Combinatorial Algorithms by Arumugam, S. Publication: . XII, 303 p. 136 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SOFSEM 2013: Theory and Practice of Computer Science by Emde Boas, Peter. Publication: . XIV, 566 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Conceptual Structures for STEM Research and Education by Pfeiffer, Heather D. Publication: . XI, 333 p. 109 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Iwama, Kazuo. Publication: . VIII, 153 p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Distributed Systems by Baldoni, Roberto. Publication: . XIV, 361 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Pieprzyk, Josef. Publication: . XVI, 311 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Network Economics by Goldberg, Paul W. Publication: . XX, 564 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Computation by Chao, Kun-Mao. Publication: . XVII, 702 p. 117 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – ASIACRYPT 2012 by Wang, Xiaoyun. Publication: . XVI, 780 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2012 by Galbraith, Steven. Publication: . XIV, 566 p. 118 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Design and Analysis of Algorithms by Even, Guy. Publication: . X, 261 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Simulated Evolution and Learning by Bui, Lam Thu. Publication: . XIV, 512 p. 193 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Image Analaysis by Barneva, Reneta P. Publication: . XIV, 313 p. 176 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph-Theoretic Concepts in Computer Science by Golumbic, Martin Charles. Publication: . XIV, 346 p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning and Intelligent Optimization by Hamadi, Youssef. Publication: . XXIV, 514 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Grossklags, Jens. Publication: . XII, 309 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Geometry by Márquez, Alberto. Publication: . X, 283 p. 176 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applications of Graph Transformations with Industrial Relevance by Schürr, Andy. Publication: . XII, 255 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Cryptology by Armknecht, Frederik. Publication: . X, 151 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Hanaoka, Goichiro. Publication: . XII, 261 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart