41. Grid Computing-GRID 2000 : First IEEE/ACM International Workshop, Bangalore, India, December 17, 2000 ; Proceedings

by Buyya Rajkumar | Baker, Mark.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 BUY] (1).
42. Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, February 13-15, 2001: Proceedings

by Kim, Kwangjo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 KIM] (1).
43. Foundations of genetic programming

by Langdon, William B | Poli, Riccardo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 006.31 LAN] (1).
44. Lectures on Formal Methods and Performance Analysis : First EEF/Euro Summer School on Trends in Computer Science

by Brinksma, Ed | Hermanns, Holger | Katoen, Joost-Pieter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 BRI] (1).
45. Middleware 2001 : IFIP/ACM International Conference on Distributed Systems Platforms, Heidelberg, Germany, November 12-16, 2001 : Proceedings

by Guerraoui, Rachid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 GUE] (1).
46. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
47. Public Key Cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : Proceedings

by Naccache, David | Paillier,Pascal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 NAC] (1).
48. Advances in evolutionary computing: Theory and applications

by Ghosh, Ashish | Tsutsui, Shigeyoshi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.1 GHO] (1).
49. Substitutions in dynamics, arithmetics and combinatorics

by Pytheas Fogg, N | Berthe, V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 510 PYT] (1).
50. Algorithms in Bioinformatics

by Guigo, Roderic | Guigo, Roderic | Guigo, Roderic | Gusfield, Dan | Gusfield, Dan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 GUI] (1).
51. Unconventional models of computation: Third international conference, UMC 2002, Kobe, Japan, October 15-19, 2002, Proceedings

by Calude, Cristian S | Dinneen, Michael J | Peper, Ferdinand.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 004 CAL] (1).
52. Connectionist, statistical and symbolic approaches to learning for natural language processing

by Wermter, Stefan | Riloff, Ellen | Scheler, Gabriele.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 006.3 WER] (1).
53. Public-key cryptography

by Salomma, Arto.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 005.82 SAL] (1).
54. Information Security and Privacy

by Pieprzyk, Josef | Seberry, Jennifer.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 PIE] (1).
55. Information hiding: First international workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings

by Anderson, Ross.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1996Availability: Items available for loan: [Call number: 004 AND] (1).
56. Distributed reason maintenance for multiagent systems

by Kraetzschmar, Gerhard K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1997Availability: Items available for loan: [Call number: 006.3 KRA] (1).
57. Gems of Theoretical Computer Science

by Schoning, Uwe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1995Availability: Items available for loan: [Call number: 004 SCH] (1).
58. System Configuration Management

by Magnusson, Boris.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 MAG] (1).
59. Software Process

by Derniame, Jean-Claude.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 004 DER] (1).
60. Advanced Multimedia Content Processing

by Nishio, Shojiro.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 004 NIS] (1).

Powered by Koha