Search Results for - Narrowed by: Springer Collection - Management of Computing and Information Systems. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINESPR$002509Springer$002bCollection$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300? 2024-05-26T12:43:06Z Semantic Applications Methodology, Technology, Corporate Use ent://SD_ILS/0/SD_ILS:2084451 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Hoppe, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-55433-3">https://doi.org/10.1007/978-3-662-55433-3</a><br/>Format:&#160;Electronic Resources<br/> Nordic Contributions in IS Research 9th Scandinavian Conference on Information Systems, SCIS 2018, Odder, Denmark, August 5&ndash;8, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084929 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;M&uuml;ller, Sune Dueholm. editor. (orcid)0000-0003-3194-0233<br/><a href="https://doi.org/10.1007/978-3-319-96367-9">https://doi.org/10.1007/978-3-319-96367-9</a><br/>Format:&#160;Electronic Resources<br/> Thinking-Driven Testing The Most Reasonable Approach to Quality Control ent://SD_ILS/0/SD_ILS:2084696 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Roman, Adam. author.<br/><a href="https://doi.org/10.1007/978-3-319-73195-7">https://doi.org/10.1007/978-3-319-73195-7</a><br/>Format:&#160;Electronic Resources<br/> Project Management at the Edge of Chaos Social Techniques for Complex Systems ent://SD_ILS/0/SD_ILS:2084698 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Oswald, Alfred. author.<br/><a href="https://doi.org/10.1007/978-3-662-48261-2">https://doi.org/10.1007/978-3-662-48261-2</a><br/>Format:&#160;Electronic Resources<br/> The Agile Safety Case ent://SD_ILS/0/SD_ILS:2084961 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Myklebust, Thor. author.<br/><a href="https://doi.org/10.1007/978-3-319-70265-0">https://doi.org/10.1007/978-3-319-70265-0</a><br/>Format:&#160;Electronic Resources<br/> Combinatorial Image Analysis 19th International Workshop, IWCIA 2018, Porto, Portugal, November 22&ndash;24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085281 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Barneva, Reneta P. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05288-1">https://doi.org/10.1007/978-3-030-05288-1</a><br/>Format:&#160;Electronic Resources<br/> Software Development Measurement Programs Development, Management and Evolution ent://SD_ILS/0/SD_ILS:2084991 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Staron, Miroslaw. author.<br/><a href="https://doi.org/10.1007/978-3-319-91836-5">https://doi.org/10.1007/978-3-319-91836-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085290 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/> Sailing Routes in the World of Computation 14th Conference on Computability in Europe, CiE 2018, Kiel, Germany, July 30 &ndash; August 3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085124 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Manea, Florin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94418-0">https://doi.org/10.1007/978-3-319-94418-0</a><br/>Format:&#160;Electronic Resources<br/> Applications and Usability of Interactive Television 6th Iberoamerican Conference, jAUTI 2017, Aveiro, Portugal, October 12-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084462 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ab&aacute;solo, Mar&iacute;a Jos&eacute;. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90170-1">https://doi.org/10.1007/978-3-319-90170-1</a><br/>Format:&#160;Electronic Resources<br/> Bidirectional Transformations International Summer School, Oxford, UK, July 25-29, 2016, Tutorial Lectures ent://SD_ILS/0/SD_ILS:2085641 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Gibbons, Jeremy. editor. (orcid)0000-0002-8426-9917<br/><a href="https://doi.org/10.1007/978-3-319-79108-1">https://doi.org/10.1007/978-3-319-79108-1</a><br/>Format:&#160;Electronic Resources<br/> Economic Models for Managing Cloud Services ent://SD_ILS/0/SD_ILS:2084899 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mistry, Sajib. author.<br/><a href="https://doi.org/10.1007/978-3-319-73876-5">https://doi.org/10.1007/978-3-319-73876-5</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085579 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format:&#160;Electronic Resources<br/> System Analysis and Modeling. Languages, Methods, and Tools for Systems Engineering 10th International Conference, SAM 2018, Copenhagen, Denmark, October 15&ndash;16, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085408 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Khendek, Ferhat. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01042-3">https://doi.org/10.1007/978-3-030-01042-3</a><br/>Format:&#160;Electronic Resources<br/> Towards Extensible and Adaptable Methods in Computing ent://SD_ILS/0/SD_ILS:2084410 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chakraverty, Shampa. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2348-5">https://doi.org/10.1007/978-981-13-2348-5</a><br/>Format:&#160;Electronic Resources<br/> Health Informatics on FHIR: How HL7's New API is Transforming Healthcare ent://SD_ILS/0/SD_ILS:2084247 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Braunstein, Mark L. author.<br/><a href="https://doi.org/10.1007/978-3-319-93414-3">https://doi.org/10.1007/978-3-319-93414-3</a><br/>Format:&#160;Electronic Resources<br/> Collaborative Networks of Cognitive Systems 19th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2018, Cardiff, UK, September 17-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084258 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Camarinha-Matos, Luis M. editor. (orcid)0000-0003-0594-1961<br/><a href="https://doi.org/10.1007/978-3-319-99127-6">https://doi.org/10.1007/978-3-319-99127-6</a><br/>Format:&#160;Electronic Resources<br/> Agile Methods 8th Brazilian Workshop, WBMA 2017, Bel&eacute;m, Brazil, September 13&ndash;14, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084185 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Santos, Viviane Almeida dos. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73673-0">https://doi.org/10.1007/978-3-319-73673-0</a><br/>Format:&#160;Electronic Resources<br/> Align Client and Provider Perspectives Best Practices in IT Outsourcing ent://SD_ILS/0/SD_ILS:2084189 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Haas, Lionel. author.<br/><a href="https://doi.org/10.1007/978-3-319-92064-1">https://doi.org/10.1007/978-3-319-92064-1</a><br/>Format:&#160;Electronic Resources<br/> Software Quality: Methods and Tools for Better Software and Systems 10th International Conference, SWQD 2018, Vienna, Austria, January 16&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084572 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Winkler, Dietmar. editor. (orcid)0000-0002-4743-3124<br/><a href="https://doi.org/10.1007/978-3-319-71440-0">https://doi.org/10.1007/978-3-319-71440-0</a><br/>Format:&#160;Electronic Resources<br/> Transforming the IT Services Lifecycle with AI Technologies ent://SD_ILS/0/SD_ILS:2084310 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kloeckner, Kristof. author.<br/><a href="https://doi.org/10.1007/978-3-319-94048-9">https://doi.org/10.1007/978-3-319-94048-9</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in China The Next Wave ent://SD_ILS/0/SD_ILS:2084118 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Austin, Greg. author.<br/><a href="https://doi.org/10.1007/978-3-319-68436-9">https://doi.org/10.1007/978-3-319-68436-9</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Games ent://SD_ILS/0/SD_ILS:2084501 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Xu, Lei. author.<br/><a href="https://doi.org/10.1007/978-3-319-77965-2">https://doi.org/10.1007/978-3-319-77965-2</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085523 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085117 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91638-5">https://doi.org/10.1007/978-3-319-91638-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086037 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91635-4">https://doi.org/10.1007/978-3-319-91635-4</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security: Power and Technology ent://SD_ILS/0/SD_ILS:2086980 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format:&#160;Electronic Resources<br/> Smart Cities Development and Governance Frameworks ent://SD_ILS/0/SD_ILS:2084450 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76669-0">https://doi.org/10.1007/978-3-319-76669-0</a><br/>Format:&#160;Electronic Resources<br/> Automated Invention for Smart Industries 18th International TRIZ Future Conference, TFC 2018, Strasbourg, France, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084181 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Cavallucci, Denis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02456-7">https://doi.org/10.1007/978-3-030-02456-7</a><br/>Format:&#160;Electronic Resources<br/> Systems, Software and Services Process Improvement 25th European Conference, EuroSPI 2018, Bilbao, Spain, September 5-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084211 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Larrucea, Xabier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97925-0">https://doi.org/10.1007/978-3-319-97925-0</a><br/>Format:&#160;Electronic Resources<br/> Software Processes and Life Cycle Models An Introduction to Modelling, Using and Managing Agile, Plan-Driven and Hybrid Processes ent://SD_ILS/0/SD_ILS:2084221 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kneuper, Ralf. author.<br/><a href="https://doi.org/10.1007/978-3-319-98845-0">https://doi.org/10.1007/978-3-319-98845-0</a><br/>Format:&#160;Electronic Resources<br/> IT Management The art of managing IT based on a solid framework leveraging the company&acute;s political ecosystem ent://SD_ILS/0/SD_ILS:2084662 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Pilorget, Lionel. author.<br/><a href="https://doi.org/10.1007/978-3-658-19309-6">https://doi.org/10.1007/978-3-658-19309-6</a><br/>Format:&#160;Electronic Resources<br/> The Essence of Software Engineering ent://SD_ILS/0/SD_ILS:2084663 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Gruhn, Volker. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73897-0">https://doi.org/10.1007/978-3-319-73897-0</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes in Software Engineering and Extreme Programming 19th International Conference, XP 2018, Porto, Portugal, May 21&ndash;25, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084483 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Garbajosa, Juan. editor. (orcid)0000-0003-0161-3485<br/><a href="https://doi.org/10.1007/978-3-319-91602-6">https://doi.org/10.1007/978-3-319-91602-6</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084797 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Matou&scaron;ek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/> Information Literacy in the Workplace 5th European Conference, ECIL 2017, Saint Malo, France, September 18-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084798 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74334-9">https://doi.org/10.1007/978-3-319-74334-9</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Modeling Facilitating the Process and the People ent://SD_ILS/0/SD_ILS:2084342 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Stirna, Janis. author. (orcid)0000-0002-3669-832X<br/><a href="https://doi.org/10.1007/978-3-319-94857-7">https://doi.org/10.1007/978-3-319-94857-7</a><br/>Format:&#160;Electronic Resources<br/> Software Business 9th International Conference, ICSOB 2018, Tallinn, Estonia, June 11&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084351 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Wnuk, Krzysztof. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04840-2">https://doi.org/10.1007/978-3-030-04840-2</a><br/>Format:&#160;Electronic Resources<br/> Information Technology - New Generations 14th International Conference on Information Technology ent://SD_ILS/0/SD_ILS:2087552 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54978-1">https://doi.org/10.1007/978-3-319-54978-1</a><br/>Format:&#160;Electronic Resources<br/> Crowdsourcing of Sensor Cloud Services ent://SD_ILS/0/SD_ILS:2084719 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ghari Neiat, Azadeh. author.<br/><a href="https://doi.org/10.1007/978-3-319-91536-4">https://doi.org/10.1007/978-3-319-91536-4</a><br/>Format:&#160;Electronic Resources<br/> Fog Computing Concepts, Frameworks and Technologies ent://SD_ILS/0/SD_ILS:2084983 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94890-4">https://doi.org/10.1007/978-3-319-94890-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085538 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement and Capability Determination 18th International Conference, SPICE 2018, Thessaloniki, Greece, October 9&ndash;10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084329 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Stamelos, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00623-5">https://doi.org/10.1007/978-3-030-00623-5</a><br/>Format:&#160;Electronic Resources<br/> A Knowledge Representation Practionary Guidelines Based on Charles Sanders Peirce ent://SD_ILS/0/SD_ILS:2084383 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Bergman, Michael K. author.<br/><a href="https://doi.org/10.1007/978-3-319-98092-8">https://doi.org/10.1007/978-3-319-98092-8</a><br/>Format:&#160;Electronic Resources<br/> Product Lifecycle Management to Support Industry 4.0 15th IFIP WG 5.1 International Conference, PLM 2018, Turin, Italy, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084353 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chiabert, Paolo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01614-2">https://doi.org/10.1007/978-3-030-01614-2</a><br/>Format:&#160;Electronic Resources<br/> Computer and Information Science ent://SD_ILS/0/SD_ILS:2088215 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lee, Roger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60170-0">https://doi.org/10.1007/978-3-319-60170-0</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the Eleventh International Conference on Management Science and Engineering Management ent://SD_ILS/0/SD_ILS:2088281 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Xu, Jiuping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59280-0">https://doi.org/10.1007/978-3-319-59280-0</a><br/>Format:&#160;Electronic Resources<br/> SafeScrum&reg; &ndash; Agile Development of Safety-Critical Software ent://SD_ILS/0/SD_ILS:2084273 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Hanssen, Geir Kjetil. author.<br/><a href="https://doi.org/10.1007/978-3-319-99334-8">https://doi.org/10.1007/978-3-319-99334-8</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Mobile Data Privacy ent://SD_ILS/0/SD_ILS:2084303 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format:&#160;Electronic Resources<br/> Graphics Recognition. Current Trends and Evolutions 12th IAPR International Workshop, GREC 2017, Kyoto, Japan, November 9-10, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085301 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Forn&eacute;s, Alicia. editor. (orcid)0000-0002-9692-5336<br/><a href="https://doi.org/10.1007/978-3-030-02284-6">https://doi.org/10.1007/978-3-030-02284-6</a><br/>Format:&#160;Electronic Resources<br/> The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? ent://SD_ILS/0/SD_ILS:2084901 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lysne, Olav. author.<br/><a href="https://doi.org/10.1007/978-3-319-74950-1">https://doi.org/10.1007/978-3-319-74950-1</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Services Science 5th International Conference, CLOSER 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084554 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Helfert, Markus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29582-4">https://doi.org/10.1007/978-3-319-29582-4</a><br/>Format:&#160;Electronic Resources<br/> Co-production in the Public Sector Experiences and Challenges ent://SD_ILS/0/SD_ILS:2084694 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Fugini, Mariagrazia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30558-5">https://doi.org/10.1007/978-3-319-30558-5</a><br/>Format:&#160;Electronic Resources<br/> Shared Services and Outsourcing: A Contemporary Outlook 10th Global Sourcing Workshop 2016, Val d'Is&egrave;re, France, February 16-19, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084846 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kotlarsky, Julia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47009-2">https://doi.org/10.1007/978-3-319-47009-2</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2085246 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format:&#160;Electronic Resources<br/> Managing Software Process Evolution Traditional, Agile and Beyond &ndash; How to Handle Process Change ent://SD_ILS/0/SD_ILS:2085010 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kuhrmann, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31545-4">https://doi.org/10.1007/978-3-319-31545-4</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebasti&aacute;n, Spain, July 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085015 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085089 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085768 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;La Rosa, Marcello. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45348-4">https://doi.org/10.1007/978-3-319-45348-4</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085928 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085962 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing &ndash; ICSOC 2015 Workshops WESOA, RMSOC, ISC, DISCO, WESE, BSCI, FOR-MOVES, Goa, India, November 16-19, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085868 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Norta, Alex. editor.<br/><a href="https://doi.org/10.1007/978-3-662-50539-7">https://doi.org/10.1007/978-3-662-50539-7</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Collective Intelligence XXV ent://SD_ILS/0/SD_ILS:2085718 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Nguyen, Ngoc Thanh. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53580-6">https://doi.org/10.1007/978-3-662-53580-6</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085726 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086153 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084839 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084941 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lorenz, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30142-6">https://doi.org/10.1007/978-3-319-30142-6</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes, in Software Engineering, and Extreme Programming 17th International Conference, XP 2016, Edinburgh, UK, May 24-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084602 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Sharp, Helen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33515-5">https://doi.org/10.1007/978-3-319-33515-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085230 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/> Social, Cultural, and Behavioral Modeling 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085231 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Xu, Kevin S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39931-7">https://doi.org/10.1007/978-3-319-39931-7</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085428 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085430 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085747 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085585 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085406 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085800 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 &ndash; September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085802 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085996 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mattoso, Marta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40593-3">https://doi.org/10.1007/978-3-319-40593-3</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086003 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Sheng, Quan Z. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46295-0">https://doi.org/10.1007/978-3-319-46295-0</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086186 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format:&#160;Electronic Resources<br/> Evaluation of Novel Approaches to Software Engineering 10th International Conference, ENASE 2015, Barcelona, Spain, April 29&ndash;30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084414 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30243-0">https://doi.org/10.1007/978-3-319-30243-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084254 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format:&#160;Electronic Resources<br/> Software Quality. The Future of Systems- and Software Development 8th International Conference, SWQD 2016, Vienna, Austria, January 18-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084438 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Winkler, Dietmar. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27033-3">https://doi.org/10.1007/978-3-319-27033-3</a><br/>Format:&#160;Electronic Resources<br/> Pragmatic Evaluation of Software Architectures ent://SD_ILS/0/SD_ILS:2084761 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Knodel, Jens. author.<br/><a href="https://doi.org/10.1007/978-3-319-34177-4">https://doi.org/10.1007/978-3-319-34177-4</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement and Capability Determination 16th International Conference, SPICE 2016, Dublin, Ireland, June 9-10, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084674 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Clarke, Paul M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38980-6">https://doi.org/10.1007/978-3-319-38980-6</a><br/>Format:&#160;Electronic Resources<br/> Collaboration in a Hyperconnected World 17th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2016, Porto, Portugal, October 3-5, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084842 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Afsarmanesh, Hamideh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45390-3">https://doi.org/10.1007/978-3-319-45390-3</a><br/>Format:&#160;Electronic Resources<br/> Beyond Interpretivism? New Encounters with Technology and Organization IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&amp;O 2016, Dublin, Ireland, December 9-10, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084843 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Introna, Lucas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49733-4">https://doi.org/10.1007/978-3-319-49733-4</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084716 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085735 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085736 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085737 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Network Science 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085549 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Wierzbicki, Adam. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28361-6">https://doi.org/10.1007/978-3-319-28361-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26&ndash;27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085465 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085676 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Modularity and Composition I ent://SD_ILS/0/SD_ILS:2085831 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chiba, Shigeru. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46969-0">https://doi.org/10.1007/978-3-319-46969-0</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085840 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Yang, Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42836-9">https://doi.org/10.1007/978-3-319-42836-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085685 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 &ndash; December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085698 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20&ndash;22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085953 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format:&#160;Electronic Resources<br/> FM 2016: Formal Methods 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085958 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Fitzgerald, John. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48989-6">https://doi.org/10.1007/978-3-319-48989-6</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085980 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086143 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086144 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format:&#160;Electronic Resources<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:2086154 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/> Formal Methods: Foundations and Applications 18th Brazilian Symposium, SBMF 2015, Belo Horizonte, Brazil, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2086155 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Corn&eacute;lio, M&aacute;rcio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29473-5">https://doi.org/10.1007/978-3-319-29473-5</a><br/>Format:&#160;Electronic Resources<br/> Mobility Management Principle, Technology and Applications ent://SD_ILS/0/SD_ILS:2086565 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chen, Shanzhi. author.<br/><a href="https://doi.org/10.1007/978-3-662-52726-9">https://doi.org/10.1007/978-3-662-52726-9</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering for Resilient Systems 8th International Workshop, SERENE 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085898 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Crnkovic, Ivica. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45892-2">https://doi.org/10.1007/978-3-319-45892-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086059 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21&ndash;22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086062 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;B&eacute;cue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2086063 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Logistics and Supply Chain Innovation Bridging the Gap between Theory and Practice ent://SD_ILS/0/SD_ILS:2086692 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Zijm, Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-22288-2">https://doi.org/10.1007/978-3-319-22288-2</a><br/>Format:&#160;Electronic Resources<br/> Social Media: The Good, the Bad, and the Ugly 15th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2016, Swansea, UK, September 13&ndash;15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085196 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Dwivedi, Yogesh K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45234-0">https://doi.org/10.1007/978-3-319-45234-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086099 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Technology ent://SD_ILS/0/SD_ILS:2084089 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Castillo, Francisco. author.<br/><a href="https://doi.org/10.1007/978-3-319-38891-5">https://doi.org/10.1007/978-3-319-38891-5</a><br/>Format:&#160;Electronic Resources<br/> Tamed Agility Pragmatic Contracting and Collaboration in Agile Software Projects ent://SD_ILS/0/SD_ILS:2084768 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Book, Matthias. author.<br/><a href="https://doi.org/10.1007/978-3-319-41478-2">https://doi.org/10.1007/978-3-319-41478-2</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084777 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085238 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085256 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format:&#160;Electronic Resources<br/> Software Architecture 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085260 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Tekinerdogan, Bedir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48992-6">https://doi.org/10.1007/978-3-319-48992-6</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 17th International Conference, PROFES 2016, Trondheim, Norway, November 22-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085262 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Abrahamsson, Pekka. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49094-6">https://doi.org/10.1007/978-3-319-49094-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Multimedia and Ubiquitous Engineering FutureTech &amp; MUE ent://SD_ILS/0/SD_ILS:2084036 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-1536-6">https://doi.org/10.1007/978-981-10-1536-6</a><br/>Format:&#160;Electronic Resources<br/> Modeling with UML Language, Concepts, Methods ent://SD_ILS/0/SD_ILS:2084741 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Rumpe, Bernhard. author.<br/><a href="https://doi.org/10.1007/978-3-319-33933-7">https://doi.org/10.1007/978-3-319-33933-7</a><br/>Format:&#160;Electronic Resources<br/> Guide to Software Development Designing and Managing the Life Cycle ent://SD_ILS/0/SD_ILS:2084770 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Langer, Arthur M. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6799-0">https://doi.org/10.1007/978-1-4471-6799-0</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084105 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format:&#160;Electronic Resources<br/> Product Lifecycle Management for Digital Transformation of Industries 13th IFIP WG 5.1 International Conference, PLM 2016, Columbia, SC, USA, July 11-13, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084108 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Harik, Ramy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54660-5">https://doi.org/10.1007/978-3-319-54660-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computing Applications ent://SD_ILS/0/SD_ILS:2084474 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chakrabarti, Amlan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2630-0">https://doi.org/10.1007/978-981-10-2630-0</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085036 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format:&#160;Electronic Resources<br/> Evaluation of Novel Approaches to Software Engineering 11th International Conference, ENASE 2016, Rome, Italy, April 27&ndash;28, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084367 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56390-9">https://doi.org/10.1007/978-3-319-56390-9</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Foundations for Mastering Change I ent://SD_ILS/0/SD_ILS:2086117 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Steffen, Bernhard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46508-1">https://doi.org/10.1007/978-3-319-46508-1</a><br/>Format:&#160;Electronic Resources<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086126 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085439 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085443 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format:&#160;Electronic Resources<br/> Systems, Software and Services Process Improvement 23rd European Conference, EuroSPI 2016, Graz, Austria, September 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084885 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kreiner, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44817-6">https://doi.org/10.1007/978-3-319-44817-6</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085732 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/> Open Source Systems: Integrating Communities 12th IFIP WG 2.13 International Conference, OSS 2016, Gothenburg, Sweden, May 30 - June 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084999 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Crowston, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39225-7">https://doi.org/10.1007/978-3-319-39225-7</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085016 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects of Component Software 12th International Conference, FACS 2015, Niter&oacute;i, Brazil, October 14-16, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085786 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Braga, Christiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28934-2">https://doi.org/10.1007/978-3-319-28934-2</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085709 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085713 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Standaert, Fran&ccedil;ois-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086006 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085887 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5&ndash;6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085888 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2086079 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086087 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086095 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Interoperability VII Enterprise Interoperability in the Digitized and Networked Factory of the Future ent://SD_ILS/0/SD_ILS:2087694 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mertins, Kai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30957-6">https://doi.org/10.1007/978-3-319-30957-6</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086208 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kő, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44159-7">https://doi.org/10.1007/978-3-319-44159-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085704 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/> Web Services, Formal Methods, and Behavioral Types 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086078 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Hildebrandt, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33612-1">https://doi.org/10.1007/978-3-319-33612-1</a><br/>Format:&#160;Electronic Resources<br/> Computer and Information Science ent://SD_ILS/0/SD_ILS:2087306 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lee, Roger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40171-3">https://doi.org/10.1007/978-3-319-40171-3</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 22nd International Working Conference, REFSQ 2016, Gothenburg, Sweden, March 14-17, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085701 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Daneva, Maya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30282-9">https://doi.org/10.1007/978-3-319-30282-9</a><br/>Format:&#160;Electronic Resources<br/> Formal SQL Tuning for Oracle Databases Practical Efficiency - Efficient Practice ent://SD_ILS/0/SD_ILS:2084365 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Nossov, Leonid. author.<br/><a href="https://doi.org/10.1007/978-3-662-50417-8">https://doi.org/10.1007/978-3-662-50417-8</a><br/>Format:&#160;Electronic Resources<br/> Information Technology for Management Federated Conference on Computer Science and Information Systems, ISM 2015 and AITM 2015, Lodz, Poland, September 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084334 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ziemba, Ewa. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30528-8">https://doi.org/10.1007/978-3-319-30528-8</a><br/>Format:&#160;Electronic Resources<br/> Product Lifecycle Management in the Era of Internet of Things 12th IFIP WG 5.1 International Conference, PLM 2015, Doha, Qatar, October 19-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084174 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Bouras, Abdelaziz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33111-9">https://doi.org/10.1007/978-3-319-33111-9</a><br/>Format:&#160;Electronic Resources<br/> Data Science and Big Data Computing Frameworks and Methodologies ent://SD_ILS/0/SD_ILS:2084874 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31861-5">https://doi.org/10.1007/978-3-319-31861-5</a><br/>Format:&#160;Electronic Resources<br/> Testing Software and Systems 28th IFIP WG 6.1 International Conference, ICTSS 2016, Graz, Austria, October 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085441 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47443-4">https://doi.org/10.1007/978-3-319-47443-4</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21&ndash;22, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085728 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085729 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2&ndash;8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085744 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085745 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085082 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/> System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085087 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Grabowski, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46613-2">https://doi.org/10.1007/978-3-319-46613-2</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085095 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Madsen, Tatiana K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51376-8">https://doi.org/10.1007/978-3-319-51376-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085097 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format:&#160;Electronic Resources<br/> Model and Data Engineering 6th International Conference, MEDI 2016, Almer&iacute;a, Spain, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085614 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Bellatreche, Ladjel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45547-1">https://doi.org/10.1007/978-3-319-45547-1</a><br/>Format:&#160;Electronic Resources<br/> Formal Methods: Foundations and Applications 19th Brazilian Symposium, SBMF 2016, Natal, Brazil, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085618 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ribeiro, Leila. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49815-7">https://doi.org/10.1007/978-3-319-49815-7</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:2085858 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/> Mathematical and Engineering Methods in Computer Science 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23&ndash;25, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085525 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kofroň, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29817-7">https://doi.org/10.1007/978-3-319-29817-7</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7&ndash;9, 2015, Proceedings ent://SD_ILS/0/SD_ILS:2085526 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format:&#160;Electronic Resources<br/> Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085986 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Badonnel, R&eacute;mi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085812 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086158 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format:&#160;Electronic Resources<br/> Modelling Foundations and Applications 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085820 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Wąsowski, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42061-5">https://doi.org/10.1007/978-3-319-42061-5</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086066 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086070 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format:&#160;Electronic Resources<br/> Modelling Autonomic Communications Environments Third IEEE International Workshop, MACE 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503679 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Meer, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87355-6">http://dx.doi.org/10.1007/978-3-540-87355-6</a><br/>Format:&#160;Electronic Resources<br/> Modelling, Computation and Optimization in Information Systems and Management Sciences Second International Conference MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503692 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Le Thi, Hoai An. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87477-5">http://dx.doi.org/10.1007/978-3-540-87477-5</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503586 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503600 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format:&#160;Electronic Resources<br/> Data Management in Grid and Peer-to-Peer Systems First International Conference, Globe 2008, Turin, Italy, September 3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503601 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85176-9">http://dx.doi.org/10.1007/978-3-540-85176-9</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503605 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503649 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503650 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format:&#160;Electronic Resources<br/> Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503678 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503789 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format:&#160;Electronic Resources<br/> Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502620 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502623 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format:&#160;Electronic Resources<br/> The IT Measurement Compendium Estimating and Benchmarking Success with Functional Size Measurement ent://SD_ILS/0/SD_ILS:502627 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Bundschuh, Manfred. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68188-5">http://dx.doi.org/10.1007/978-3-540-68188-5</a><br/>Format:&#160;Electronic Resources<br/> Requirements Management The Interface Between Requirements Development and All Other Systems Engineering Processes ent://SD_ILS/0/SD_ILS:502646 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Hood, Colin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68476-3">http://dx.doi.org/10.1007/978-3-540-68476-3</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 14th International Working Conference, REFSQ 2008 Montpellier, France, June 16-17, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502704 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Paech, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69062-7">http://dx.doi.org/10.1007/978-3-540-69062-7</a><br/>Format:&#160;Electronic Resources<br/> Models in Software Engineering Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papers ent://SD_ILS/0/SD_ILS:502706 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Giese, Holger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69073-3">http://dx.doi.org/10.1007/978-3-540-69073-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25&ndash;27, 2008 ent://SD_ILS/0/SD_ILS:501523 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format:&#160;Electronic Resources<br/> Resources, Co-Evolution and Artifacts Theory in CSCW ent://SD_ILS/0/SD_ILS:502435 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ackerman, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-901-9">http://dx.doi.org/10.1007/978-1-84628-901-9</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Architecture &ndash; Foundations and Applications 4th European Conference, ECMDA-FA 2008, Berlin, Germany, June 9-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502709 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Schieferdecker, Ina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69100-6">http://dx.doi.org/10.1007/978-3-540-69100-6</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502812 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format:&#160;Electronic Resources<br/> Guide to Advanced Empirical Software Engineering ent://SD_ILS/0/SD_ILS:502468 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Shull, Forrest. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-044-5">http://dx.doi.org/10.1007/978-1-84800-044-5</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2008 &ndash; Object-Oriented Programming 22nd European Conference Paphos, Cyprus, July 7-11, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502820 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Vitek, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70592-5">http://dx.doi.org/10.1007/978-3-540-70592-5</a><br/>Format:&#160;Electronic Resources<br/> Model-Driven Testing ent://SD_ILS/0/SD_ILS:502892 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Baker, Paul. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72563-3">http://dx.doi.org/10.1007/978-3-540-72563-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503818 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Collaborative Networks IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES, September 8-10, 2008, Poznan, Poland ent://SD_ILS/0/SD_ILS:501998 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-84837-2">http://dx.doi.org/10.1007/978-0-387-84837-2</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503839 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503843 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503846 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format:&#160;Electronic Resources<br/> Web Services and Formal Methods 4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:503496 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79230-7">http://dx.doi.org/10.1007/978-3-540-79230-7</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2008 The Cryptographers&rsquo; Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503503 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security III ent://SD_ILS/0/SD_ILS:502699 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format:&#160;Electronic Resources<br/> Open Source Development, Communities and Quality IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501543 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Russo, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09684-1">http://dx.doi.org/10.1007/978-0-387-09684-1</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501546 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Methods for Inconsistent Knowledge Management ent://SD_ILS/0/SD_ILS:502434 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format:&#160;Electronic Resources<br/> Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502750 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format:&#160;Electronic Resources<br/> The Open Knowlege Society. A Computer Science and Information Systems Manifesto First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503718 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87783-7">http://dx.doi.org/10.1007/978-3-540-87783-7</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503719 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503387 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/> Formal Methods and Testing An Outcome of the FORTEST Network, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503449 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Hierons, Robert M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78917-8">http://dx.doi.org/10.1007/978-3-540-78917-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503821 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Electronic Resources<br/> IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503680 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503684 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Interoperability III New Challenges and Industrial Approaches ent://SD_ILS/0/SD_ILS:502525 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mertins, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-221-0">http://dx.doi.org/10.1007/978-1-84800-221-0</a><br/>Format:&#160;Electronic Resources<br/> Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 ent://SD_ILS/0/SD_ILS:501939 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Leeuw, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502756 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format:&#160;Electronic Resources<br/> Object-Oriented Technology. ECOOP 2007 Workshop Reader ECOOP 2007 Workshops, Berlin, Germany, July 30-31, 2007, Final Reports ent://SD_ILS/0/SD_ILS:503335 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Cebulla, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78195-0">http://dx.doi.org/10.1007/978-3-540-78195-0</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management Workshops BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503339 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Hofstede, Arthur. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78238-4">http://dx.doi.org/10.1007/978-3-540-78238-4</a><br/>Format:&#160;Electronic Resources<br/> Objects, Components, Models and Patterns 46th International Conference, TOOLS EUROPE 2008, Zurich, Switzerland, June 30 - July 4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502777 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Paige, Richard F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69824-1">http://dx.doi.org/10.1007/978-3-540-69824-1</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks in Pattern Recognition Third IAPR Workshop, ANNPR 2008 Paris, France, July 2-4, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502791 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Prevost, Lionel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69939-2">http://dx.doi.org/10.1007/978-3-540-69939-2</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502803 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503610 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503372 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503708 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies and Information Systems for the Knowledge Society First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503717 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87781-3">http://dx.doi.org/10.1007/978-3-540-87781-3</a><br/>Format:&#160;Electronic Resources<br/> Balancing Agility and Formalism in Software Engineering Second IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2007, Poznan, Poland, October 10-12, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503615 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85279-7">http://dx.doi.org/10.1007/978-3-540-85279-7</a><br/>Format:&#160;Electronic Resources<br/> Software Process and Product Measurement International Conferences IWSM 2008, Metrikon 2008, and Mensura 2008 Munich, Germany, November 18-19, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503809 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Dumke, Reiner R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89403-2">http://dx.doi.org/10.1007/978-3-540-89403-2</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Engineering Languages and Systems 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503724 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Czarnecki, Krzysztof. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87875-9">http://dx.doi.org/10.1007/978-3-540-87875-9</a><br/>Format:&#160;Electronic Resources<br/> Biosurveillance and Biosecurity International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503831 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89746-0">http://dx.doi.org/10.1007/978-3-540-89746-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503832 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format:&#160;Electronic Resources<br/> Principles of Distributed Systems 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503857 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Baker, Theodore P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92221-6">http://dx.doi.org/10.1007/978-3-540-92221-6</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503753 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 9th International Conference, PROFES 2008 Monte Porzio Catone, Italy, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502764 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Jedlitschka, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69566-0">http://dx.doi.org/10.1007/978-3-540-69566-0</a><br/>Format:&#160;Electronic Resources<br/> Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502818 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502827 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502730 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format:&#160;Electronic Resources<br/> Rightshore! Successfully SAP(R) Projects Offshore ent://SD_ILS/0/SD_ILS:503226 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Messner, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77288-0">http://dx.doi.org/10.1007/978-3-540-77288-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502793 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/> Active Knowledge Modeling of Enterprises ent://SD_ILS/0/SD_ILS:503519 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lillehagen, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79416-5">http://dx.doi.org/10.1007/978-3-540-79416-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503375 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format:&#160;Electronic Resources<br/> TestGoal Result-Driven Testing ent://SD_ILS/0/SD_ILS:503439 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;De Grood, Derk-Jan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78829-4">http://dx.doi.org/10.1007/978-3-540-78829-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503533 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, M&aacute;laga, Spain, October 3-5, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:503793 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format:&#160;Electronic Resources<br/> The Practice of Enterprise Modeling First IFIP WG 8.1 Working Conference, PoEM 2008, Stockholm, Sweden, November 12-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503796 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Stirna, Janis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89218-2">http://dx.doi.org/10.1007/978-3-540-89218-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503800 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503805 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kulkarni, Sandeep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89335-6">http://dx.doi.org/10.1007/978-3-540-89335-6</a><br/>Format:&#160;Electronic Resources<br/> Testing of Software and Communicating Systems 20th IFIP TC 6/WG 6.1 International Conference, TestCom 2008 8th International Workshop, FATES 2008 Tokyo, Japan, June 10-13, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502652 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Suzuki, Kenji. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68524-1">http://dx.doi.org/10.1007/978-3-540-68524-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection II ent://SD_ILS/0/SD_ILS:502009 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format:&#160;Electronic Resources<br/> Itil&reg; Version 3 at a Glance Information Quick Reference ent://SD_ILS/0/SD_ILS:501918 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Long, John O. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77393-3">http://dx.doi.org/10.1007/978-0-387-77393-3</a><br/>Format:&#160;Electronic Resources<br/> High Confidence Software Reuse in Large Systems 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502613 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mei, Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68073-4">http://dx.doi.org/10.1007/978-3-540-68073-4</a><br/>Format:&#160;Electronic Resources<br/> FM 2008: Formal Methods 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502633 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68237-0">http://dx.doi.org/10.1007/978-3-540-68237-0</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes in Software Engineering and Extreme Programming 9th International Conference, XP 2008, Limerick, Ireland, June 10-14, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502634 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68255-4">http://dx.doi.org/10.1007/978-3-540-68255-4</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technologies &ndash; Ada-Europe 2008 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502662 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kordon, Fabrice. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68624-8">http://dx.doi.org/10.1007/978-3-540-68624-8</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502691 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/> Software Evolution ent://SD_ILS/0/SD_ILS:503172 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Mens, Tom. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76440-3">http://dx.doi.org/10.1007/978-3-540-76440-3</a><br/>Format:&#160;Electronic Resources<br/> Rationale-Based Software Engineering ent://SD_ILS/0/SD_ILS:503270 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Burge, Janet E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77583-6">http://dx.doi.org/10.1007/978-3-540-77583-6</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503613 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503455 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part II ent://SD_ILS/0/SD_ILS:503637 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85565-1">http://dx.doi.org/10.1007/978-3-540-85565-1</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part III ent://SD_ILS/0/SD_ILS:503638 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85567-5">http://dx.doi.org/10.1007/978-3-540-85567-5</a><br/>Format:&#160;Electronic Resources<br/> Software Process and Product Measurement International Conference, IWSM-Mensura 2007, Palma de Mallorca, Spain, November 5-8, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:503634 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Cuadrado-Gallego, Juan J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85553-8">http://dx.doi.org/10.1007/978-3-540-85553-8</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part I ent://SD_ILS/0/SD_ILS:503636 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85563-7">http://dx.doi.org/10.1007/978-3-540-85563-7</a><br/>Format:&#160;Electronic Resources<br/> Making Globally Distributed Software Development a Success Story International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503544 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79588-9">http://dx.doi.org/10.1007/978-3-540-79588-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503749 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503481 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format:&#160;Electronic Resources<br/> Emerging Web Services Technology, Volume II ent://SD_ILS/0/SD_ILS:503942 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Gschwind, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8864-5">http://dx.doi.org/10.1007/978-3-7643-8864-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503563 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503660 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503664 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format:&#160;Electronic Resources<br/> Spatial Database Systems Design, Implementation and Project Management ent://SD_ILS/0/SD_ILS:507259 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Yeung, Albert K. W. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5392-4">http://dx.doi.org/10.1007/1-4020-5392-4</a><br/>Format:&#160;Electronic Resources<br/> Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512528 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technologies &ndash; Ada Europe 2007 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512621 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Abdennadher, Nabil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73230-3">http://dx.doi.org/10.1007/978-3-540-73230-3</a><br/>Format:&#160;Electronic Resources<br/> Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512623 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format:&#160;Electronic Resources<br/> Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda IFIP TC 8 WG 8.6 International Working Conference, June 14&ndash;16, Manchester, UK ent://SD_ILS/0/SD_ILS:506005 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;McMaster, Tom. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72804-9">http://dx.doi.org/10.1007/978-0-387-72804-9</a><br/>Format:&#160;Electronic Resources<br/> Software Product Lines in Action The Best Industrial Practice in Product Line Engineering ent://SD_ILS/0/SD_ILS:512341 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Linden, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71437-8">http://dx.doi.org/10.1007/978-3-540-71437-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512825 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Paillier, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512362 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 13th International Working Conference, REFSQ 2007, Trondheim, Norway, June 11-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512581 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Sawyer, Pete. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73031-6">http://dx.doi.org/10.1007/978-3-540-73031-6</a><br/>Format:&#160;Electronic Resources<br/> Software Measurement Establish &mdash; Extract &mdash; Evaluate &mdash; Execute ent://SD_ILS/0/SD_ILS:512378 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Ebert, Christof. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71649-5">http://dx.doi.org/10.1007/978-3-540-71649-5</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512381 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/> Testing of Software and Communicating Systems 19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallinn, Estonia, June 26-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512589 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Petrenko, Alexandre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73066-8">http://dx.doi.org/10.1007/978-3-540-73066-8</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II ent://SD_ILS/0/SD_ILS:512843 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74827-4">http://dx.doi.org/10.1007/978-3-540-74827-4</a><br/>Format:&#160;Electronic Resources<br/> Rapid Integration of Software Engineering Techniques Third International Workshop, RISE 2006, Geneva, Switzerland, September 13-15, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512402 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71876-5">http://dx.doi.org/10.1007/978-3-540-71876-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 &mdash; 26, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512846 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format:&#160;Electronic Resources<br/> Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512429 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512793 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512902 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75381-0">http://dx.doi.org/10.1007/978-3-540-75381-0</a><br/>Format:&#160;Electronic Resources<br/> Digital Decision Making Back to the Future ent://SD_ILS/0/SD_ILS:508632 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Corrigan, Ray. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-673-5">http://dx.doi.org/10.1007/978-1-84628-673-5</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Action Research An Applied View of Emerging Concepts and Methods ent://SD_ILS/0/SD_ILS:505403 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Kock, Ned. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36060-7">http://dx.doi.org/10.1007/978-0-387-36060-7</a><br/>Format:&#160;Electronic Resources<br/> Business Intelligence for the Real-Time Enterprises First International Workshop, BIRTE 2006, Seoul, Korea, September 11, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512739 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73950-0">http://dx.doi.org/10.1007/978-3-540-73950-0</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lectures ent://SD_ILS/0/SD_ILS:512837 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Interoperability II New Challenges and Approaches ent://SD_ILS/0/SD_ILS:508702 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Gon&ccedil;alves, Ricardo J. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-858-6">http://dx.doi.org/10.1007/978-1-84628-858-6</a><br/>Format:&#160;Electronic Resources<br/> Guerrilla Capacity Planning A Tactical Approach to Planning for Highly Scalable Applications and Services ent://SD_ILS/0/SD_ILS:509840 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Gunther, Neil J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31010-5">http://dx.doi.org/10.1007/978-3-540-31010-5</a><br/>Format:&#160;Electronic Resources<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:511672 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Electronic Resources<br/> Preserving Digital Information ent://SD_ILS/0/SD_ILS:511579 2024-05-26T12:43:06Z 2024-05-26T12:43:06Z by&#160;Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format:&#160;Electronic Resources<br/>