//]]>
Mathematical Foundations of Computer Science 2013 by Chatterjee, Krishnendu. Publication: . XVI, 854 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Nature of Computation. Logic, Algorithms, Applications by Bonizzoni, Paola. Publication: . XVIII, 446 p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems by Gomes, Carla. Publication: . XII, 403 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Parallel and Scientific Computing by Manninen, Pekka. Publication: . XIV, 568 p. 186 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
WALCOM: Algorithms and Computation by Ghosh, Subir Kumar. Publication: . XIV, 348 p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Gollmann, Dieter. Publication: . XIV, 402 p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parameterized and Exact Computation by Thilikos, Dimitrios M. Publication: . X, 275 p. 14 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical Foundations of Computer Science 2012 by Rovan, Branislav. Publication: . XV, 825 p. 102 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Cramer, Ronald. Publication: . Approx. 670 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Drawing by Kreveld, Marc. Publication: . XIV, 458 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Lai, Xuejia. Publication: . XIII, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Ishai, Yuval. Publication: . XII, 631 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
WALCOM: Algorithms and Computation by Katoh, Naoki. Publication: . XI, 233p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Drawing by Brandes, Ulrik. Publication: . XIV, 414p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Burmester, Mike. Publication: . XIV, 446p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical Software – ICMS 2010 by Fukuda, Komei. Publication: . XIV, 368p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Drawing by Eppstein, David. Publication: . 426p. 199 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Micciancio, Daniele. Publication: . 607p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
WALCOM: Algorithms and Computation by Rahman, Md. Saidur. Publication: . XIII, 305p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parameterized and Exact Computation by Gutin, Gregory. Publication: . XII, 375 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart