Search Results for - Narrowed by: Computers and civilization. - Computer Communication Networks.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computers$002band$002bcivilization.$002509Computers$002band$002bcivilization.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026ps$003d300?2024-05-16T02:15:17ZCyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Trust Management XIII 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277562024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-3-030-33716-2">https://doi.org/10.1007/978-3-030-33716-2</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4284142024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Blazy, Olivier. editor. (orcid)0000-0001-6205-8249<br/><a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XLent://SD_ILS/0/SD_ILS:4276582024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-58664-8">https://doi.org/10.1007/978-3-662-58664-8</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2019 The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285002024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Matsui, Mitsuru. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12612-4">https://doi.org/10.1007/978-3-030-12612-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4285462024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Science of Cyber Security Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4278372024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34637-9">https://doi.org/10.1007/978-3-030-34637-9</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281292024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751<br/><a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Electronic Resources<br/>Computer Supported Cooperative Work and Social Computing 13th CCF Conference, ChineseCSCW 2018, Guilin, China, August 18–19, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4284482024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Sun, Yuqing. editor.<br/><a href="https://doi.org/10.1007/978-981-13-3044-5">https://doi.org/10.1007/978-981-13-3044-5</a><br/>Format: Electronic Resources<br/>Development of Transport by Telematics 19th International Conference on Transport System Telematics, TST 2019, Jaworze, Poland, February 27 – March 2, 2019, Selected Papersent://SD_ILS/0/SD_ILS:4276422024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Mikulski, Jerzy. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27547-1">https://doi.org/10.1007/978-3-030-27547-1</a><br/>Format: Electronic Resources<br/>Guide to Ambient Intelligence in the IoT Environment Principles, Technologies and Applicationsent://SD_ILS/0/SD_ILS:4276292024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04173-1">https://doi.org/10.1007/978-3-030-04173-1</a><br/>Format: Electronic Resources<br/>Smart Cities, Green Technologies and Intelligent Transport Systems 7th International Conference, SMARTGREENS, and 4th International Conference, VEHITS 2018, Funchal-Madeira, Portugal, March 16-18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4291422024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Donnellan, Brian. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26633-2">https://doi.org/10.1007/978-3-030-26633-2</a><br/>Format: Electronic Resources<br/>Smart City 360° First EAI International Summit, Smart City 360°, Bratislava, Slovakia and Toronto, Canada, October 13-16, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:178732024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Leon-Garcia, Alberto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33681-7">http://dx.doi.org/10.1007/978-3-319-33681-7</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174132024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186532024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:178372024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Persuasive Technology 11th International Conference, PERSUASIVE 2016, Salzburg, Austria, April 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176422024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Meschtscherjakov, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31510-2">http://dx.doi.org/10.1007/978-3-319-31510-2</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:176572024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Panayiotou, Christos G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31664-2">http://dx.doi.org/10.1007/978-3-319-31664-2</a><br/>Format: Electronic Resources<br/>Mobile Web and Intelligent Information Systems 13th International Conference, MobiWIS 2016, Vienna, Austria, August 22-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182662024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Younas, Muhammad. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44215-0">http://dx.doi.org/10.1007/978-3-319-44215-0</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Design for Aging Second International Conference, ITAP 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17–22, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:180422024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Zhou, Jia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39943-0">http://dx.doi.org/10.1007/978-3-319-39943-0</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:174282024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179552024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:178682024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Hoepman, Jaap-Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33630-5">http://dx.doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Smart Cities First International Conference, Smart-CT 2016, Málaga, Spain, June 15-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:180122024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Alba, Enrique. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39595-1">http://dx.doi.org/10.1007/978-3-319-39595-1</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Healthy and Active Aging Second International Conference, ITAP 2016, Held as Part of HCI International 2016 Toronto, ON, Canada, July 17–22, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:180442024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Zhou, Jia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39949-2">http://dx.doi.org/10.1007/978-3-319-39949-2</a><br/>Format: Electronic Resources<br/>e-Infrastructure and e-Services for Developing Countries 6th International Conference, AFRICOMM 2014, Kampala, Uganda, November 24-25, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:226112024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Nungu, Amos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16886-9">http://dx.doi.org/10.1007/978-3-319-16886-9</a><br/>Format: Electronic Resources<br/>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:231822024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Design for Everyday Life First International Conference, ITAP 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings, Part IIent://SD_ILS/0/SD_ILS:230922024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Zhou, Jia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20913-5">http://dx.doi.org/10.1007/978-3-319-20913-5</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233602024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236262024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Thuraisingham, Bhavani. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28865-9">http://dx.doi.org/10.1007/978-3-319-28865-9</a><br/>Format: Electronic Resources<br/>Cyber Security and Privacy 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:234452024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25360-2">http://dx.doi.org/10.1007/978-3-319-25360-2</a><br/>Format: Electronic Resources<br/>Tools of Transport Telematics 15th International Conference on Transport Systems Telematics, TST 2015, Wrocław, Poland, April 15-17, 2015. Selected Papersent://SD_ILS/0/SD_ILS:233772024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Mikulski, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24577-5">http://dx.doi.org/10.1007/978-3-319-24577-5</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235592024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Huang, Zhiqiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27051-7">http://dx.doi.org/10.1007/978-3-319-27051-7</a><br/>Format: Electronic Resources<br/>Ubiquitous Computing and Ambient Intelligence. Sensing, Processing, and Using Environmental Information 9th International Conference, UCAmI 2015, Puerto Varas, Chile, December 1-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235212024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar García-Chamizo, Juan M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26401-1">http://dx.doi.org/10.1007/978-3-319-26401-1</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:233442024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Design for Aging First International Conference, ITAP 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings, Part Ient://SD_ILS/0/SD_ILS:230852024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Zhou, Jia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20892-3">http://dx.doi.org/10.1007/978-3-319-20892-3</a><br/>Format: Electronic Resources<br/>Traffic Monitoring and Analysis 7th International Workshop, TMA 2015, Barcelona, Spain, April 21-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:226482024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Steiner, Moritz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17172-2">http://dx.doi.org/10.1007/978-3-319-17172-2</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231942024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>Multimodal Analyses enabling Artificial Agents in Human-Machine Interaction Second International Workshop, MA3HMI 2014, Held in Conjunction with INTERSPEECH 2014, Singapore, Singapore, September 14, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:223982024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Böck, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15557-9">http://dx.doi.org/10.1007/978-3-319-15557-9</a><br/>Format: Electronic Resources<br/>Energy Efficient Data Centers Third International Workshop, E2DC 2014, Cambridge, UK, June 10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:224382024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Klingert, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15786-3">http://dx.doi.org/10.1007/978-3-319-15786-3</a><br/>Format: Electronic Resources<br/>Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234712024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247652024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format: Electronic Resources<br/>Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lecturesent://SD_ILS/0/SD_ILS:226532024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Felici, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17199-9">http://dx.doi.org/10.1007/978-3-319-17199-9</a><br/>Format: Electronic Resources<br/>Social Computing, Behavioral-Cultural Modeling, and Prediction 8th International Conference, SBP 2015, Washington, DC, USA, March 31-April 3, 2015. Proceedingsent://SD_ILS/0/SD_ILS:225272024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Agarwal, Nitin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16268-3">http://dx.doi.org/10.1007/978-3-319-16268-3</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedingsent://SD_ILS/0/SD_ILS:228192024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18455-5">http://dx.doi.org/10.1007/978-3-319-18455-5</a><br/>Format: Electronic Resources<br/>E-Voting and Identity 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232022024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Haenni, Rolf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22270-7">http://dx.doi.org/10.1007/978-3-319-22270-7</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Mobile Web and Intelligent Information Systems 12th International Conference, MobiWis 2015, Rome, Italy, August 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232692024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Younas, Muhammad. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23144-0">http://dx.doi.org/10.1007/978-3-319-23144-0</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232912024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23440-3">http://dx.doi.org/10.1007/978-3-319-23440-3</a><br/>Format: Electronic Resources<br/>Encyclopedia of Social Network Analysis and Miningent://SD_ILS/0/SD_ILS:196282024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Alhajj, Reda. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-6170-8">http://dx.doi.org/10.1007/978-1-4614-6170-8</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:214762024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10262-7">http://dx.doi.org/10.1007/978-3-319-10262-7</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:240812024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Linawati. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55032-4">http://dx.doi.org/10.1007/978-3-642-55032-4</a><br/>Format: Electronic Resources<br/>Information Systems and Global Assemblages. (Re)Configuring Actors, Artefacts, Organizations IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&O 2014, Auckland, New Zealand, December 11-12, 2014. Proceedingsent://SD_ILS/0/SD_ILS:246712024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Doolin, Bill. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45708-5">http://dx.doi.org/10.1007/978-3-662-45708-5</a><br/>Format: Electronic Resources<br/>AI Approaches to the Complexity of Legal Systems AICOL 2013 International Workshops, AICOL-IV@IVR, Belo Horizonte, Brazil, July 21-27, 2013 and AICOL-V@SINTELNET-JURIX, Bologna, Italy, December 11, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:246942024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Casanovas, Pompeu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45960-7">http://dx.doi.org/10.1007/978-3-662-45960-7</a><br/>Format: Electronic Resources<br/>Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:239442024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format: Electronic Resources<br/>Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services 8th International Conference, UCAmI 2014, Belfast, UK, December 2-5, 2014. Proceedingsent://SD_ILS/0/SD_ILS:220122024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Hervás, Ramón. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13102-3">http://dx.doi.org/10.1007/978-3-319-13102-3</a><br/>Format: Electronic Resources<br/>Telematics - Support for Transport 14th International Conference on Transport Systems Telematics, TST 2014, Katowice/Kraków/Ustroń, Poland, October 22-25, 2014. Selected Papersent://SD_ILS/0/SD_ILS:246192024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Mikulski, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45317-9">http://dx.doi.org/10.1007/978-3-662-45317-9</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:214602024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format: Electronic Resources<br/>Multiagent System Technologies 12th German Conference, MATES 2014, Stuttgart, Germany, September 23-25, 2014. Proceedingsent://SD_ILS/0/SD_ILS:217382024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Müller, Jörg P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11584-9">http://dx.doi.org/10.1007/978-3-319-11584-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208672024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Chau, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06677-6">http://dx.doi.org/10.1007/978-3-319-06677-6</a><br/>Format: Electronic Resources<br/>Human-Centered Software Engineering 5th IFIP WG 13.2 International Conference, HCSE 2014, Paderborn, Germany, September 16-18, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245612024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Sauer, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44811-3">http://dx.doi.org/10.1007/978-3-662-44811-3</a><br/>Format: Electronic Resources<br/>Social Computing, Behavioral-Cultural Modeling and Prediction 7th International Conference, SBP 2014, Washington, DC, USA, April 1-4, 2014. Proceedingsent://SD_ILS/0/SD_ILS:206882024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Kennedy, William G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05579-4">http://dx.doi.org/10.1007/978-3-319-05579-4</a><br/>Format: Electronic Resources<br/>e-Infrastructure and e-Services for Developing Countries 5th International Conference, AFRICOMM 2013, Blantyre, Malawi, November 25-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:211662024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Bissyandé, Tegawendé F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08368-1">http://dx.doi.org/10.1007/978-3-319-08368-1</a><br/>Format: Electronic Resources<br/>Cyber Security and Privacy Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:219182024-05-16T02:15:17Z2024-05-16T02:15:17ZYazar Cleary, Frances. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12574-9">http://dx.doi.org/10.1007/978-3-319-12574-9</a><br/>Format: Electronic Resources<br/>