//]]>
Iterative error correction : , turbo, low-density parity-check and repeat-accumulate codes / by Johnson, Sarah J., Publication: Cambridge, UK : Cambridge University Press, 2010 . xviii, 335 p. : 26 cm. Date:2010 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
A Short Course in Quantum Information Theory by Diosi, Lajos. Publication: . XV, 161p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fading and Shadowing in Wireless Systems by Shankar, P. Mohana. Publication: . XIV, 466 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Stam, Martijn. Publication: . XII, 365 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Logic, Rationality, and Interaction by Grossi, Davide. Publication: . XII, 363 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fundamentals of Computation Theory by Gąsieniec, Leszek. Publication: . XII, 318 p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management by Fellows, Michael. Publication: . XII, 364 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Chan, T-H. Hubert. Publication: . XV, 356 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Algebraic Development Techniques by Martí-Oliet, Narciso. Publication: . X, 283 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theory, Combinatorics, and Search Theory by Aydinian, Harout. Publication: . XL, 773 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Iwama, Kazuo. Publication: . VIII, 153 p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Pieprzyk, Josef. Publication: . XVI, 311 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – LATINCRYPT 2012 by Hevia, Alejandro. Publication: . XII, 323 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theoretical Computer Science by Baeten, Jos C. M. Publication: . X, 393 p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2012 by Prouff, Emmanuel. Publication: . XVII, 562 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Arithmetic of Finite Fields by Özbudak, Ferruh. Publication: . XII, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Developments in Language Theory by Yen, Hsu-Chun. Publication: . XIII, 478p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Languages Alive by Bordihn, Henning. Publication: . X, 291 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2012 by Helleseth, Tor. Publication: . XII, 339 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Agrawal, Manindra. Publication: . XV, 622 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 Next >>

Languages: 
English |
العربية