Search Results for - Narrowed by: Management of Computing and Information Systems. - Computer science.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bscience.$002509Computer$002bscience.$0026ps$003d300$0026isd$003dtrue?2024-05-25T02:22:10ZOpen Source Systems 15th IFIP WG 2.13 International Conference, OSS 2019, Montreal, QC, Canada, May 26–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4278332024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Bordeleau, Francis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20883-7">https://doi.org/10.1007/978-3-030-20883-7</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 20th International Conference, XP 2019, Montréal, QC, Canada, May 21–25, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280412024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kruchten, Philippe. editor. (orcid)0000-0003-1359-4867<br/><a href="https://doi.org/10.1007/978-3-030-19034-7">https://doi.org/10.1007/978-3-030-19034-7</a><br/>Format: Electronic Resources<br/>Cooperative Design, Visualization, and Engineering 16th International Conference, CDVE 2019, Mallorca, Spain, October 6–9, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285162024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Luo, Yuhua. editor. (orcid)0000-0003-3057-4753<br/><a href="https://doi.org/10.1007/978-3-030-30949-7">https://doi.org/10.1007/978-3-030-30949-7</a><br/>Format: Electronic Resources<br/>UnBlock the Blockchainent://SD_ILS/0/SD_ILS:4282772024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Upadhyay, Nitin. author.<br/><a href="https://doi.org/10.1007/978-981-15-0177-7">https://doi.org/10.1007/978-981-15-0177-7</a><br/>Format: Electronic Resources<br/>Software Engineering and Methodology for Emerging Domains 16th National Conference, NASAC 2017, Harbin, China, November 4–5, 2017, and 17th National Conference, NASAC 2018, Shenzhen, China, November 23–25, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4288432024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Li, Zheng. editor. (orcid)0000-0002-3938-7033<br/><a href="https://doi.org/10.1007/978-981-15-0310-8">https://doi.org/10.1007/978-981-15-0310-8</a><br/>Format: Electronic Resources<br/>Membrane Computing 19th International Conference, CMC 2018, Dresden, Germany, September 4–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290982024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Hinze, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12797-8">https://doi.org/10.1007/978-3-030-12797-8</a><br/>Format: Electronic Resources<br/>Becoming a data-driven Organisation Unlock the value of dataent://SD_ILS/0/SD_ILS:4277272024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Treder, Martin. author.<br/><a href="https://doi.org/10.1007/978-3-662-60304-8">https://doi.org/10.1007/978-3-662-60304-8</a><br/>Format: Electronic Resources<br/>Agile Methods 9th Brazilian Workshop, WBMA 2018, Campinas, Brazil, October 4, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4276592024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Tonin, Graziela Simone. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14310-7">https://doi.org/10.1007/978-3-030-14310-7</a><br/>Format: Electronic Resources<br/>Computer Algebra in Scientific Computing 21st International Workshop, CASC 2019, Moscow, Russia, August 26–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281322024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar England, Matthew. editor. (orcid)0000-0001-5729-3420<br/><a href="https://doi.org/10.1007/978-3-030-26831-2">https://doi.org/10.1007/978-3-030-26831-2</a><br/>Format: Electronic Resources<br/>Digital Services and Platforms. Considerations for Sourcing 12th Global Sourcing Workshop 2018, La Thuile, Italy, February 21–24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286782024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kotlarsky, Julia. editor. (orcid)0000-0002-1478-549X<br/><a href="https://doi.org/10.1007/978-3-030-15850-7">https://doi.org/10.1007/978-3-030-15850-7</a><br/>Format: Electronic Resources<br/>Information Literacy in Everyday Life 6th European Conference, ECIL 2018, Oulu, Finland, September 24–27, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4287892024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-030-13472-3">https://doi.org/10.1007/978-3-030-13472-3</a><br/>Format: Electronic Resources<br/>Handbook of Software Engineeringent://SD_ILS/0/SD_ILS:4282692024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Cha, Sungdeok. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00262-6">https://doi.org/10.1007/978-3-030-00262-6</a><br/>Format: Electronic Resources<br/>Advances in Information Systems Development Designing Digitalizationent://SD_ILS/0/SD_ILS:4277922024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Andersson, Bo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22993-1">https://doi.org/10.1007/978-3-030-22993-1</a><br/>Format: Electronic Resources<br/>Big Scientific Data Benchmarks, Architecture, and Systems First Workshop, SDBA 2018, Beijing, China, June 12, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4288282024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Ren, Rui. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5910-1">https://doi.org/10.1007/978-981-13-5910-1</a><br/>Format: Electronic Resources<br/>Mathematical Morphology and Its Applications to Signal and Image Processing 14th International Symposium, ISMM 2019, Saarbrücken, Germany, July 8-10, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4290012024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Burgeth, Bernhard. editor. (orcid)0000-0001-6602-6201<br/><a href="https://doi.org/10.1007/978-3-030-20867-7">https://doi.org/10.1007/978-3-030-20867-7</a><br/>Format: Electronic Resources<br/>Formalizing Natural Languages with NooJ 2018 and Its Natural Language Processing Applications 12th International Conference, NooJ 2018, Palermo, Italy, June 20–22, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286992024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Mirto, Ignazio Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10868-7">https://doi.org/10.1007/978-3-030-10868-7</a><br/>Format: Electronic Resources<br/>Macrotask Crowdsourcing Engaging the Crowds to Address Complex Problemsent://SD_ILS/0/SD_ILS:4290932024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Khan, Vassillis-Javed. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12334-5">https://doi.org/10.1007/978-3-030-12334-5</a><br/>Format: Electronic Resources<br/>Big Scientific Data Management First International Conference, BigSDM 2018, Beijing, China, November 30 – December 1, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277122024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Li, Jianhui. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28061-1">https://doi.org/10.1007/978-3-030-28061-1</a><br/>Format: Electronic Resources<br/>Software Quality: The Complexity and Challenges of Software Engineering and Software Quality in the Cloud 11th International Conference, SWQD 2019, Vienna, Austria, January 15–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276222024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Winkler, Dietmar. editor. (orcid)0000-0002-4743-3124<br/><a href="https://doi.org/10.1007/978-3-030-05767-1">https://doi.org/10.1007/978-3-030-05767-1</a><br/>Format: Electronic Resources<br/>Role Competency Matrix A Step-By-Step Guide to an Objective Competency Management Systement://SD_ILS/0/SD_ILS:4282742024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kuruba, Mahesh. author.<br/><a href="https://doi.org/10.1007/978-981-13-7972-7">https://doi.org/10.1007/978-981-13-7972-7</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming – Workshops XP 2019 Workshops, Montréal, QC, Canada, May 21–25, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289052024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Hoda, Rashina. editor. (orcid)0000-0001-5147-8096<br/><a href="https://doi.org/10.1007/978-3-030-30126-2">https://doi.org/10.1007/978-3-030-30126-2</a><br/>Format: Electronic Resources<br/>Managed Software Evolutionent://SD_ILS/0/SD_ILS:4282942024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Reussner, Ralf. editor.<br/><a href="https://doi.org/10.1007/978-3-030-13499-0">https://doi.org/10.1007/978-3-030-13499-0</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 26th European Conference, EuroSPI 2019, Edinburgh, UK, September 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291452024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Walker, Alastair. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28005-5">https://doi.org/10.1007/978-3-030-28005-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4285462024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Agile Methods 10th Brazilian Workshop, WBMA 2019, Belo Horizonte, Brazil, September 11, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4291852024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Meirelles, Paulo. editor. (orcid)0000-0002-8923-2814<br/><a href="https://doi.org/10.1007/978-3-030-36701-5">https://doi.org/10.1007/978-3-030-36701-5</a><br/>Format: Electronic Resources<br/>Theory and Practice of Natural Computing 8th International Conference, TPNC 2019, Kingston, ON, Canada, December 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285362024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Martín-Vide, Carlos. editor. (orcid)0000-0003-1670-6000<br/><a href="https://doi.org/10.1007/978-3-030-34500-6">https://doi.org/10.1007/978-3-030-34500-6</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management in the Digital Twin Era 16th IFIP WG 5.1 International Conference, PLM 2019, Moscow, Russia, July 8–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289872024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Fortin, Clement. editor.<br/><a href="https://doi.org/10.1007/978-3-030-42250-9">https://doi.org/10.1007/978-3-030-42250-9</a><br/>Format: Electronic Resources<br/>Software Business 10th International Conference, ICSOB 2019, Jyväskylä, Finland, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285862024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Hyrynsalmi, Sami. editor. (orcid)0000-0002-5073-3750<br/><a href="https://doi.org/10.1007/978-3-030-33742-1">https://doi.org/10.1007/978-3-030-33742-1</a><br/>Format: Electronic Resources<br/>Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2213962024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91638-5">https://doi.org/10.1007/978-3-319-91638-5</a><br/>Format: Electronic Resources<br/>Automated Invention for Smart Industries 18th International TRIZ Future Conference, TFC 2018, Strasbourg, France, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2217912024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Cavallucci, Denis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02456-7">https://doi.org/10.1007/978-3-030-02456-7</a><br/>Format: Electronic Resources<br/>Towards Extensible and Adaptable Methods in Computingent://SD_ILS/0/SD_ILS:2224942024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Chakraverty, Shampa. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2348-5">https://doi.org/10.1007/978-981-13-2348-5</a><br/>Format: Electronic Resources<br/>Collaborative Networks of Cognitive Systems 19th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2018, Cardiff, UK, September 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2221492024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Camarinha-Matos, Luis M. editor. (orcid)0000-0003-0594-1961<br/><a href="https://doi.org/10.1007/978-3-319-99127-6">https://doi.org/10.1007/978-3-319-99127-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2228082024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Applications and Usability of Interactive Television 6th Iberoamerican Conference, jAUTI 2017, Aveiro, Portugal, October 12-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2230422024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Abásolo, María José. editor. (orcid)0000-0003-4441-3264<br/><a href="https://doi.org/10.1007/978-3-319-90170-1">https://doi.org/10.1007/978-3-319-90170-1</a><br/>Format: Electronic Resources<br/>Cyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:2235562024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Fog Computing Concepts, Frameworks and Technologiesent://SD_ILS/0/SD_ILS:2268692024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94890-4">https://doi.org/10.1007/978-3-319-94890-4</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218282024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management to Support Industry 4.0 15th IFIP WG 5.1 International Conference, PLM 2018, Turin, Italy, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2221092024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Chiabert, Paolo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01614-2">https://doi.org/10.1007/978-3-030-01614-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2225942024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Handbook of Mobile Data Privacyent://SD_ILS/0/SD_ILS:2220332024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Sailing Routes in the World of Computation 14th Conference on Computability in Europe, CiE 2018, Kiel, Germany, July 30 – August 3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216112024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Manea, Florin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94418-0">https://doi.org/10.1007/978-3-319-94418-0</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2255152024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Information Literacy in the Workplace 5th European Conference, ECIL 2017, Saint Malo, France, September 18-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2255172024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74334-9">https://doi.org/10.1007/978-3-319-74334-9</a><br/>Format: Electronic Resources<br/>Project Management at the Edge of Chaos Social Techniques for Complex Systemsent://SD_ILS/0/SD_ILS:2248822024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Oswald, Alfred. author.<br/><a href="https://doi.org/10.1007/978-3-662-48261-2">https://doi.org/10.1007/978-3-662-48261-2</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - AFRICACRYPT 2017 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213272024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Joye, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57339-7">https://doi.org/10.1007/978-3-319-57339-7</a><br/>Format: Electronic Resources<br/>Provable Security 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213542024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Okamoto, Tatsuaki. editor. (orcid)0000-0002-8145-5474<br/><a href="https://doi.org/10.1007/978-3-319-68637-0">https://doi.org/10.1007/978-3-319-68637-0</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:2215712024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68542-7">https://doi.org/10.1007/978-3-319-68542-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2216542024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Katz, Jonathan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63688-7">https://doi.org/10.1007/978-3-319-63688-7</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225602024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lemke-Rust, Kerstin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54669-8">https://doi.org/10.1007/978-3-319-54669-8</a><br/>Format: Electronic Resources<br/>Computer Algebra in Scientific Computing 19th International Workshop, CASC 2017, Beijing, China, September 18-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2222432024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Gerdt, Vladimir P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66320-3">https://doi.org/10.1007/978-3-319-66320-3</a><br/>Format: Electronic Resources<br/>Theory and Practice of Model Transformation 10th International Conference, ICMT 2017, Held as Part of STAF 2017, Marburg, Germany, July 17-18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2232572024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Guerra, Esther. editor. (orcid)0000-0002-2818-2278<br/><a href="https://doi.org/10.1007/978-3-319-61473-1">https://doi.org/10.1007/978-3-319-61473-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2222512024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format: Electronic Resources<br/>Software Technologies 11th International Joint Conference, ICSOFT 2016, Lisbon, Portugal, July 24-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2237392024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Cabello, Enrique. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62569-0">https://doi.org/10.1007/978-3-319-62569-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2264782024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format: Electronic Resources<br/>Guide to Computer Network Securityent://SD_ILS/0/SD_ILS:2260462024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kizza, Joseph Migga. author.<br/><a href="https://doi.org/10.1007/978-3-319-55606-2">https://doi.org/10.1007/978-3-319-55606-2</a><br/>Format: Electronic Resources<br/>Testing Software and Systems 29th IFIP WG 6.1 International Conference, ICTSS 2017, St. Petersburg, Russia, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266382024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Yevtushenko, Nina. editor. (orcid)0000-0002-4006-1161<br/><a href="https://doi.org/10.1007/978-3-319-67549-7">https://doi.org/10.1007/978-3-319-67549-7</a><br/>Format: Electronic Resources<br/>Information and Communication Technologies for Development 14th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2017, Yogyakarta, Indonesia, May 22-24, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2265042024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Choudrie, Jyoti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59111-7">https://doi.org/10.1007/978-3-319-59111-7</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2217472024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2252782024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format: Electronic Resources<br/>Systems Practice: How to Act In situations of uncertainty and complexity in a climate-change worldent://SD_ILS/0/SD_ILS:2252272024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Ison, Ray. author.<br/><a href="https://doi.org/10.1007/978-1-4471-7351-9">https://doi.org/10.1007/978-1-4471-7351-9</a><br/>Format: Electronic Resources<br/>Software Project Management for Distributed Computing Life-Cycle Methods for Developing Scalable and Reliable Toolsent://SD_ILS/0/SD_ILS:2251432024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54325-3">https://doi.org/10.1007/978-3-319-54325-3</a><br/>Format: Electronic Resources<br/>Applications and Usability of Interactive TV 5th Iberoamerican Conference, jAUTI 2016, La Habana, Cuba, November 21-25, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2257912024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Abásolo, María José. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63321-3">https://doi.org/10.1007/978-3-319-63321-3</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2228552024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:2254082024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68505-2">https://doi.org/10.1007/978-3-319-68505-2</a><br/>Format: Electronic Resources<br/>Bankruptcy Prediction through Soft Computing based Deep Learning Techniqueent://SD_ILS/0/SD_ILS:2238972024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Chaudhuri, Arindam. author.<br/><a href="https://doi.org/10.1007/978-981-10-6683-2">https://doi.org/10.1007/978-981-10-6683-2</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2239632024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222502024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2253772024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Foley, Simon N. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format: Electronic Resources<br/>SDL 2017: Model-Driven Engineering for Future Internet 18th International SDL Forum, Budapest, Hungary, October 9–11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2256912024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Csöndes, Tibor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68015-6">https://doi.org/10.1007/978-3-319-68015-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2259462024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466<br/><a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2251402024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Obana, Satoshi. editor. (orcid)0000-0003-4795-4779<br/><a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format: Electronic Resources<br/>Collaboration in a Data-Rich World 18th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2017, Vicenza, Italy, September 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2234922024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Camarinha-Matos, Luis M. editor. (orcid)0000-0003-0594-1961<br/><a href="https://doi.org/10.1007/978-3-319-65151-4">https://doi.org/10.1007/978-3-319-65151-4</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:180732024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40253-6">http://dx.doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:180852024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Liu, Joseph K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40367-0">http://dx.doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182642024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kő, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44159-7">http://dx.doi.org/10.1007/978-3-319-44159-7</a><br/>Format: Electronic Resources<br/>Software Engineering for Resilient Systems 8th International Workshop, SERENE 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183562024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Crnkovic, Ivica. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45892-2">http://dx.doi.org/10.1007/978-3-319-45892-2</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183592024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45931-8">http://dx.doi.org/10.1007/978-3-319-45931-8</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:182362024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Standaert, François-Xavier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43283-0">http://dx.doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Software Business 7th International Conference, ICSOB 2016, Ljubljana, Slovenia, June 13-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181012024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Maglyas, Andrey. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40515-5">http://dx.doi.org/10.1007/978-3-319-40515-5</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management in the Era of Internet of Things 12th IFIP WG 5.1 International Conference, PLM 2015, Doha, Qatar, October 19-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:178182024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Bouras, Abdelaziz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33111-9">http://dx.doi.org/10.1007/978-3-319-33111-9</a><br/>Format: Electronic Resources<br/>Pragmatic Evaluation of Software Architecturesent://SD_ILS/0/SD_ILS:179242024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Knodel, Jens. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-34177-4">http://dx.doi.org/10.1007/978-3-319-34177-4</a><br/>Format: Electronic Resources<br/>Social Media: The Good, the Bad, and the Ugly 15th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2016, Swansea, UK, September 13–15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183152024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Dwivedi, Yogesh K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45234-0">http://dx.doi.org/10.1007/978-3-319-45234-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186622024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49890-3">http://dx.doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186632024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Fischlin, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49896-5">http://dx.doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Formal SQL Tuning for Oracle Databases Practical Efficiency - Efficient Practiceent://SD_ILS/0/SD_ILS:186662024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Nossov, Leonid. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-50417-8">http://dx.doi.org/10.1007/978-3-662-50417-8</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing – ICSOC 2015 Workshops WESOA, RMSOC, ISC, DISCO, WESE, BSCI, FOR-MOVES, Goa, India, November 16-19, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:186682024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Norta, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-50539-7">http://dx.doi.org/10.1007/978-3-662-50539-7</a><br/>Format: Electronic Resources<br/>Mobility Management Principle, Technology and Applicationsent://SD_ILS/0/SD_ILS:186712024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Chen, Shanzhi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52726-9">http://dx.doi.org/10.1007/978-3-662-52726-9</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186842024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53140-2">http://dx.doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Transactions on Modularity and Composition Ient://SD_ILS/0/SD_ILS:184102024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Chiba, Shigeru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46969-0">http://dx.doi.org/10.1007/978-3-319-46969-0</a><br/>Format: Electronic Resources<br/>Advances in Network Science 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:172462024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Wierzbicki, Adam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28361-6">http://dx.doi.org/10.1007/978-3-319-28361-6</a><br/>Format: Electronic Resources<br/>Transactions on Computational Collective Intelligence XXVent://SD_ILS/0/SD_ILS:186952024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Nguyen, Ngoc Thanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53580-6">http://dx.doi.org/10.1007/978-3-662-53580-6</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:183442024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45741-3">http://dx.doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:183452024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Askoxylakis, Ioannis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45744-4">http://dx.doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Open Source Systems: Integrating Communities 12th IFIP WG 2.13 International Conference, OSS 2016, Gothenburg, Sweden, May 30 - June 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179732024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Crowston, Kevin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39225-7">http://dx.doi.org/10.1007/978-3-319-39225-7</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:180302024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Badonnel, Rémi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39814-3">http://dx.doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Dynamics of Big Internet Industry Groups and Future Trends A View from Epigenetic Economicsent://SD_ILS/0/SD_ILS:176052024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Gómez-Uranga, Miguel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31147-0">http://dx.doi.org/10.1007/978-3-319-31147-0</a><br/>Format: Electronic Resources<br/>Global Perspectives on Service Science: Japanent://SD_ILS/0/SD_ILS:164782024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kwan, Stephen K. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3594-9">http://dx.doi.org/10.1007/978-1-4939-3594-9</a><br/>Format: Electronic Resources<br/>Managing Humans Biting and Humorous Tales of a Software Engineering Managerent://SD_ILS/0/SD_ILS:164462024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lopp, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-2158-7">http://dx.doi.org/10.1007/978-1-4842-2158-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176442024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Logistics and Supply Chain Innovation Bridging the Gap between Theory and Practiceent://SD_ILS/0/SD_ILS:167632024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Zijm, Henk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22288-2">http://dx.doi.org/10.1007/978-3-319-22288-2</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:173532024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29360-8">http://dx.doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>The Future of Digital Business Innovation Trends and Practicesent://SD_ILS/0/SD_ILS:171042024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Morabito, Vincenzo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26874-3">http://dx.doi.org/10.1007/978-3-319-26874-3</a><br/>Format: Electronic Resources<br/>Web Services, Formal Methods, and Behavioral Types 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:178642024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Hildebrandt, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33612-1">http://dx.doi.org/10.1007/978-3-319-33612-1</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179552024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:175602024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kwon, Soonhak. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30840-1">http://dx.doi.org/10.1007/978-3-319-30840-1</a><br/>Format: Electronic Resources<br/>Co-production in the Public Sector Experiences and Challengesent://SD_ILS/0/SD_ILS:175272024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Fugini, Mariagrazia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30558-5">http://dx.doi.org/10.1007/978-3-319-30558-5</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:181722024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Aspinall, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41763-9">http://dx.doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedingsent://SD_ILS/0/SD_ILS:182232024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Yang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42836-9">http://dx.doi.org/10.1007/978-3-319-42836-9</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:182312024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43005-8">http://dx.doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:178372024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186532024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Managing Information Technologyent://SD_ILS/0/SD_ILS:179402024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Castillo, Francisco. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38891-5">http://dx.doi.org/10.1007/978-3-319-38891-5</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183972024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46598-2">http://dx.doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Software Process Improvement and Capability Determination 16th International Conference, SPICE 2016, Dublin, Ireland, June 9-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179492024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Clarke, Paul M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-38980-6">http://dx.doi.org/10.1007/978-3-319-38980-6</a><br/>Format: Electronic Resources<br/>Complexity Management with the K-Method Price Structures, IT and Controlling for Procurement of Packaging Materialsent://SD_ILS/0/SD_ILS:185832024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kossmann, Daniel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48244-5">http://dx.doi.org/10.1007/978-3-662-48244-5</a><br/>Format: Electronic Resources<br/>Business Process Management Forum BPM Forum 2016, Rio de Janeiro, Brazil, September 18-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183272024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar La Rosa, Marcello. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45468-9">http://dx.doi.org/10.1007/978-3-319-45468-9</a><br/>Format: Electronic Resources<br/>Model and Data Engineering 6th International Conference, MEDI 2016, Almería, Spain, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183342024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Bellatreche, Ladjel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45547-1">http://dx.doi.org/10.1007/978-3-319-45547-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186802024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53018-4">http://dx.doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186872024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Clark, Jeremy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53357-4">http://dx.doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183372024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179872024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39381-0">http://dx.doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:186352024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Ryan, Peter Y. A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49301-4">http://dx.doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186382024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186392024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Advanced Multimedia and Ubiquitous Engineering FutureTech & MUEent://SD_ILS/0/SD_ILS:191402024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1536-6">http://dx.doi.org/10.1007/978-981-10-1536-6</a><br/>Format: Electronic Resources<br/>PMP® Examination Practice Questions 400 Practice Questions and Answers to help you Passent://SD_ILS/0/SD_ILS:164412024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Whitaker, Sean. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-1883-9">http://dx.doi.org/10.1007/978-1-4842-1883-9</a><br/>Format: Electronic Resources<br/>Formal Methods: Foundations and Applications 18th Brazilian Symposium, SBMF 2015, Belo Horizonte, Brazil, September 21-22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:173652024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Cornélio, Márcio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29473-5">http://dx.doi.org/10.1007/978-3-319-29473-5</a><br/>Format: Electronic Resources<br/>Cloud Computing and Services Science 5th International Conference, CLOSER 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173812024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29582-4">http://dx.doi.org/10.1007/978-3-319-29582-4</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176832024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:174212024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29883-2">http://dx.doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:174282024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Proceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation Innovation and Practice of Industrial Engineering and Management (volume 2)ent://SD_ILS/0/SD_ILS:188292024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Qi, Ershi. editor.<br/><a href="http://dx.doi.org/10.2991/978-94-6239-145-1">http://dx.doi.org/10.2991/978-94-6239-145-1</a><br/>Format: Electronic Resources<br/>Proceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation Core Theory and Applications of Industrial Engineering (volume 1)ent://SD_ILS/0/SD_ILS:188302024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Qi, Ershi. editor.<br/><a href="http://dx.doi.org/10.2991/978-94-6239-148-2">http://dx.doi.org/10.2991/978-94-6239-148-2</a><br/>Format: Electronic Resources<br/>Formal Aspects of Component Software 12th International Conference, FACS 2015, Niterói, Brazil, October 14-16, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173072024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Braga, Christiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28934-2">http://dx.doi.org/10.1007/978-3-319-28934-2</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176752024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Agile Processes, in Software Engineering, and Extreme Programming 17th International Conference, XP 2016, Edinburgh, UK, May 24-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:178582024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Sharp, Helen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33515-5">http://dx.doi.org/10.1007/978-3-319-33515-5</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 22nd International Working Conference, REFSQ 2016, Gothenburg, Sweden, March 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:174842024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Daneva, Maya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30282-9">http://dx.doi.org/10.1007/978-3-319-30282-9</a><br/>Format: Electronic Resources<br/>Data Science and Big Data Computing Frameworks and Methodologiesent://SD_ILS/0/SD_ILS:176802024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31861-5">http://dx.doi.org/10.1007/978-3-319-31861-5</a><br/>Format: Electronic Resources<br/>Software Quality. The Future of Systems- and Software Development 8th International Conference, SWQD 2016, Vienna, Austria, January 18-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:171222024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Winkler, Dietmar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27033-3">http://dx.doi.org/10.1007/978-3-319-27033-3</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174132024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Mathematical and Engineering Methods in Computer Science 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23-25, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174142024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kofroň, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29817-7">http://dx.doi.org/10.1007/978-3-319-29817-7</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:175212024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Karagiannis, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30505-9">http://dx.doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Information Technology for Management Federated Conference on Computer Science and Information Systems, ISM 2015 and AITM 2015, Lodz, Poland, September 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:175242024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Ziemba, Ewa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30528-8">http://dx.doi.org/10.1007/978-3-319-30528-8</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182702024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182812024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Aiello, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44482-6">http://dx.doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182822024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182882024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>SAP on the Cloudent://SD_ILS/0/SD_ILS:185562024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Missbach, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47418-1">http://dx.doi.org/10.1007/978-3-662-47418-1</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 23rd European Conference, EuroSPI 2016, Graz, Austria, September 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182992024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kreiner, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44817-6">http://dx.doi.org/10.1007/978-3-319-44817-6</a><br/>Format: Electronic Resources<br/>Transactions on Foundations for Mastering Change Ient://SD_ILS/0/SD_ILS:183932024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Steffen, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46508-1">http://dx.doi.org/10.1007/978-3-319-46508-1</a><br/>Format: Electronic Resources<br/>Perspectives in Business Informatics Research 15th International Conference, BIR 2016, Prague, Czech Republic, September 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183202024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Řepa, Václav. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45321-7">http://dx.doi.org/10.1007/978-3-319-45321-7</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:172392024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Haltinner, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28313-5">http://dx.doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183422024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Monrose, Fabian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45719-2">http://dx.doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Shared Services and Outsourcing: A Contemporary Outlook 10th Global Sourcing Workshop 2016, Val d'Isère, France, February 16-19, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:184122024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kotlarsky, Julia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47009-2">http://dx.doi.org/10.1007/978-3-319-47009-2</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:184132024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Livraga, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47072-6">http://dx.doi.org/10.1007/978-3-319-47072-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:176182024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Homma, Naofumi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31271-2">http://dx.doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>Managing Software Process Evolution Traditional, Agile and Beyond – How to Handle Process Changeent://SD_ILS/0/SD_ILS:176482024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kuhrmann, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31545-4">http://dx.doi.org/10.1007/978-3-319-31545-4</a><br/>Format: Electronic Resources<br/>Tamed Agility Pragmatic Contracting and Collaboration in Agile Software Projectsent://SD_ILS/0/SD_ILS:181532024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Book, Matthias. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41478-2">http://dx.doi.org/10.1007/978-3-319-41478-2</a><br/>Format: Electronic Resources<br/>Design Thinking Research Making Design Thinking Foundationalent://SD_ILS/0/SD_ILS:166122024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Plattner, Hasso. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19641-1">http://dx.doi.org/10.1007/978-3-319-19641-1</a><br/>Format: Electronic Resources<br/>Transforming Healthcare Through Information Systems Proceedings of the 24th International Conference on Information Systems Developmentent://SD_ILS/0/SD_ILS:174522024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Vogel, Doug. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30133-4">http://dx.doi.org/10.1007/978-3-319-30133-4</a><br/>Format: Electronic Resources<br/>Software Technologies 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174542024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lorenz, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30142-6">http://dx.doi.org/10.1007/978-3-319-30142-6</a><br/>Format: Electronic Resources<br/>Evaluation of Novel Approaches to Software Engineering 10th International Conference, ENASE 2015, Barcelona, Spain, April 29-30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174762024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Maciaszek, Leszek A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30243-0">http://dx.doi.org/10.1007/978-3-319-30243-0</a><br/>Format: Electronic Resources<br/>Computer and Information Scienceent://SD_ILS/0/SD_ILS:180632024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lee, Roger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40171-3">http://dx.doi.org/10.1007/978-3-319-40171-3</a><br/>Format: Electronic Resources<br/>Modelling Foundations and Applications 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181852024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Wąsowski, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42061-5">http://dx.doi.org/10.1007/978-3-319-42061-5</a><br/>Format: Electronic Resources<br/>Modeling with UML Language, Concepts, Methodsent://SD_ILS/0/SD_ILS:179022024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Rumpe, Bernhard. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33933-7">http://dx.doi.org/10.1007/978-3-319-33933-7</a><br/>Format: Electronic Resources<br/>Design Thinking Research Taking Breakthrough Innovation Homeent://SD_ILS/0/SD_ILS:180882024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Plattner, Hasso. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40382-3">http://dx.doi.org/10.1007/978-3-319-40382-3</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:180892024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Bécue, Adrien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40385-4">http://dx.doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183782024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Sheng, Quan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46295-0">http://dx.doi.org/10.1007/978-3-319-46295-0</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181132024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Mattoso, Marta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40593-3">http://dx.doi.org/10.1007/978-3-319-40593-3</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:186772024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Peyrin, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52993-5">http://dx.doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186782024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53008-5">http://dx.doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:186792024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Robshaw, Matthew. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53015-3">http://dx.doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:183222024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar La Rosa, Marcello. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45348-4">http://dx.doi.org/10.1007/978-3-319-45348-4</a><br/>Format: Electronic Resources<br/>Collaboration in a Hyperconnected World 17th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2016, Porto, Portugal, October 3-5, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183252024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Afsarmanesh, Hamideh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45390-3">http://dx.doi.org/10.1007/978-3-319-45390-3</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:183992024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Grabowski, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46613-2">http://dx.doi.org/10.1007/978-3-319-46613-2</a><br/>Format: Electronic Resources<br/>Pattern and Security Requirements Engineering-Based Establishment of Security Standardsent://SD_ILS/0/SD_ILS:225852024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Beckers, Kristian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16664-3">http://dx.doi.org/10.1007/978-3-319-16664-3</a><br/>Format: Electronic Resources<br/>Grand Societal Challenges in Information Systems Research and Education Ideas from the ERCIS Virtual Seminar Seriesent://SD_ILS/0/SD_ILS:223162024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar vom Brocke, Jan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15027-7">http://dx.doi.org/10.1007/978-3-319-15027-7</a><br/>Format: Electronic Resources<br/>Formal Methods: Foundations and Applications 17th Brazilian Symposium, SBMF 2014, Maceió, AL, Brazil, September 29--October 1, 2014. Proceedingsent://SD_ILS/0/SD_ILS:223202024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Braga, Christiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15075-8">http://dx.doi.org/10.1007/978-3-319-15075-8</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedingsent://SD_ILS/0/SD_ILS:227062024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17533-1">http://dx.doi.org/10.1007/978-3-319-17533-1</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 14th International Conference, ADHOC-NOW 2015, Athens, Greece, June 29 -- July 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:229672024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Papavassiliou, Symeon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19662-6">http://dx.doi.org/10.1007/978-3-319-19662-6</a><br/>Format: Electronic Resources<br/>Information Systems: Development, Applications, Education 8th SIGSAND/PLAIS EuroSymposium 2015, Gdansk, Poland, September 25, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233622024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Wrycza, Stanislaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24366-5">http://dx.doi.org/10.1007/978-3-319-24366-5</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 15th International Conference, NEW2AN 2015, and 8th Conference, ruSMART 2015, St. Petersburg, Russia, August 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232652024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Balandin, Sergey. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23126-6">http://dx.doi.org/10.1007/978-3-319-23126-6</a><br/>Format: Electronic Resources<br/>Software Engineering for Resilient Systems 7th International Workshop, SERENE 2015, Paris, France, September 7-8, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232662024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Fantechi, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23129-7">http://dx.doi.org/10.1007/978-3-319-23129-7</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:228422024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18621-4">http://dx.doi.org/10.1007/978-3-319-18621-4</a><br/>Format: Electronic Resources<br/>Perspectives in Business Informatics Research 14th International Conference, BIR 2015, Tartu, Estonia, August 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231762024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Matulevičius, Raimundas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21915-8">http://dx.doi.org/10.1007/978-3-319-21915-8</a><br/>Format: Electronic Resources<br/>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:231822024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235542024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:234572024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format: Electronic Resources<br/>Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:230092024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Latré, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:231432024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format: Electronic Resources<br/>Cyber-Risk Managementent://SD_ILS/0/SD_ILS:233022024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Refsdal, Atle. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23570-7">http://dx.doi.org/10.1007/978-3-319-23570-7</a><br/>Format: Electronic Resources<br/>Energy Informatics 4th D-A-CH Conference, EI 2015, Karlsruhe, Germany, November 12-13, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234922024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Gottwalt, Sebastian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25876-8">http://dx.doi.org/10.1007/978-3-319-25876-8</a><br/>Format: Electronic Resources<br/>Software Architecture 9th European Conference, ECSA 2015, Dubrovnik/Cavtat, Croatia, September 7-11, 2015. Proceedingsent://SD_ILS/0/SD_ILS:233092024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Weyns, Danny. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23727-5">http://dx.doi.org/10.1007/978-3-319-23727-5</a><br/>Format: Electronic Resources<br/>Model and Data Engineering 5th International Conference, MEDI 2015, Rhodes, Greece, September 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233112024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Bellatreche, Ladjel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23781-7">http://dx.doi.org/10.1007/978-3-319-23781-7</a><br/>Format: Electronic Resources<br/>Computational Inference and Control of Quality in Multimedia Servicesent://SD_ILS/0/SD_ILS:233952024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Menkovski, Vlado. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24792-2">http://dx.doi.org/10.1007/978-3-319-24792-2</a><br/>Format: Electronic Resources<br/>Service Oriented and Cloud Computing 4th European Conference, ESOCC 2015, Taormina, Italy, September 15-17, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233332024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24072-5">http://dx.doi.org/10.1007/978-3-319-24072-5</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233372024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format: Electronic Resources<br/>Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235242024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235382024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235462024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 16th International Conference, PROFES 2015, Bolzano, Italy, December 2-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235492024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26844-6">http://dx.doi.org/10.1007/978-3-319-26844-6</a><br/>Format: Electronic Resources<br/>Implementing IT Processes The Main 17 IT Processes and Directions for a Successful Implementationent://SD_ILS/0/SD_ILS:242082024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Pilorget, Lionel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-04773-3">http://dx.doi.org/10.1007/978-3-658-04773-3</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248572024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format: Electronic Resources<br/>Practitioner's Guide to Health Informaticsent://SD_ILS/0/SD_ILS:227262024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Braunstein, Mark L. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17662-8">http://dx.doi.org/10.1007/978-3-319-17662-8</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228222024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231672024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Xu, Kuai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21837-3">http://dx.doi.org/10.1007/978-3-319-21837-3</a><br/>Format: Electronic Resources<br/>Fundamentals of Service Systemsent://SD_ILS/0/SD_ILS:232732024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Cardoso, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23195-2">http://dx.doi.org/10.1007/978-3-319-23195-2</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235592024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Huang, Zhiqiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27051-7">http://dx.doi.org/10.1007/978-3-319-27051-7</a><br/>Format: Electronic Resources<br/>Software Engineering International Summer Schools, LASER 2013-2014, Elba, Italy, Revised Tutorial Lecturesent://SD_ILS/0/SD_ILS:236182024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28406-4">http://dx.doi.org/10.1007/978-3-319-28406-4</a><br/>Format: Electronic Resources<br/>Globalizing Domain-Specific Languages International Dagstuhl Seminar, Dagstuhl Castle, Germany, October 5-10, 2014, Revised Papersent://SD_ILS/0/SD_ILS:235122024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Combemale, Benoit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26172-0">http://dx.doi.org/10.1007/978-3-319-26172-0</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing - ICSOC 2014 Workshops WESOA; SeMaPS, RMSOC, KASA, ISC, FOR-MOVES, CCSA and Satellite Events, Paris, France, November 3-6, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:232452024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Toumani, Farouk. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22885-3">http://dx.doi.org/10.1007/978-3-319-22885-3</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232482024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22906-5">http://dx.doi.org/10.1007/978-3-319-22906-5</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235202024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Bos, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26362-5">http://dx.doi.org/10.1007/978-3-319-26362-5</a><br/>Format: Electronic Resources<br/>Industrial Engineering, Management Science and Applications 2015ent://SD_ILS/0/SD_ILS:248102024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Gen, Mitsuo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47200-2">http://dx.doi.org/10.1007/978-3-662-47200-2</a><br/>Format: Electronic Resources<br/>Guide to Computer Network Securityent://SD_ILS/0/SD_ILS:195652024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6654-2">http://dx.doi.org/10.1007/978-1-4471-6654-2</a><br/>Format: Electronic Resources<br/>Design Thinking Research Building Innovatorsent://SD_ILS/0/SD_ILS:208922024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Plattner, Hasso. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06823-7">http://dx.doi.org/10.1007/978-3-319-06823-7</a><br/>Format: Electronic Resources<br/>Software Quality. Software and Systems Quality in Distributed and Mobile Environments 7th International Conference, SWQD 2015, Vienna, Austria, January 20-23, 2015, Proceedingsent://SD_ILS/0/SD_ILS:220452024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Winkler, Dietmar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13251-8">http://dx.doi.org/10.1007/978-3-319-13251-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:224692024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lee, Jooyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15943-0">http://dx.doi.org/10.1007/978-3-319-15943-0</a><br/>Format: Electronic Resources<br/>Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lecturesent://SD_ILS/0/SD_ILS:226532024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Felici, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17199-9">http://dx.doi.org/10.1007/978-3-319-17199-9</a><br/>Format: Electronic Resources<br/>Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:223232024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedingsent://SD_ILS/0/SD_ILS:224922024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Fricker, Samuel A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16101-3">http://dx.doi.org/10.1007/978-3-319-16101-3</a><br/>Format: Electronic Resources<br/>Software Business 6th International Conference, ICSOB 2015, Braga, Portugal, June 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:229572024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Fernandes, João M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19593-3">http://dx.doi.org/10.1007/978-3-319-19593-3</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:226232024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17016-9">http://dx.doi.org/10.1007/978-3-319-17016-9</a><br/>Format: Electronic Resources<br/>Software Process Improvement and Capability Determination 15th International Conference, SPICE 2015, Gothenburg, Sweden, June 16-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:229942024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Rout, Terry. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19860-6">http://dx.doi.org/10.1007/978-3-319-19860-6</a><br/>Format: Electronic Resources<br/>Algorithms and Architectures for Parallel Processing ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235692024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Wang, Guojun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27161-3">http://dx.doi.org/10.1007/978-3-319-27161-3</a><br/>Format: Electronic Resources<br/>E-Democracy – Citizen Rights in the World of the New Computing Paradigms 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235702024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27164-4">http://dx.doi.org/10.1007/978-3-319-27164-4</a><br/>Format: Electronic Resources<br/>Software Technologies 9th International Joint Conference, ICSOFT 2014, Vienna, Austria, August 29-31, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:234662024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Holzinger, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25579-8">http://dx.doi.org/10.1007/978-3-319-25579-8</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234682024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Khouzani, MHR. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25594-1">http://dx.doi.org/10.1007/978-3-319-25594-1</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232912024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23440-3">http://dx.doi.org/10.1007/978-3-319-23440-3</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235922024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27668-7">http://dx.doi.org/10.1007/978-3-319-27668-7</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:233272024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format: Electronic Resources<br/>Risks and Resilience of Collaborative Networks 16th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2015, Albi, France,, October 5-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233402024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24141-8">http://dx.doi.org/10.1007/978-3-319-24141-8</a><br/>Format: Electronic Resources<br/>Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:236092024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:233422024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format: Electronic Resources<br/>Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:233432024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Pernul, Günther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:233442024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235082024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26135-5">http://dx.doi.org/10.1007/978-3-319-26135-5</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2015 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:248682024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Güneysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48324-4">http://dx.doi.org/10.1007/978-3-662-48324-4</a><br/>Format: Electronic Resources<br/>E-Government Strategy, ICT and Innovation for Citizen Engagementent://SD_ILS/0/SD_ILS:199602024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Anderson, Dennis. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3350-1">http://dx.doi.org/10.1007/978-1-4939-3350-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248862024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248872024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Big Data and Analytics Strategic and Organizational Impactsent://SD_ILS/0/SD_ILS:215612024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Morabito, Vincenzo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10665-6">http://dx.doi.org/10.1007/978-3-319-10665-6</a><br/>Format: Electronic Resources<br/>Smart Information Systems Computational Intelligence for Real-Life Applicationsent://SD_ILS/0/SD_ILS:222012024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Hopfgartner, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14178-7">http://dx.doi.org/10.1007/978-3-319-14178-7</a><br/>Format: Electronic Resources<br/>Formal Aspects of Component Software 11th International Symposium, FACS 2014, Bertinoro, Italy, September 10-12, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:223652024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lanese, Ivan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15317-9">http://dx.doi.org/10.1007/978-3-319-15317-9</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 5th International Provenance and Annotation Workshop, IPAW 2014, Cologne, Germany, June 9-13, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:225512024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Ludäscher, Bertram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16462-5">http://dx.doi.org/10.1007/978-3-319-16462-5</a><br/>Format: Electronic Resources<br/>Enterprise Systems. Strategic, Organizational, and Technological Dimensions International Workshops, Pre-ICIS 2010, St. Louis, MO, USA, December 12, 2010, Pre-ICIS 2011, Shanghai, China, December 4, 2011, and Pre-ICIS 2012, Orlando, FL, USA, December 16, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:227142024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Sedera, Darshana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17587-4">http://dx.doi.org/10.1007/978-3-319-17587-4</a><br/>Format: Electronic Resources<br/>Practical Biometrics From Aspiration to Implementationent://SD_ILS/0/SD_ILS:195742024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Ashbourn, Julian. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6717-4">http://dx.doi.org/10.1007/978-1-4471-6717-4</a><br/>Format: Electronic Resources<br/>Privacy in a Digital, Networked World Technologies, Implications and Solutionsent://SD_ILS/0/SD_ILS:211802024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Zeadally, Sherali. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08470-1">http://dx.doi.org/10.1007/978-3-319-08470-1</a><br/>Format: Electronic Resources<br/>Green in Software Engineeringent://SD_ILS/0/SD_ILS:211962024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Calero, Coral. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08581-4">http://dx.doi.org/10.1007/978-3-319-08581-4</a><br/>Format: Electronic Resources<br/>Agile Project Management: Managing for Successent://SD_ILS/0/SD_ILS:212772024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Crowder, James A. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09018-4">http://dx.doi.org/10.1007/978-3-319-09018-4</a><br/>Format: Electronic Resources<br/>UML @ Classroom An Introduction to Object-Oriented Modelingent://SD_ILS/0/SD_ILS:219532024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Seidl, Martina. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12742-2">http://dx.doi.org/10.1007/978-3-319-12742-2</a><br/>Format: Electronic Resources<br/>Enterprise Governance of Information Technology Achieving Alignment and Value, Featuring COBIT 5ent://SD_ILS/0/SD_ILS:222542024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar De Haes, Steven. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14547-1">http://dx.doi.org/10.1007/978-3-319-14547-1</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:230042024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Foo, Ernest. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19962-7">http://dx.doi.org/10.1007/978-3-319-19962-7</a><br/>Format: Electronic Resources<br/>Evaluation of Novel Approaches to Software Engineering 9th International Conference, ENASE 2014, Lisbon, Portugal, April 28-30, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:235742024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Maciaszek, Leszek A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27218-4">http://dx.doi.org/10.1007/978-3-319-27218-4</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 22nd European Conference, EuroSPI 2015, Ankara, Turkey, September 30 -- October 2, 2015. Proceedingsent://SD_ILS/0/SD_ILS:233862024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar O’Connor, Rory V. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24647-5">http://dx.doi.org/10.1007/978-3-319-24647-5</a><br/>Format: Electronic Resources<br/>Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234712024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231582024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Pelc, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21741-3">http://dx.doi.org/10.1007/978-3-319-21741-3</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedingsent://SD_ILS/0/SD_ILS:230762024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Samarati, Pierangela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20810-7">http://dx.doi.org/10.1007/978-3-319-20810-7</a><br/>Format: Electronic Resources<br/>Managing Agile Strategy, Implementation, Organisation and Peopleent://SD_ILS/0/SD_ILS:225262024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Moran, Alan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16262-1">http://dx.doi.org/10.1007/978-3-319-16262-1</a><br/>Format: Electronic Resources<br/>Social Computing, Behavioral-Cultural Modeling, and Prediction 8th International Conference, SBP 2015, Washington, DC, USA, March 31-April 3, 2015. Proceedingsent://SD_ILS/0/SD_ILS:225272024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Agarwal, Nitin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16268-3">http://dx.doi.org/10.1007/978-3-319-16268-3</a><br/>Format: Electronic Resources<br/>Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228302024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18500-2">http://dx.doi.org/10.1007/978-3-319-18500-2</a><br/>Format: Electronic Resources<br/>Theory and Practice of Model Transformations 8th International Conference, ICMT 2015, Held as Part of STAF 2015, L'Aquila, Italy, July 20-21, 2015. Proceedingsent://SD_ILS/0/SD_ILS:231132024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kolovos, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21155-8">http://dx.doi.org/10.1007/978-3-319-21155-8</a><br/>Format: Electronic Resources<br/>Testing Software and Systems 27th IFIP WG 6.1 International Conference, ICTSS 2015, Sharjah and Dubai, United Arab Emirates, November 23-25, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235012024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar El-Fakih, Khaled. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25945-1">http://dx.doi.org/10.1007/978-3-319-25945-1</a><br/>Format: Electronic Resources<br/>Guide to Security Assurance for Cloud Computingent://SD_ILS/0/SD_ILS:235022024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Zhu, Shao Ying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25988-8">http://dx.doi.org/10.1007/978-3-319-25988-8</a><br/>Format: Electronic Resources<br/>Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235042024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format: Electronic Resources<br/>Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235052024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format: Electronic Resources<br/>Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234002024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format: Electronic Resources<br/>SDL 2015: Model-Driven Engineering for Smart Cities 17th International SDL Forum, Berlin, Germany, October 12-14, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234042024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Fischer, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24912-4">http://dx.doi.org/10.1007/978-3-319-24912-4</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232382024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format: Electronic Resources<br/>Achieving Success and Innovation in Global Sourcing: Perspectives and Practices 9th Global Sourcing Workshop 2015, La Thuile, Italy, February 18-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235432024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Oshri, Ilan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26739-5">http://dx.doi.org/10.1007/978-3-319-26739-5</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:226402024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format: Electronic Resources<br/>Traffic Monitoring and Analysis 7th International Workshop, TMA 2015, Barcelona, Spain, April 21-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:226482024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Steiner, Moritz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17172-2">http://dx.doi.org/10.1007/978-3-319-17172-2</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XX Special Issue on Advanced Techniques for Big Data Managementent://SD_ILS/0/SD_ILS:247712024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46703-9">http://dx.doi.org/10.1007/978-3-662-46703-9</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:247722024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:247792024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:247802024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format: Electronic Resources<br/>Frontiers in Internet Technologies Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:247842024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Zhang, Shiyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46826-5">http://dx.doi.org/10.1007/978-3-662-46826-5</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:248522024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Brenner, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48051-9">http://dx.doi.org/10.1007/978-3-662-48051-9</a><br/>Format: Electronic Resources<br/>Ad-hoc Networks and Wireless ADHOC-NOW 2014 International Workshops, ETSD, MARSS, MWaoN, SecAN, SSPA, and WiSARN, Benidorm, Spain, June 22--27, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:247222024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Garcia Pineda, Miguel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46338-3">http://dx.doi.org/10.1007/978-3-662-46338-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247352024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format: Electronic Resources<br/>Cloud Computing and Services Sciences International Conference in Cloud Computing and Services Sciences, CLOSER 2014 Barcelona Spain, April 3–5, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:234492024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25414-2">http://dx.doi.org/10.1007/978-3-319-25414-2</a><br/>Format: Electronic Resources<br/>Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014)ent://SD_ILS/0/SD_ILS:257202024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Qi, Ershi. editor.<br/><a href="http://dx.doi.org/10.2991/978-94-6239-100-0">http://dx.doi.org/10.2991/978-94-6239-100-0</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:225942024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Joye, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16763-3">http://dx.doi.org/10.1007/978-3-319-16763-3</a><br/>Format: Electronic Resources<br/>Energy Efficient Data Centers Third International Workshop, E2DC 2014, Cambridge, UK, June 10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:224382024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Klingert, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15786-3">http://dx.doi.org/10.1007/978-3-319-15786-3</a><br/>Format: Electronic Resources<br/>Protecting Privacy in Data Releaseent://SD_ILS/0/SD_ILS:224942024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Livraga, Giovanni. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16109-9">http://dx.doi.org/10.1007/978-3-319-16109-9</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedingsent://SD_ILS/0/SD_ILS:230572024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Almgren, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20550-2">http://dx.doi.org/10.1007/978-3-319-20550-2</a><br/>Format: Electronic Resources<br/>Business Process Management 13th International Conference, BPM 2015, Innsbruck, Austria, August 31 -- September 3, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232582024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Motahari-Nezhad, Hamid Reza. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23063-4">http://dx.doi.org/10.1007/978-3-319-23063-4</a><br/>Format: Electronic Resources<br/>Software Measurement 25th International Workshop on Software Measurement and 10th International Conference on Software Process and Product Measurement, IWSM-Mensura 2015, Kraków, Poland, October 5-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233552024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Kobyliński, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24285-9">http://dx.doi.org/10.1007/978-3-319-24285-9</a><br/>Format: Electronic Resources<br/>FM 2015: Formal Methods 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:229142024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Bjørner, Nikolaj. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19249-9">http://dx.doi.org/10.1007/978-3-319-19249-9</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 16th International Conference, XP 2015, Helsinki, Finland, May 25-29, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228402024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Lassenius, Casper. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18612-2">http://dx.doi.org/10.1007/978-3-319-18612-2</a><br/>Format: Electronic Resources<br/>Open Source Systems: Adoption and Impact 11th IFIP WG 2.13 International Conference, OSS 2015, Florence, Italy, May 16-17, 2015, Proceedingsent://SD_ILS/0/SD_ILS:227462024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Damiani, Ernesto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17837-0">http://dx.doi.org/10.1007/978-3-319-17837-0</a><br/>Format: Electronic Resources<br/>Modelling Foundations and Applications 11th European Conference, ECMFA 2015, Held as Part of STAF 2015, L`Aquila, Italy, July 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:231122024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Taentzer, Gabriele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21151-0">http://dx.doi.org/10.1007/978-3-319-21151-0</a><br/>Format: Electronic Resources<br/>Transforming Learning and IT Management through Gamificationent://SD_ILS/0/SD_ILS:228472024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Prakash, Edmond C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18699-3">http://dx.doi.org/10.1007/978-3-319-18699-3</a><br/>Format: Electronic Resources<br/>Information Systems and Neuroscience Gmunden Retreat on NeuroIS 2015ent://SD_ILS/0/SD_ILS:228482024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Davis, Fred D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18702-0">http://dx.doi.org/10.1007/978-3-319-18702-0</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232842024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format: Electronic Resources<br/>Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedingsent://SD_ILS/0/SD_ILS:234962024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XIX Special Issue on Big Data and Open Dataent://SD_ILS/0/SD_ILS:247502024-05-25T02:22:10Z2024-05-25T02:22:10ZYazar Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46562-2">http://dx.doi.org/10.1007/978-3-662-46562-2</a><br/>Format: Electronic Resources<br/>