Search Results for - Narrowed by: 2005 - Applications of Mathematics. - Computer science.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Subject$002509Applications$002bof$002bMathematics.$002509Applications$002bof$002bMathematics.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ps$003d300?2024-09-26T00:36:32ZContemporary Cryptologyent://SD_ILS/0/SD_ILS:5130992024-09-26T00:36:32Z2024-09-26T00:36:32Zby Catalano, Dario. author.<br/><a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format: Electronic Resources<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:5041782024-09-26T00:36:32Z2024-09-26T00:36:32Zby Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Geometric Fundamentals of Roboticsent://SD_ILS/0/SD_ILS:5046122024-09-26T00:36:32Z2024-09-26T00:36:32Zby Selig, J. M. author.<br/><a href="http://dx.doi.org/10.1007/b138859">http://dx.doi.org/10.1007/b138859</a><br/>Format: Electronic Resources<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:5044252024-09-26T00:36:32Z2024-09-26T00:36:32Zby Sasaki, Ryoichi. editor.<br/><a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Relaxation and Decomposition Methods for Mixed Integer Nonlinear Programmingent://SD_ILS/0/SD_ILS:5130842024-09-26T00:36:32Z2024-09-26T00:36:32Zby Nowak, Ivo. author.<br/><a href="http://dx.doi.org/10.1007/3-7643-7374-1">http://dx.doi.org/10.1007/3-7643-7374-1</a><br/>Format: Electronic Resources<br/>Discrete, Continuous, and Hybrid Petri Netsent://SD_ILS/0/SD_ILS:5090002024-09-26T00:36:32Z2024-09-26T00:36:32Zby David, René. author.<br/><a href="http://dx.doi.org/10.1007/b138130">http://dx.doi.org/10.1007/b138130</a><br/>Format: Electronic Resources<br/>Comprehensive Mathematics for Computer Scientists 2 Calculus and ODEs, Splines, Probability, Fourier and Wavelet Theory, Fractals and Neural Networks, Categories and Lambda Calculusent://SD_ILS/0/SD_ILS:5090462024-09-26T00:36:32Z2024-09-26T00:36:32Zby Mazzola, Guerino. author.<br/><a href="http://dx.doi.org/10.1007/b138337">http://dx.doi.org/10.1007/b138337</a><br/>Format: Electronic Resources<br/>Hierarchical Bayesian Optimization Algorithm Toward a new Generation of Evolutionary Algorithmsent://SD_ILS/0/SD_ILS:5106002024-09-26T00:36:32Z2024-09-26T00:36:32Zby Pelikan, Martin. author.<br/><a href="http://dx.doi.org/10.1007/b10910">http://dx.doi.org/10.1007/b10910</a><br/>Format: Electronic Resources<br/>Computational Electromagneticsent://SD_ILS/0/SD_ILS:5044962024-09-26T00:36:32Z2024-09-26T00:36:32Zby Bondeson, Anders. author.<br/><a href="http://dx.doi.org/10.1007/b136922">http://dx.doi.org/10.1007/b136922</a><br/>Format: Electronic Resources<br/>