Search Results for - Narrowed by: SpringerLink (Online service) - 2007 - Management of Computing and Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300?2024-06-21T01:20:13ZOrganizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda IFIP TC 8 WG 8.6 International Working Conference, June 14–16, Manchester, UKent://SD_ILS/0/SD_ILS:5060052024-06-21T01:20:13Z2024-06-21T01:20:13Zby McMaster, Tom. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72804-9">http://dx.doi.org/10.1007/978-0-387-72804-9</a><br/>Format: Electronic Resources<br/>Metagraphs and Their Applicationsent://SD_ILS/0/SD_ILS:5054722024-06-21T01:20:13Z2024-06-21T01:20:13Zby Basu, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-37234-1">http://dx.doi.org/10.1007/978-0-387-37234-1</a><br/>Format: Electronic Resources<br/>Transactions on Aspect-Oriented Software Development IVent://SD_ILS/0/SD_ILS:5130022024-06-21T01:20:13Z2024-06-21T01:20:13Zby Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77042-8">http://dx.doi.org/10.1007/978-3-540-77042-8</a><br/>Format: Electronic Resources<br/>Grid Computing Securityent://SD_ILS/0/SD_ILS:5116722024-06-21T01:20:13Z2024-06-21T01:20:13Zby Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5122482024-06-21T01:20:13Z2024-06-21T01:20:13Zby Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-06-21T01:20:13Z2024-06-21T01:20:13Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129272024-06-21T01:20:13Z2024-06-21T01:20:13Zby Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papersent://SD_ILS/0/SD_ILS:5129282024-06-21T01:20:13Z2024-06-21T01:20:13Zby Obermaisser, Roman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75664-4">http://dx.doi.org/10.1007/978-3-540-75664-4</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128712024-06-21T01:20:13Z2024-06-21T01:20:13Zby Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format: Electronic Resources<br/>Transactions on Aspect-Oriented Software Development IIIent://SD_ILS/0/SD_ILS:5128782024-06-21T01:20:13Z2024-06-21T01:20:13Zby Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75162-5">http://dx.doi.org/10.1007/978-3-540-75162-5</a><br/>Format: Electronic Resources<br/>Business Process Management 5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128802024-06-21T01:20:13Z2024-06-21T01:20:13Zby Alonso, Gustavo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75183-0">http://dx.doi.org/10.1007/978-3-540-75183-0</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 10th International Conference, MoDELS 2007, Nashville, USA, September 30 - October 5, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128842024-06-21T01:20:13Z2024-06-21T01:20:13Zby Engels, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75209-7">http://dx.doi.org/10.1007/978-3-540-75209-7</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128882024-06-21T01:20:13Z2024-06-21T01:20:13Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format: Electronic Resources<br/>Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125282024-06-21T01:20:13Z2024-06-21T01:20:13Zby Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125292024-06-21T01:20:13Z2024-06-21T01:20:13Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papersent://SD_ILS/0/SD_ILS:5123522024-06-21T01:20:13Z2024-06-21T01:20:13Zby Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format: Electronic Resources<br/>Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130172024-06-21T01:20:13Z2024-06-21T01:20:13Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format: Electronic Resources<br/>Model Driven Architecture- Foundations and Applications Third European Conference, ECMDA-FA 2007, Haifa, Israel, June 11-15, 2007, Proccedingsent://SD_ILS/0/SD_ILS:5125532024-06-21T01:20:13Z2024-06-21T01:20:13Zby Akehurst, David H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72901-3">http://dx.doi.org/10.1007/978-3-540-72901-3</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123622024-06-21T01:20:13Z2024-06-21T01:20:13Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format: Electronic Resources<br/>Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5122762024-06-21T01:20:13Z2024-06-21T01:20:13Zby Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part Ient://SD_ILS/0/SD_ILS:5128402024-06-21T01:20:13Z2024-06-21T01:20:13Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74819-9">http://dx.doi.org/10.1007/978-3-540-74819-9</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part IIent://SD_ILS/0/SD_ILS:5128432024-06-21T01:20:13Z2024-06-21T01:20:13Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74827-4">http://dx.doi.org/10.1007/978-3-540-74827-4</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5128442024-06-21T01:20:13Z2024-06-21T01:20:13Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74829-8">http://dx.doi.org/10.1007/978-3-540-74829-8</a><br/>Format: Electronic Resources<br/>Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125722024-06-21T01:20:13Z2024-06-21T01:20:13Zby Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 13th International Working Conference, REFSQ 2007, Trondheim, Norway, June 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125812024-06-21T01:20:13Z2024-06-21T01:20:13Zby Sawyer, Pete. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73031-6">http://dx.doi.org/10.1007/978-3-540-73031-6</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIent://SD_ILS/0/SD_ILS:5125942024-06-21T01:20:13Z2024-06-21T01:20:13Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format: Electronic Resources<br/>Software Measurement Establish — Extract — Evaluate — Executeent://SD_ILS/0/SD_ILS:5123782024-06-21T01:20:13Z2024-06-21T01:20:13Zby Ebert, Christof. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71649-5">http://dx.doi.org/10.1007/978-3-540-71649-5</a><br/>Format: Electronic Resources<br/>SDL 2007: Design for Dependable Systems 13th International SDL Forum Paris, France, September 18-21, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5128662024-06-21T01:20:13Z2024-06-21T01:20:13Zby Gaudin, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74984-4">http://dx.doi.org/10.1007/978-3-540-74984-4</a><br/>Format: Electronic Resources<br/>Rapid Integration of Software Engineering Techniques Third International Workshop, RISE 2006, Geneva, Switzerland, September 13-15, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5124022024-06-21T01:20:13Z2024-06-21T01:20:13Zby Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71876-5">http://dx.doi.org/10.1007/978-3-540-71876-5</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129912024-06-21T01:20:13Z2024-06-21T01:20:13Zby Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format: Electronic Resources<br/>Software Product Lines in Action The Best Industrial Practice in Product Line Engineeringent://SD_ILS/0/SD_ILS:5123412024-06-21T01:20:13Z2024-06-21T01:20:13Zby Linden, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71437-8">http://dx.doi.org/10.1007/978-3-540-71437-8</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada Europe 2007 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126212024-06-21T01:20:13Z2024-06-21T01:20:13Zby Abdennadher, Nabil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73230-3">http://dx.doi.org/10.1007/978-3-540-73230-3</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126262024-06-21T01:20:13Z2024-06-21T01:20:13Zby Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5127822024-06-21T01:20:13Z2024-06-21T01:20:13Zby Wang, Yuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format: Electronic Resources<br/>ECOOP 2007 – Object-Oriented Programming 21st European Conference, Berlin, Germany, July 30 - August 3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126992024-06-21T01:20:13Z2024-06-21T01:20:13Zby Ernst, Erik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73589-2">http://dx.doi.org/10.1007/978-3-540-73589-2</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5127032024-06-21T01:20:13Z2024-06-21T01:20:13Zby Hämmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5127932024-06-21T01:20:13Z2024-06-21T01:20:13Zby Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 9th International Symposium, SSS 2007 Paris, France, November 14-16, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129612024-06-21T01:20:13Z2024-06-21T01:20:13Zby Masuzawa, Toshimitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76627-8">http://dx.doi.org/10.1007/978-3-540-76627-8</a><br/>Format: Electronic Resources<br/>Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129982024-06-21T01:20:13Z2024-06-21T01:20:13Zby Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129992024-06-21T01:20:13Z2024-06-21T01:20:13Zby Srinathan, K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127842024-06-21T01:20:13Z2024-06-21T01:20:13Zby Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format: Electronic Resources<br/>Electronic Government 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127882024-06-21T01:20:13Z2024-06-21T01:20:13Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74444-3">http://dx.doi.org/10.1007/978-3-540-74444-3</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129742024-06-21T01:20:13Z2024-06-21T01:20:13Zby Nam, Kil-Hyun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Electronic Resources<br/>Sustainable Internet Third Asian Internet Engineering Conference, AINTEC 2007, Phuket, Thailand, November 27-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129762024-06-21T01:20:13Z2024-06-21T01:20:13Zby Fdida, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76809-8">http://dx.doi.org/10.1007/978-3-540-76809-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129862024-06-21T01:20:13Z2024-06-21T01:20:13Zby Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Electronic Resources<br/>Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130042024-06-21T01:20:13Z2024-06-21T01:20:13Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Electronic Resources<br/>Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128892024-06-21T01:20:13Z2024-06-21T01:20:13Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format: Electronic Resources<br/>E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130402024-06-21T01:20:13Z2024-06-21T01:20:13Zby Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format: Electronic Resources<br/>Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130422024-06-21T01:20:13Z2024-06-21T01:20:13Zby Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format: Electronic Resources<br/>Anti-Spam Measures Analysis and Designent://SD_ILS/0/SD_ILS:5123902024-06-21T01:20:13Z2024-06-21T01:20:13Zby Schryen, Guido. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71750-8">http://dx.doi.org/10.1007/978-3-540-71750-8</a><br/>Format: Electronic Resources<br/>Object-Oriented Technology. ECOOP 2006 Workshop Reader ECOOP 2006 Workshops, Nantes, France, July 3-7, 2006, Final Reportsent://SD_ILS/0/SD_ILS:5123912024-06-21T01:20:13Z2024-06-21T01:20:13Zby Südholt, Mario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71774-4">http://dx.doi.org/10.1007/978-3-540-71774-4</a><br/>Format: Electronic Resources<br/>Software Process Improvement 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129022024-06-21T01:20:13Z2024-06-21T01:20:13Zby Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75381-0">http://dx.doi.org/10.1007/978-3-540-75381-0</a><br/>Format: Electronic Resources<br/>Early Aspects: Current Challenges and Future Directions 10th International Workshop, Vancouver, Canada, March 13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5129772024-06-21T01:20:13Z2024-06-21T01:20:13Zby Moreira, Ana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76811-1">http://dx.doi.org/10.1007/978-3-540-76811-1</a><br/>Format: Electronic Resources<br/>Guerrilla Capacity Planning A Tactical Approach to Planning for Highly Scalable Applications and Servicesent://SD_ILS/0/SD_ILS:5098402024-06-21T01:20:13Z2024-06-21T01:20:13Zby Gunther, Neil J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31010-5">http://dx.doi.org/10.1007/978-3-540-31010-5</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-06-21T01:20:13Z2024-06-21T01:20:13Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Software Process Dynamics and Agility International Conference on Software Process, ICSP 2007, Minneapolis, MN, USA, May 19-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124732024-06-21T01:20:13Z2024-06-21T01:20:13Zby Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72426-1">http://dx.doi.org/10.1007/978-3-540-72426-1</a><br/>Format: Electronic Resources<br/>Digital Decision Making Back to the Futureent://SD_ILS/0/SD_ILS:5086322024-06-21T01:20:13Z2024-06-21T01:20:13Zby Corrigan, Ray. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-673-5">http://dx.doi.org/10.1007/978-1-84628-673-5</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability New Challenges and Approachesent://SD_ILS/0/SD_ILS:5086492024-06-21T01:20:13Z2024-06-21T01:20:13Zby Doumeingts, Guy. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-714-5">http://dx.doi.org/10.1007/978-1-84628-714-5</a><br/>Format: Electronic Resources<br/>EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UKent://SD_ILS/0/SD_ILS:5086642024-06-21T01:20:13Z2024-06-21T01:20:13Zby Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-750-3">http://dx.doi.org/10.1007/978-1-84628-750-3</a><br/>Format: Electronic Resources<br/>Spatial Database Systems Design, Implementation and Project Managementent://SD_ILS/0/SD_ILS:5072592024-06-21T01:20:13Z2024-06-21T01:20:13Zby Yeung, Albert K. W. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5392-4">http://dx.doi.org/10.1007/1-4020-5392-4</a><br/>Format: Electronic Resources<br/>Network-Centric Service-Oriented Enterpriseent://SD_ILS/0/SD_ILS:5076512024-06-21T01:20:13Z2024-06-21T01:20:13Zby Chang, William Y. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-6456-2">http://dx.doi.org/10.1007/978-1-4020-6456-2</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability II New Challenges and Approachesent://SD_ILS/0/SD_ILS:5087022024-06-21T01:20:13Z2024-06-21T01:20:13Zby Gonçalves, Ricardo J. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-858-6">http://dx.doi.org/10.1007/978-1-84628-858-6</a><br/>Format: Electronic Resources<br/>Preserving Digital Informationent://SD_ILS/0/SD_ILS:5115792024-06-21T01:20:13Z2024-06-21T01:20:13Zby Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format: Electronic Resources<br/>Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124292024-06-21T01:20:13Z2024-06-21T01:20:13Zby Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format: Electronic Resources<br/>Information Systems Action Research An Applied View of Emerging Concepts and Methodsent://SD_ILS/0/SD_ILS:5054032024-06-21T01:20:13Z2024-06-21T01:20:13Zby Kock, Ned. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36060-7">http://dx.doi.org/10.1007/978-0-387-36060-7</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130322024-06-21T01:20:13Z2024-06-21T01:20:13Zby Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5130332024-06-21T01:20:13Z2024-06-21T01:20:13Zby Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>Advances in Hybrid Information Technology First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130342024-06-21T01:20:13Z2024-06-21T01:20:13Zby Szczuka, Marcin S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77368-9">http://dx.doi.org/10.1007/978-3-540-77368-9</a><br/>Format: Electronic Resources<br/>Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130352024-06-21T01:20:13Z2024-06-21T01:20:13Zby Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format: Electronic Resources<br/>Runtime Verification 7th International Workshop, RV 2007, Vancover, Canada, March 13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130362024-06-21T01:20:13Z2024-06-21T01:20:13Zby Sokolsky, Oleg. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77395-5">http://dx.doi.org/10.1007/978-3-540-77395-5</a><br/>Format: Electronic Resources<br/>Business Intelligence for the Real-Time Enterprises First International Workshop, BIRTE 2006, Seoul, Korea, September 11, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5127392024-06-21T01:20:13Z2024-06-21T01:20:13Zby Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73950-0">http://dx.doi.org/10.1007/978-3-540-73950-0</a><br/>Format: Electronic Resources<br/>Successfully Implementing Microsoft Dynamics™ by Using the Regatta® Approach for Microsoft Dynamics™ent://SD_ILS/0/SD_ILS:5123702024-06-21T01:20:13Z2024-06-21T01:20:13Zby Koop, Reinder. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71593-1">http://dx.doi.org/10.1007/978-3-540-71593-1</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 8th International Conference, XP 2007, Como, Italy, June 18-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125972024-06-21T01:20:13Z2024-06-21T01:20:13Zby Concas, Giulio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73101-6">http://dx.doi.org/10.1007/978-3-540-73101-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126752024-06-21T01:20:13Z2024-06-21T01:20:13Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 8th International Conference, PROFES 2007, Riga, Latvia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126762024-06-21T01:20:13Z2024-06-21T01:20:13Zby Münch, Jürgen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73460-4">http://dx.doi.org/10.1007/978-3-540-73460-4</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127772024-06-21T01:20:13Z2024-06-21T01:20:13Zby Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format: Electronic Resources<br/>Advances in Biometrics International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128032024-06-21T01:20:13Z2024-06-21T01:20:13Zby Lee, Seong-Whan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74549-5">http://dx.doi.org/10.1007/978-3-540-74549-5</a><br/>Format: Electronic Resources<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129892024-06-21T01:20:13Z2024-06-21T01:20:13Zby Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130072024-06-21T01:20:13Z2024-06-21T01:20:13Zby McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126232024-06-21T01:20:13Z2024-06-21T01:20:13Zby Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format: Electronic Resources<br/>Models in Software Engineering Workshops and Symposia at MoDELS 2006, Genoa, Italy, October 1-6, 2006, Reports and Revised Selected Papersent://SD_ILS/0/SD_ILS:5121642024-06-21T01:20:13Z2024-06-21T01:20:13Zby Kühne, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69489-2">http://dx.doi.org/10.1007/978-3-540-69489-2</a><br/>Format: Electronic Resources<br/>Software Engineering Approaches for Offshore and Outsourced Development First International Conference, SEAFOOD 2007, Zurich, Switzerland, February 5-6, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5129202024-06-21T01:20:13Z2024-06-21T01:20:13Zby Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75542-5">http://dx.doi.org/10.1007/978-3-540-75542-5</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lecturesent://SD_ILS/0/SD_ILS:5128372024-06-21T01:20:13Z2024-06-21T01:20:13Zby Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128462024-06-21T01:20:13Z2024-06-21T01:20:13Zby Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San José, USA, October 31 - November 2, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129422024-06-21T01:20:13Z2024-06-21T01:20:13Zby Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format: Electronic Resources<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:5127562024-06-21T01:20:13Z2024-06-21T01:20:13Zby Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127612024-06-21T01:20:13Z2024-06-21T01:20:13Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123812024-06-21T01:20:13Z2024-06-21T01:20:13Zby Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126872024-06-21T01:20:13Z2024-06-21T01:20:13Zby Barker, Steve. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126902024-06-21T01:20:13Z2024-06-21T01:20:13Zby Xiao, Bin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128252024-06-21T01:20:13Z2024-06-21T01:20:13Zby Paillier, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Format: Electronic Resources<br/>Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129332024-06-21T01:20:13Z2024-06-21T01:20:13Zby Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126602024-06-21T01:20:13Z2024-06-21T01:20:13Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format: Electronic Resources<br/>Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130432024-06-21T01:20:13Z2024-06-21T01:20:13Zby Kim, Sehun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format: Electronic Resources<br/>Testing of Software and Communicating Systems 19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallinn, Estonia, June 26-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125892024-06-21T01:20:13Z2024-06-21T01:20:13Zby Petrenko, Alexandre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73066-8">http://dx.doi.org/10.1007/978-3-540-73066-8</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124602024-06-21T01:20:13Z2024-06-21T01:20:13Zby Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124922024-06-21T01:20:13Z2024-06-21T01:20:13Zby Naor, Moni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125042024-06-21T01:20:13Z2024-06-21T01:20:13Zby Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">http://dx.doi.org/10.1007/978-3-540-72608-1</a><br/>Format: Electronic Resources<br/>