowski, Roman. Publication: . XXIV, 628p. 242 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Aspects in Information and Management by Chen, Bo. Publication: . XI, 336p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security V by Shi, Yun Q. Publication: . XI, 129p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية