Complexity of Infinite-Domain Constraint Satisfaction |
- isbn : 978-1-107337-53-4
- pisbn : 978-1-107042-84-1
- cup : 8E6E86C8F8C5C534440266EFB9E584D3
|
Fulltext
|
Computable Structure Theory: Within the Arithmetic |
- isbn : 978-1-108525-74-9
- pisbn : 978-1-108423-29-8
- cup : A18329D56442800E578B82E1AC22F3BD
|
Fulltext
|
Computational Analysis of Storylines: Making Sense of Events |
- isbn : 978-1-108854-22-1
- pisbn : 978-1-108490-57-3
- cup : D1384A4B404350654614A8222EA8DE6D
|
Fulltext
|
Computational Cryptography: Algorithmic Aspects of Cryptology |
- isbn : 978-1-108854-20-7
- pisbn : 978-1-108795-93-7
- cup : BC55FD79B026752786328EDAA3E86372
|
Fulltext
|
Constitutional Challenges in the Algorithmic Society |
- isbn : 978-1-108914-85-7
- pisbn : 978-1-108843-12-6
- cup : 831B39F76C7870B330052D852D598F98
|
Fulltext
|
Data-Driven Personalisation in Markets, Politics and Law |
- isbn : 978-1-108891-32-5
- pisbn : 978-1-108835-69-5
- cup : 90E4D289EF8ED7C96B7A269E39D864B3
|
Fulltext
|
Deep Learning in Science |
- isbn : 978-1-108955-65-2
- pisbn : 978-1-108845-35-9
- cup : 5A620F1E5DB54A7FB1D3E3C1A80E0860
|
Fulltext
|
Deep Learning on Graphs |
- isbn : 978-1-108924-18-4
- pisbn : 978-1-108831-74-1
- cup : CF908050EECC148A9E6F3EAED6099DB4
|
Fulltext
|
Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense |
- isbn : 978-1-108869-00-3
- pisbn : 978-1-108491-59-4
- cup : 4A6543BCF8703B8F7784309569093A85
|
Fulltext
|
Governing Privacy in Knowledge Commons |
- isbn : 978-1-108749-97-8
- pisbn : 978-1-108485-14-2
- cup : FA569455669E2CECA25DF0244C62C1A1
|
Fulltext
|