Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
Send a Request
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
8 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
00000000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Development of a static analysis tool to find securty vulnerabilities in java applications
Development of a static analysis tool to find securty vulnerabilities in java applications
by
Topuz, Bertan.
Access to Electronic Version.
Format:
Manuscript
2.
Development of fuzzy syllogistic algorithms and applications distributed reasoning approaches
Development of fuzzy syllogistic algorithms and applications distributed reasoning approaches
by
Çakır, Hüseyin.
Access to Electronic Version.
Format:
Manuscript
View Other Search Results
3.
Impacts of frequent itemset hiding algorithms on privacy preserving data mining
Impacts of frequent itemset hiding algorithms on privacy preserving data mining
by
Yıldız, Barış.
Access to Electronic Version
Format:
Manuscript
4.
Performance enhancement of real-time protocol master of science
Performance enhancement of real-time protocol master of science
by
Yücel, Çağan Selçuk.
Access to Electronic Version
Format:
Manuscript
5.
Utilization of timed automata as a verification tool for real-time security protocols
Utilization of timed automata as a verification tool for real-time security protocols
by
Külahçıoğlu, Burcu.
Access to Electronic Version.
Format:
Manuscript
6.
Modeling and verification of a stream authentication protocol using communicating sequential processes
Modeling and verification of a stream authentication protocol using communicating sequential processes
by
Özkan, Süleyman Murat.
Access to Electronic Version.
Format:
Manuscript
7.
Designing programmable logic controller for data acquisition and control
Designing programmable logic controller for data acquisition and control
by
Gözütok, Mehmet Emre.
Access to Electronic Version.
Format:
Manuscript
8.
Level based labeling scheme for extensible markup language (XML) data processing
Level based labeling scheme for extensible markup language (XML) data processing
by
Atıcı, Beray.
Access to Electronic Version.
Format:
Manuscript
Select All
1
8 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Author: İzmir Institute of Technology. Computer Engineering.
Included
Publication Date: 2010
Author
Include
Exclude
Ayav Tolga. Theis advisor.
(2)
Aytaç, Sıtkı. Thesis advisor.
(2)
Ergenç, Belgin. Thesis advisor.
(2)
Atıcı, Beray.
(1)
Gözütok, Mehmet Emre.
(1)
Kumova, İ. Bora. Theis advisor.
(1)
Külahçıoğlu, Burcu.
(1)
Topuz, Bertan.
(1)
Tuğlular, Tuğkan. Thesis advisor.
(1)
Yücel, Çağan Selçuk.
(1)
Yıldız, Barış.
(1)
Çakır, Hüseyin.
(1)
Özkan, Süleyman Murat.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Supplementary CD-ROM
(8)
Thesis
(8)
Language
Include
Exclude
English
(8)
Subject
Include
Exclude
Artifical intelligence.
(1)
CSP(Computer program language)
(1)
Computer network protocols.
(1)
Computers securiyt.
(1)
Data minning.
(1)
Fuzzy algorithms.
(1)
Java(Computer program language)
(1)
Machine theory.
(1)
Multimedia systems.
(1)
Programmable controllers.
(1)
Programmable logic devices -- Design.
(1)
Real-time control.
(1)
Real-time data processing.
(1)
Secuential processing(Computer science)
(1)
XML(Document markup language)
(1)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
Thesis Collection
(8)
Library
Include
Exclude
IYTE Library
(8)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}