|
|
Intelligent Computer Mathematics
by Jeuring, Johan.
Publication:
. XVIII, 473p. 117 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mathematics of Program Construction
by Gibbons, Jeremy.
Publication:
. X, 363p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applications of Evolutionary Computation
by Chio, Cecilia.
Publication:
. XXV, 542p. 174 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Cramer, Ronald.
Publication:
. Approx. 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Processign in Cells and Tissues
by Lones, Michael A.
Publication:
. XII, 278p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Barthe, Gilles.
Publication:
. XII, 151p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Drawing
by Kreveld, Marc.
Publication:
. XIV, 458 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Lai, Xuejia.
Publication:
. XIII, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mathematical Morphology and Its Applications to Image and Signal Processing
by Soille, Pierre.
Publication:
. XII, 484p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applications of Evolutionary Computation
by Chio, Cecilia.
Publication:
. XXXI, 367p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applications of Evolutionary Computation
by Chio, Cecilia.
Publication:
. XXXII, 513 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Ishai, Yuval.
Publication:
. XII, 631 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Erlingsson, Úlfar.
Publication:
. XI, 273p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
WALCOM: Algorithms and Computation
by Katoh, Naoki.
Publication:
. XI, 233p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Drawing
by Brandes, Ulrik.
Publication:
. XIV, 414p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security
by Burmester, Mike.
Publication:
. XIV, 446p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mathematical Software – ICMS 2010
by Fukuda, Komei.
Publication:
. XIV, 368p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Drawing
by Eppstein, David.
Publication:
. 426p. 199 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Cryptography
by Micciancio, Daniele.
Publication:
. 607p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Massacci, Fabio.
Publication:
. X, 241 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|