//]]>
Progress in Cryptology - INDOCRYPT 2012 by Galbraith, Steven. Publication: . XIV, 566 p. 118 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Distributed Computing Systems by Xiang, Yang. Publication: . XIV, 289 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Design and Analysis of Algorithms by Even, Guy. Publication: . X, 261 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Simulated Evolution and Learning by Bui, Lam Thu. Publication: . XIV, 512 p. 193 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multi-Agent Systems by Cossentino, Massimo. Publication: . XII, 259 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Image Analaysis by Barneva, Reneta P. Publication: . XIV, 313 p. 176 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Wu, Chuan-Kun. Publication: . X, 394 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Knowledge Engineering by Xiang, Yang. Publication: . XII, 251 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph-Theoretic Concepts in Computer Science by Golumbic, Martin Charles. Publication: . XIV, 346 p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Bogdanov, Andrey. Publication: . XII, 173 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning and Intelligent Optimization by Hamadi, Youssef. Publication: . XXIV, 514 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computer Entertainment by Nijholt, Anton. Publication: . XXIV, 599 p. 337 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods and Software Engineering by Aoki, Toshiaki. Publication: . XIV, 512 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Grossklags, Jens. Publication: . XII, 309 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Visual Media by Hu, Shi-Min. Publication: . XII, 268 p. 116 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Geometry by Márquez, Alberto. Publication: . X, 283 p. 176 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applications of Graph Transformations with Industrial Relevance by Schürr, Andy. Publication: . XII, 255 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structural, Syntactic, and Statistical Pattern Recognition by Gimel’farb, Georgy. Publication: . XVIII, 755 p. 236 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Cryptology by Armknecht, Frederik. Publication: . X, 151 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Intelligent Data Analysis XI by Hollmén, Jaakko. Publication: . XIV, 426 p. 136 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية