//]]>
Integer Programming and Combinatorial Optimization by Eisenbrand, Friedrich. Publication: . XIII, 466p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trends in Applied Intelligent Systems by García-Pedrajas, Nicolás. Publication: . XIX, 674p. 244 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trends in Applied Intelligent Systems by García-Pedrajas, Nicolás. Publication: . XIX, 680p. 205 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trends in Applied Intelligent Systems by García-Pedrajas, Nicolás. Publication: . XXXV, 770p. 251 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2010 by Nguyen, Phong Q. Publication: . XIII, 519p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computer Games by Herik, H. Jaap. Publication: . XIV, 233p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards Trustworthy Elections by Chaum, David. Publication: . VIII, 403p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2010 by Crovella, Mark. Publication: . XVI, 410p. 181 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Sendrier, Nicolas. Publication: . X, 241p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security, Practice and Experience by Kwak, Jin. Publication: . XIII, 399p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Modeling of Objects Represented in Images by Barneva, Reneta P. Publication: . XV, 326p. 178 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Computational Molecular Biology by Berger, Bonnie. Publication: . XVI, 582p. 159 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2010 by Bernstein, Daniel J. Publication: . XIII, 437p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
High Performance Computing Systems and Applications by Mewhort, Douglas J. K. Publication: . XIII, 418p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethics and Policy of Biometrics by Kumar, Ajay. Publication: . VIII, 169p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Large-Scale Scientific Computing by Lirkov, Ivan. Publication: . XVI, 839p. 248 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Application by Gollmann, Dieter. Publication: . X, 239p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Applications by Elomaa, Tapio. Publication: . X, 261p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Approximation and Online Algorithms by Bampis, Evripidis. Publication: . X, 255p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices by Samarati, Pierangela. Publication: . XIII, 386p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية