Search Results for Sheng, Bo.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSheng$00252C$002bBo.$0026ps$003d300?2024-06-29T23:47:15ZWired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224452024-06-29T23:47:15Z2024-06-29T23:47:15ZYazar Chowdhury, Kaushik Roy. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02931-9">https://doi.org/10.1007/978-3-030-02931-9</a><br/>Format: Electronic Resources<br/>Malicious Attack Propagation and Source Identificationent://SD_ILS/0/SD_ILS:4276182024-06-29T23:47:15Z2024-06-29T23:47:15ZYazar Jiang, Jiaojiao. author.<br/><a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format: Electronic Resources<br/>High-Performance Computing on the Intel® Xeon Phi™ How to Fully Exploit MIC Architecturesent://SD_ILS/0/SD_ILS:208332024-06-29T23:47:15Z2024-06-29T23:47:15ZYazar Wang, Endong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06486-4">http://dx.doi.org/10.1007/978-3-319-06486-4</a><br/>Format: Electronic Resources<br/>Human Centered Computing First International Conference, HCC 2014, Phnom Penh, Cambodia, November 27-29, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:223972024-06-29T23:47:15Z2024-06-29T23:47:15ZYazar Zu, Qiaohong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15554-8">http://dx.doi.org/10.1007/978-3-319-15554-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186382024-06-29T23:47:15Z2024-06-29T23:47:15ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49384-7">http://dx.doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186392024-06-29T23:47:15Z2024-06-29T23:47:15ZYazar Cheng, Chen-Mou. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49387-8">http://dx.doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Advances in Reconfigurable Mechanisms and Robots IIent://SD_ILS/0/SD_ILS:168352024-06-29T23:47:15Z2024-06-29T23:47:15ZYazar Ding, Xilun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23327-7">http://dx.doi.org/10.1007/978-3-319-23327-7</a><br/>Format: Electronic Resources<br/>