Search Results for - Narrowed by: 2007 - Management of Computing and Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092007$0025092007$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300$0026isd$003dtrue?2024-09-26T15:21:19ZNetwork-Centric Service-Oriented Enterpriseent://SD_ILS/0/SD_ILS:5076512024-09-26T15:21:19Z2024-09-26T15:21:19Zby Chang, William Y. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-6456-2">http://dx.doi.org/10.1007/978-1-4020-6456-2</a><br/>Format: Electronic Resources<br/>Information Systems Action Research An Applied View of Emerging Concepts and Methodsent://SD_ILS/0/SD_ILS:5054032024-09-26T15:21:19Z2024-09-26T15:21:19Zby Kock, Ned. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36060-7">http://dx.doi.org/10.1007/978-0-387-36060-7</a><br/>Format: Electronic Resources<br/>EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UKent://SD_ILS/0/SD_ILS:5086642024-09-26T15:21:19Z2024-09-26T15:21:19Zby Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-750-3">http://dx.doi.org/10.1007/978-1-84628-750-3</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part IIent://SD_ILS/0/SD_ILS:5128432024-09-26T15:21:19Z2024-09-26T15:21:19Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74827-4">http://dx.doi.org/10.1007/978-3-540-74827-4</a><br/>Format: Electronic Resources<br/>Grid Computing Securityent://SD_ILS/0/SD_ILS:5116722024-09-26T15:21:19Z2024-09-26T15:21:19Zby Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format: Electronic Resources<br/>Preserving Digital Informationent://SD_ILS/0/SD_ILS:5115792024-09-26T15:21:19Z2024-09-26T15:21:19Zby Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format: Electronic Resources<br/>Software Measurement Establish — Extract — Evaluate — Executeent://SD_ILS/0/SD_ILS:5123782024-09-26T15:21:19Z2024-09-26T15:21:19Zby Ebert, Christof. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71649-5">http://dx.doi.org/10.1007/978-3-540-71649-5</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 13th International Working Conference, REFSQ 2007, Trondheim, Norway, June 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125812024-09-26T15:21:19Z2024-09-26T15:21:19Zby Sawyer, Pete. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73031-6">http://dx.doi.org/10.1007/978-3-540-73031-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-09-26T15:21:19Z2024-09-26T15:21:19Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Early Aspects: Current Challenges and Future Directions 10th International Workshop, Vancouver, Canada, March 13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5129772024-09-26T15:21:19Z2024-09-26T15:21:19Zby Moreira, Ana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76811-1">http://dx.doi.org/10.1007/978-3-540-76811-1</a><br/>Format: Electronic Resources<br/>Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papersent://SD_ILS/0/SD_ILS:5123522024-09-26T15:21:19Z2024-09-26T15:21:19Zby Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5128882024-09-26T15:21:19Z2024-09-26T15:21:19Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format: Electronic Resources<br/>Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126232024-09-26T15:21:19Z2024-09-26T15:21:19Zby Schuler, Douglas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73257-0">http://dx.doi.org/10.1007/978-3-540-73257-0</a><br/>Format: Electronic Resources<br/>Models in Software Engineering Workshops and Symposia at MoDELS 2006, Genoa, Italy, October 1-6, 2006, Reports and Revised Selected Papersent://SD_ILS/0/SD_ILS:5121642024-09-26T15:21:19Z2024-09-26T15:21:19Zby Kühne, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69489-2">http://dx.doi.org/10.1007/978-3-540-69489-2</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123622024-09-26T15:21:19Z2024-09-26T15:21:19Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format: Electronic Resources<br/>Rapid Integration of Software Engineering Techniques Third International Workshop, RISE 2006, Geneva, Switzerland, September 13-15, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5124022024-09-26T15:21:19Z2024-09-26T15:21:19Zby Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71876-5">http://dx.doi.org/10.1007/978-3-540-71876-5</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126602024-09-26T15:21:19Z2024-09-26T15:21:19Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125042024-09-26T15:21:19Z2024-09-26T15:21:19Zby Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72608-1">http://dx.doi.org/10.1007/978-3-540-72608-1</a><br/>Format: Electronic Resources<br/>Digital Decision Making Back to the Futureent://SD_ILS/0/SD_ILS:5086322024-09-26T15:21:19Z2024-09-26T15:21:19Zby Corrigan, Ray. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-673-5">http://dx.doi.org/10.1007/978-1-84628-673-5</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability II New Challenges and Approachesent://SD_ILS/0/SD_ILS:5087022024-09-26T15:21:19Z2024-09-26T15:21:19Zby Gonçalves, Ricardo J. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-858-6">http://dx.doi.org/10.1007/978-1-84628-858-6</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability New Challenges and Approachesent://SD_ILS/0/SD_ILS:5086492024-09-26T15:21:19Z2024-09-26T15:21:19Zby Doumeingts, Guy. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-714-5">http://dx.doi.org/10.1007/978-1-84628-714-5</a><br/>Format: Electronic Resources<br/>Metagraphs and Their Applicationsent://SD_ILS/0/SD_ILS:5054722024-09-26T15:21:19Z2024-09-26T15:21:19Zby Basu, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-37234-1">http://dx.doi.org/10.1007/978-0-387-37234-1</a><br/>Format: Electronic Resources<br/>Spatial Database Systems Design, Implementation and Project Managementent://SD_ILS/0/SD_ILS:5072592024-09-26T15:21:19Z2024-09-26T15:21:19Zby Yeung, Albert K. W. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5392-4">http://dx.doi.org/10.1007/1-4020-5392-4</a><br/>Format: Electronic Resources<br/>Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda IFIP TC 8 WG 8.6 International Working Conference, June 14–16, Manchester, UKent://SD_ILS/0/SD_ILS:5060052024-09-26T15:21:19Z2024-09-26T15:21:19Zby McMaster, Tom. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72804-9">http://dx.doi.org/10.1007/978-0-387-72804-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5122482024-09-26T15:21:19Z2024-09-26T15:21:19Zby Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130042024-09-26T15:21:19Z2024-09-26T15:21:19Zby Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77048-0">http://dx.doi.org/10.1007/978-3-540-77048-0</a><br/>Format: Electronic Resources<br/>Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130172024-09-26T15:21:19Z2024-09-26T15:21:19Zby Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">http://dx.doi.org/10.1007/978-3-540-77156-2</a><br/>Format: Electronic Resources<br/>Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129332024-09-26T15:21:19Z2024-09-26T15:21:19Zby Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format: Electronic Resources<br/>Runtime Verification 7th International Workshop, RV 2007, Vancover, Canada, March 13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130362024-09-26T15:21:19Z2024-09-26T15:21:19Zby Sokolsky, Oleg. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77395-5">http://dx.doi.org/10.1007/978-3-540-77395-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127612024-09-26T15:21:19Z2024-09-26T15:21:19Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124602024-09-26T15:21:19Z2024-09-26T15:21:19Zby Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5122762024-09-26T15:21:19Z2024-09-26T15:21:19Zby Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Electronic Resources<br/>Successfully Implementing Microsoft Dynamics™ by Using the Regatta® Approach for Microsoft Dynamics™ent://SD_ILS/0/SD_ILS:5123702024-09-26T15:21:19Z2024-09-26T15:21:19Zby Koop, Reinder. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71593-1">http://dx.doi.org/10.1007/978-3-540-71593-1</a><br/>Format: Electronic Resources<br/>Anti-Spam Measures Analysis and Designent://SD_ILS/0/SD_ILS:5123902024-09-26T15:21:19Z2024-09-26T15:21:19Zby Schryen, Guido. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71750-8">http://dx.doi.org/10.1007/978-3-540-71750-8</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126752024-09-26T15:21:19Z2024-09-26T15:21:19Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 8th International Conference, PROFES 2007, Riga, Latvia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126762024-09-26T15:21:19Z2024-09-26T15:21:19Zby Münch, Jürgen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73460-4">http://dx.doi.org/10.1007/978-3-540-73460-4</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIent://SD_ILS/0/SD_ILS:5125942024-09-26T15:21:19Z2024-09-26T15:21:19Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format: Electronic Resources<br/>Software Product Lines in Action The Best Industrial Practice in Product Line Engineeringent://SD_ILS/0/SD_ILS:5123412024-09-26T15:21:19Z2024-09-26T15:21:19Zby Linden, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71437-8">http://dx.doi.org/10.1007/978-3-540-71437-8</a><br/>Format: Electronic Resources<br/>SDL 2007: Design for Dependable Systems 13th International SDL Forum Paris, France, September 18-21, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5128662024-09-26T15:21:19Z2024-09-26T15:21:19Zby