Graph Drawing by Didimo, Walter. Publication: . XVI, 582 p. 231 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integer Programming and Combinatorial Optimization by Goemans, Michel. Publication: . XII, 400 p. 32 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms for Sensor Systems by Bar-Noy, Amotz. Publication: . X, 145 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
WALCOM: Algorithms and Computation by Ghosh, Subir Kumar. Publication: . XIV, 348 p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Logic and Its Applications by Lodaya, Kamal. Publication: . X, 259 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Algorithms by Arumugam, S. Publication: . XII, 303 p. 136 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SOFSEM 2013: Theory and Practice of Computer Science by Emde Boas, Peter. Publication: . XIV, 566 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Conceptual Structures for STEM Research and Education by Pfeiffer, Heather D. Publication: . XI, 333 p. 109 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Iwama, Kazuo. Publication: . VIII, 153 p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Distributed Systems by Baldoni, Roberto. Publication: . XIV, 361 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Pieprzyk, Josef. Publication: . XVI, 311 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Network Economics by Goldberg, Paul W. Publication: . XX, 564 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Computation by Chao, Kun-Mao. Publication: . XVII, 702 p. 117 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – ASIACRYPT 2012 by Wang, Xiaoyun. Publication: . XVI, 780 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2012 by Galbraith, Steven. Publication: . XIV, 566 p. 118 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Design and Analysis of Algorithms by Even, Guy. Publication: . X, 261 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Simulated Evolution and Learning by Bui, Lam Thu. Publication: . XIV, 512 p. 193 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Image Analaysis by Barneva, Reneta P. Publication: . XIV, 313 p. 176 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph-Theoretic Concepts in Computer Science by Golumbic, Martin Charles. Publication: . XIV, 346 p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning and Intelligent Optimization by Hamadi, Youssef. Publication: . XXIV, 514 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart