Search Results for Computers. - Narrowed by: Springer E-Book Collection - Computer network architectures. - Data Structures and Information Theory.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputers.$0026qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026qf$003dSUBJECT$002509Konu$002509Data$002bStructures$002band$002bInformation$002bTheory.$002509Data$002bStructures$002band$002bInformation$002bTheory.$0026ps$003d300?2024-07-29T05:35:40Ze-Infrastructure and e-Services for Developing Countries 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2210992024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Odumuyiwa, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98827-6">https://doi.org/10.1007/978-3-319-98827-6</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Applications, Services and Contexts Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2250142024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58536-9">https://doi.org/10.1007/978-3-319-58536-9</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Aging, Design and User Experience Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2266332024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58530-7">https://doi.org/10.1007/978-3-319-58530-7</a><br/>Format: Electronic Resources<br/>Verifiable Privacy Protection for Vehicular Communication Systemsent://SD_ILS/0/SD_ILS:2243662024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Förster, David. author.<br/><a href="https://doi.org/10.1007/978-3-658-18550-3">https://doi.org/10.1007/978-3-658-18550-3</a><br/>Format: Electronic Resources<br/>SCION: A Secure Internet Architectureent://SD_ILS/0/SD_ILS:2258812024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Perrig, Adrian. author.<br/><a href="https://doi.org/10.1007/978-3-319-67080-5">https://doi.org/10.1007/978-3-319-67080-5</a><br/>Format: Electronic Resources<br/>Provable Security 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2212392024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Baek, Joonsang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01446-9">https://doi.org/10.1007/978-3-030-01446-9</a><br/>Format: Electronic Resources<br/>Principles and Practice of Constraint Programming 24th International Conference, CP 2018, Lille, France, August 27-31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2217782024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Hooker, John. editor. (orcid)0000-0003-3169-1871<br/><a href="https://doi.org/10.1007/978-3-319-98334-9">https://doi.org/10.1007/978-3-319-98334-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2224442024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2224832024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217662024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Farshim, Pooya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69284-5">https://doi.org/10.1007/978-3-319-69284-5</a><br/>Format: Electronic Resources<br/>Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224522024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220562024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>Autonomous Agents and Multiagent Systems AAMAS 2017 Workshops, Best Papers, São Paulo, Brazil, May 8-12, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2260322024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Sukthankar, Gita. editor. (orcid)0000-0002-6863-6609<br/><a href="https://doi.org/10.1007/978-3-319-71682-4">https://doi.org/10.1007/978-3-319-71682-4</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part Vent://SD_ILS/0/SD_ILS:2219932024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00018-9">https://doi.org/10.1007/978-3-030-00018-9</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada-Europe 2018 23rd Ada-Europe International Conference on Reliable Software Technologies, Lisbon, Portugal, June 18-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2222542024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Casimiro, António. editor. (orcid)0000-0002-5522-5739<br/><a href="https://doi.org/10.1007/978-3-319-92432-8">https://doi.org/10.1007/978-3-319-92432-8</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy and Trust 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2267962024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58460-7">https://doi.org/10.1007/978-3-319-58460-7</a><br/>Format: Electronic Resources<br/>Information and Communications Security 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2227982024-07-29T05:35:40Z2024-07-29T05:35:40ZYazar Naccache, David. editor. (orcid)0000-0002-8651-6555<br/><a href="https://doi.org/10.1007/978-3-030-01950-1">https://doi.org/10.1007/978-3-030-01950-1</a><br/>Format: Electronic Resources<br/>