PBCD

Vis mig kun

Proofs and Computations

Proofs and Computations

Wainer, Stanley S.

692,63 DKK

Motivic Integration and its Interactions with Model Theory and Non-Archimedean Geometry: Volume 2

Motivic Integration and its Interactions with Model Theory and Non-Archimedean Geometry: Volume 2

Sebag, Julien

509,93 DKK

Finite Ordered Sets

Finite Ordered Sets

Monjardet, Bernard

802,25 DKK

General Recursion Theory

General Recursion Theory

Fenstad, Jens E.

1021,49 DKK

Fundamentals of Stability Theory

Fundamentals of Stability Theory

Baldwin, John T.

1313,81 DKK

Malliavin Calculus for Levy Processes and Infinite-Dimensional Brownian Motion

Malliavin Calculus for Levy Processes and Infinite-Dimensional Brownian Motion

Osswald, Horst

875,33 DKK

Introduction to Category Theory

Introduction to Category Theory

Simmons, Harold

265,81 DKK

Course on Set Theory

Course on Set Theory

Schimmerling, Ernest

265,81 DKK

O-Minimality and Diophantine Geometry

O-Minimality and Diophantine Geometry

Wilkie, A. J.

260,50 DKK

Basic Proof Theory

Basic Proof Theory

Schwichtenberg, H.

403,64 DKK

Monoidal Topology

Monoidal Topology

Tholen, Walter

1240,73 DKK

O-Minimality and Diophantine Geometry

O-Minimality and Diophantine Geometry

Wilkie, A. J.

260,50 DKK

Recursion Theory

Recursion Theory

Shoenfield, Joseph R.

948,41 DKK

Aggregation Functions

Aggregation Functions

Pap, Endre

1094,57 DKK

Monoidal Topology

Monoidal Topology

Tholen, Walter

1240,73 DKK

Multiagent Systems

Multiagent Systems

Leyton-Brown, Kevin

546,47 DKK

Motivic Integration and its Interactions with Model Theory and Non-Archimedean Geometry: Volume 1

Motivic Integration and its Interactions with Model Theory and Non-Archimedean Geometry: Volume 1

Sebag, Julien

509,93 DKK

Secret History

Secret History

Bauer, Craig

692,63 DKK

Introduction to Modern Cryptography

Introduction to Modern Cryptography

Lindell, Yehuda

948,41 DKK

Secret History

Secret History

Bauer, Craig

692,63 DKK

Handbook of Image-based Security Techniques

Handbook of Image-based Security Techniques

Suri, Jasjit S.

436,85 DKK

Handbook of Image-based Security Techniques

Handbook of Image-based Security Techniques

Suri, Jasjit S.

436,85 DKK

How to Solve It

How to Solve It

Polya, G.

142,94 DKK

Multiple-Base Number System

Multiple-Base Number System

Muscedere, Roberto

619,55 DKK

Introduction to Mathematical Logic (PMS-13), Volume 13

Introduction to Mathematical Logic (PMS-13), Volume 13

Church, Alonzo

656,09 DKK

Continuum Theory

Continuum Theory

Nadler, Sam

1386,89 DKK

How to Solve It

How to Solve It

Polya, G.

142,94 DKK

Two Applications of Logic to Mathematics

Two Applications of Logic to Mathematics

Takeuti, Gaisi

253,01 DKK

Two-Valued Iterative Systems of Mathematical Logic. (AM-5), Volume 5

Two-Valued Iterative Systems of Mathematical Logic. (AM-5), Volume 5

Post, Emil L.

436,85 DKK

Distributed Networks

Distributed Networks

Memon, Qurban A.

692,63 DKK