Gaudin, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74984-4">http://dx.doi.org/10.1007/978-3-540-74984-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129742024-09-26T15:21:19Z2024-09-26T15:21:19Zby Nam, Kil-Hyun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76788-6">http://dx.doi.org/10.1007/978-3-540-76788-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125292024-09-26T15:21:19Z2024-09-26T15:21:19Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5127032024-09-26T15:21:19Z2024-09-26T15:21:19Zby Hämmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format: Electronic Resources<br/>Business Intelligence for the Real-Time Enterprises First International Workshop, BIRTE 2006, Seoul, Korea, September 11, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5127392024-09-26T15:21:19Z2024-09-26T15:21:19Zby Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73950-0">http://dx.doi.org/10.1007/978-3-540-73950-0</a><br/>Format: Electronic Resources<br/>Information Hiding 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130352024-09-26T15:21:19Z2024-09-26T15:21:19Zby Furon, Teddy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77370-2">http://dx.doi.org/10.1007/978-3-540-77370-2</a><br/>Format: Electronic Resources<br/>E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130402024-09-26T15:21:19Z2024-09-26T15:21:19Zby Alkassar, Ammar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77493-8">http://dx.doi.org/10.1007/978-3-540-77493-8</a><br/>Format: Electronic Resources<br/>Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130422024-09-26T15:21:19Z2024-09-26T15:21:19Zby Okada, Mitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77505-8">http://dx.doi.org/10.1007/978-3-540-77505-8</a><br/>Format: Electronic Resources<br/>Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130432024-09-26T15:21:19Z2024-09-26T15:21:19Zby Kim, Sehun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77535-5">http://dx.doi.org/10.1007/978-3-540-77535-5</a><br/>Format: Electronic Resources<br/>Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129982024-09-26T15:21:19Z2024-09-26T15:21:19Zby Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Model Driven Architecture- Foundations and Applications Third European Conference, ECMDA-FA 2007, Haifa, Israel, June 11-15, 2007, Proccedingsent://SD_ILS/0/SD_ILS:5125532024-09-26T15:21:19Z2024-09-26T15:21:19Zby Akehurst, David H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72901-3">http://dx.doi.org/10.1007/978-3-540-72901-3</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-09-26T15:21:19Z2024-09-26T15:21:19Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129272024-09-26T15:21:19Z2024-09-26T15:21:19Zby Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:5127562024-09-26T15:21:19Z2024-09-26T15:21:19Zby Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papersent://SD_ILS/0/SD_ILS:5129282024-09-26T15:21:19Z2024-09-26T15:21:19Zby Obermaisser, Roman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75664-4">http://dx.doi.org/10.1007/978-3-540-75664-4</a><br/>Format: Electronic Resources<br/>Advances in Hybrid Information Technology First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130342024-09-26T15:21:19Z2024-09-26T15:21:19Zby Szczuka, Marcin S. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77368-9">http://dx.doi.org/10.1007/978-3-540-77368-9</a><br/>Format: Electronic Resources<br/>Software Process Dynamics and Agility International Conference on Software Process, ICSP 2007, Minneapolis, MN, USA, May 19-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124732024-09-26T15:21:19Z2024-09-26T15:21:19Zby Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72426-1">http://dx.doi.org/10.1007/978-3-540-72426-1</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123812024-09-26T15:21:19Z2024-09-26T15:21:19Zby Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124922024-09-26T15:21:19Z2024-09-26T15:21:19Zby Naor, Moni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">http://dx.doi.org/10.1007/978-3-540-72540-4</a><br/>Format: Electronic Resources<br/>Object-Oriented Technology. ECOOP 2006 Workshop Reader ECOOP 2006 Workshops, Nantes, France, July 3-7, 2006, Final Reportsent://SD_ILS/0/SD_ILS:5123912024-09-26T15:21:19Z2024-09-26T15:21:19Zby Südholt, Mario. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71774-4">http://dx.doi.org/10.1007/978-3-540-71774-4</a><br/>Format: Electronic Resources<br/>Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125722024-09-26T15:21:19Z2024-09-26T15:21:19Zby Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 9th International Symposium, SSS 2007 Paris, France, November 14-16, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129612024-09-26T15:21:19Z2024-09-26T15:21:19Zby Masuzawa, Toshimitsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76627-8">http://dx.doi.org/10.1007/978-3-540-76627-8</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXI 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126872024-09-26T15:21:19Z2024-09-26T15:21:19Zby Barker, Steve. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73538-0">http://dx.doi.org/10.1007/978-3-540-73538-0</a><br/>Format: Electronic Resources<br/>Testing of Software and Communicating Systems 19th IFIP TC6/WG6.1 International Conference, TestCom 2007, 7th International Workshop, FATES 2007, Tallinn, Estonia, June 26-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125892024-09-26T15:21:19Z2024-09-26T15:21:19Zby Petrenko, Alexandre. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73066-8">http://dx.doi.org/10.1007/978-3-540-73066-8</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126902024-09-26T15:21:19Z2024-09-26T15:21:19Zby Xiao, Bin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73547-2">http://dx.doi.org/10.1007/978-3-540-73547-2</a><br/>Format: Electronic Resources<br/>Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124292024-09-26T15:21:19Z2024-09-26T15:21:19Zby Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format: Electronic Resources<br/>Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125282024-09-26T15:21:19Z2024-09-26T15:21:19Zby Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format: Electronic Resources<br/>Transactions on Aspect-Oriented Software Development IIIent://SD_ILS/0/SD_ILS:5128782024-09-26T15:21:19Z2024-09-26T15:21:19Zby Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75162-5">http://dx.doi.org/10.1007/978-3-540-75162-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129862024-09-26T15:21:19Z2024-09-26T15:21:19Zby Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76900-2">http://dx.doi.org/10.1007/978-3-540-76900-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126262024-09-26T15:21:19Z2024-09-26T15:21:19Zby Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format: Electronic Resources<br/>IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San José, USA, October 31 - November 2, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129422024-09-26T15:21:19Z2024-09-26T15:21:19Zby Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format: Electronic Resources<br/>Advances in Biometrics International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128032024-09-26T15:21:19Z2024-09-26T15:21:19Zby Lee, Seong-Whan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74549-5">http://dx.doi.org/10.1007/978-3-540-74549-5</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design IV FOSAD 2006/2007 Tutorial Lecturesent://SD_ILS/0/SD_ILS:5128372024-09-26T15:21:19Z2024-09-26T15:21:19Zby Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74810-6">http://dx.doi.org/10.1007/978-3-540-74810-6</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5128442024-09-26T15:21:19Z2024-09-26T15:21:19Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74829-8">http://dx.doi.org/10.1007/978-3-540-74829-8</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128462024-09-26T15:21:19Z2024-09-26T15:21:19Zby Biskup, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 8th International Conference, XP 2007, Como, Italy, June 18-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125972024-09-26T15:21:19Z2024-09-26T15:21:19Zby Concas, Giulio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73101-6">http://dx.doi.org/10.1007/978-3-540-73101-6</a><br/>Format: Electronic Resources<br/>Sustainable Internet Third Asian Internet Engineering Conference, AINTEC 2007, Phuket, Thailand, November 27-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129762024-09-26T15:21:19Z2024-09-26T15:21:19Zby Fdida, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76809-8">http://dx.doi.org/10.1007/978-3-540-76809-8</a><br/>Format: Electronic Resources<br/>Business Process Management 5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128802024-09-26T15:21:19Z2024-09-26T15:21:19Zby Alonso, Gustavo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75183-0">http://dx.doi.org/10.1007/978-3-540-75183-0</a><br/>Format: Electronic Resources<br/>Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129892024-09-26T15:21:19Z2024-09-26T15:21:19Zby Cervesato, Iliano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">http://dx.doi.org/10.1007/978-3-540-76929-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129912024-09-26T15:21:19Z2024-09-26T15:21:19Zby Bao, Feng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76969-9">http://dx.doi.org/10.1007/978-3-540-76969-9</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127772024-09-26T15:21:19Z2024-09-26T15:21:19Zby Kruegel, Christopher. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">http://dx.doi.org/10.1007/978-3-540-74320-0</a><br/>Format: Electronic Resources<br/>Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5127822024-09-26T15:21:19Z2024-09-26T15:21:19Zby Wang, Yuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127842024-09-26T15:21:19Z2024-09-26T15:21:19Zby Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74409-2">http://dx.doi.org/10.1007/978-3-540-74409-2</a><br/>Format: Electronic Resources<br/>Electronic Government 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127882024-09-26T15:21:19Z2024-09-26T15:21:19Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74444-3">http://dx.doi.org/10.1007/978-3-540-74444-3</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5127932024-09-26T15:21:19Z2024-09-26T15:21:19Zby Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128252024-09-26T15:21:19Z2024-09-26T15:21:19Zby Paillier, Pascal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74735-2">http://dx.doi.org/10.1007/978-3-540-74735-2</a><br/>Format: Electronic Resources<br/>Software Process Improvement 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129022024-09-26T15:21:19Z2024-09-26T15:21:19Zby Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75381-0">http://dx.doi.org/10.1007/978-3-540-75381-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129992024-09-26T15:21:19Z2024-09-26T15:21:19Zby Srinathan, K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77026-8">http://dx.doi.org/10.1007/978-3-540-77026-8</a><br/>Format: Electronic Resources<br/>Transactions on Aspect-Oriented Software Development IVent://SD_ILS/0/SD_ILS:5130022024-09-26T15:21:19Z2024-09-26T15:21:19Zby Rashid, Awais. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77042-8">http://dx.doi.org/10.1007/978-3-540-77042-8</a><br/>Format: Electronic Resources<br/>Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130072024-09-26T15:21:19Z2024-09-26T15:21:19Zby McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format: Electronic Resources<br/>Software Engineering Approaches for Offshore and Outsourced Development First International Conference, SEAFOOD 2007, Zurich, Switzerland, February 5-6, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5129202024-09-26T15:21:19Z2024-09-26T15:21:19Zby Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75542-5">http://dx.doi.org/10.1007/978-3-540-75542-5</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130322024-09-26T15:21:19Z2024-09-26T15:21:19Zby Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5130332024-09-26T15:21:19Z2024-09-26T15:21:19Zby Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part Ient://SD_ILS/0/SD_ILS:5128402024-09-26T15:21:19Z2024-09-26T15:21:19Zby Apolloni, Bruno. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74819-9">http://dx.doi.org/10.1007/978-3-540-74819-9</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128712024-09-26T15:21:19Z2024-09-26T15:21:19Zby Saglietti, Francesca. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Format: Electronic Resources<br/>ECOOP 2007 – Object-Oriented Programming 21st European Conference, Berlin, Germany, July 30 - August 3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126992024-09-26T15:21:19Z2024-09-26T15:21:19Zby Ernst, Erik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73589-2">http://dx.doi.org/10.1007/978-3-540-73589-2</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada Europe 2007 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126212024-09-26T15:21:19Z2024-09-26T15:21:19Zby Abdennadher, Nabil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73230-3">http://dx.doi.org/10.1007/978-3-540-73230-3</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 10th International Conference, MoDELS 2007, Nashville, USA, September 30 - October 5, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128842024-09-26T15:21:19Z2024-09-26T15:21:19Zby Engels, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75209-7">http://dx.doi.org/10.1007/978-3-540-75209-7</a><br/>Format: Electronic Resources<br/>Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5128892024-09-26T15:21:19Z2024-09-26T15:21:19Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format: Electronic Resources<br/>Guerrilla Capacity Planning A Tactical Approach to Planning for Highly Scalable Applications and Servicesent://SD_ILS/0/SD_ILS:5098402024-09-26T15:21:19Z2024-09-26T15:21:19Zby Gunther, Neil J. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-31010-5">http://dx.doi.org/10.1007/978-3-540-31010-5</a><br/>Format: Electronic Resources<br/>