Search Results for - Narrowed by: 2008 - Management of Computing and Information Systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300?2024-05-28T13:24:29ZCritical Infrastructure Protection IIent://SD_ILS/0/SD_ILS:5020092024-05-28T13:24:29Z2024-05-28T13:24:29Zby Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format: Electronic Resources<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015462024-05-28T13:24:29Z2024-05-28T13:24:29Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>The Open Knowlege Society. A Computer Science and Information Systems Manifesto First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037182024-05-28T13:24:29Z2024-05-28T13:24:29Zby Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87783-7">http://dx.doi.org/10.1007/978-3-540-87783-7</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037192024-05-28T13:24:29Z2024-05-28T13:24:29Zby Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5037932024-05-28T13:24:29Z2024-05-28T13:24:29Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026202024-05-28T13:24:29Z2024-05-28T13:24:29Zby Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026232024-05-28T13:24:29Z2024-05-28T13:24:29Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>The IT Measurement Compendium Estimating and Benchmarking Success with Functional Size Measurementent://SD_ILS/0/SD_ILS:5026272024-05-28T13:24:29Z2024-05-28T13:24:29Zby Bundschuh, Manfred. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68188-5">http://dx.doi.org/10.1007/978-3-540-68188-5</a><br/>Format: Electronic Resources<br/>Rightshore! Successfully SAP(R) Projects Offshoreent://SD_ILS/0/SD_ILS:5032262024-05-28T13:24:29Z2024-05-28T13:24:29Zby Messner, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77288-0">http://dx.doi.org/10.1007/978-3-540-77288-0</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033392024-05-28T13:24:29Z2024-05-28T13:24:29Zby Hofstede, Arthur. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78238-4">http://dx.doi.org/10.1007/978-3-540-78238-4</a><br/>Format: Electronic Resources<br/>Making Globally Distributed Software Development a Success Story International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5035442024-05-28T13:24:29Z2024-05-28T13:24:29Zby Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79588-9">http://dx.doi.org/10.1007/978-3-540-79588-9</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032024-05-28T13:24:29Z2024-05-28T13:24:29Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Balancing Agility and Formalism in Software Engineering Second IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2007, Poznan, Poland, October 10-12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5036152024-05-28T13:24:29Z2024-05-28T13:24:29Zby Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85279-7">http://dx.doi.org/10.1007/978-3-540-85279-7</a><br/>Format: Electronic Resources<br/>Software Process and Product Measurement International Conferences IWSM 2008, Metrikon 2008, and Mensura 2008 Munich, Germany, November 18-19, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038092024-05-28T13:24:29Z2024-05-28T13:24:29Zby Dumke, Reiner R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89403-2">http://dx.doi.org/10.1007/978-3-540-89403-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033872024-05-28T13:24:29Z2024-05-28T13:24:29Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035032024-05-28T13:24:29Z2024-05-28T13:24:29Zby Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036492024-05-28T13:24:29Z2024-05-28T13:24:29Zby Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Pervasive Collaborative Networks IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES, September 8-10, 2008, Poznan, Polandent://SD_ILS/0/SD_ILS:5019982024-05-28T13:24:29Z2024-05-28T13:24:29Zby Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-84837-2">http://dx.doi.org/10.1007/978-0-387-84837-2</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks in Pattern Recognition Third IAPR Workshop, ANNPR 2008 Paris, France, July 2-4, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027912024-05-28T13:24:29Z2024-05-28T13:24:29Zby Prevost, Lionel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69939-2">http://dx.doi.org/10.1007/978-3-540-69939-2</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-05-28T13:24:29Z2024-05-28T13:24:29Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIIent://SD_ILS/0/SD_ILS:5026992024-05-28T13:24:29Z2024-05-28T13:24:29Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632024-05-28T13:24:29Z2024-05-28T13:24:29Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102024-05-28T13:24:29Z2024-05-28T13:24:29Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Formal Methods and Testing An Outcome of the FORTEST Network, Revised Selected Papersent://SD_ILS/0/SD_ILS:5034492024-05-28T13:24:29Z2024-05-28T13:24:29Zby Hierons, Robert M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78917-8">http://dx.doi.org/10.1007/978-3-540-78917-8</a><br/>Format: Electronic Resources<br/>Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036502024-05-28T13:24:29Z2024-05-28T13:24:29Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format: Electronic Resources<br/>Emerging Technologies and Information Systems for the Knowledge Society First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037172024-05-28T13:24:29Z2024-05-28T13:24:29Zby Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87781-3">http://dx.doi.org/10.1007/978-3-540-87781-3</a><br/>Format: Electronic Resources<br/>IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036802024-05-28T13:24:29Z2024-05-28T13:24:29Zby Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842024-05-28T13:24:29Z2024-05-28T13:24:29Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037532024-05-28T13:24:29Z2024-05-28T13:24:29Zby Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>The Practice of Enterprise Modeling First IFIP WG 8.1 Working Conference, PoEM 2008, Stockholm, Sweden, November 12-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037962024-05-28T13:24:29Z2024-05-28T13:24:29Zby Stirna, Janis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89218-2">http://dx.doi.org/10.1007/978-3-540-89218-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038002024-05-28T13:24:29Z2024-05-28T13:24:29Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038052024-05-28T13:24:29Z2024-05-28T13:24:29Zby Kulkarni, Sandeep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89335-6">http://dx.doi.org/10.1007/978-3-540-89335-6</a><br/>Format: Electronic Resources<br/>Advanced Methods for Inconsistent Knowledge Managementent://SD_ILS/0/SD_ILS:5024342024-05-28T13:24:29Z2024-05-28T13:24:29Zby Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format: Electronic Resources<br/>Resources, Co-Evolution and Artifacts Theory in CSCWent://SD_ILS/0/SD_ILS:5024352024-05-28T13:24:29Z2024-05-28T13:24:29Zby Ackerman, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-901-9">http://dx.doi.org/10.1007/978-1-84628-901-9</a><br/>Format: Electronic Resources<br/>High Confidence Software Reuse in Large Systems 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026132024-05-28T13:24:29Z2024-05-28T13:24:29Zby Mei, Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68073-4">http://dx.doi.org/10.1007/978-3-540-68073-4</a><br/>Format: Electronic Resources<br/>Model Driven Architecture – Foundations and Applications 4th European Conference, ECMDA-FA 2008, Berlin, Germany, June 9-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027092024-05-28T13:24:29Z2024-05-28T13:24:29Zby Schieferdecker, Ina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69100-6">http://dx.doi.org/10.1007/978-3-540-69100-6</a><br/>Format: Electronic Resources<br/>FM 2008: Formal Methods 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026332024-05-28T13:24:29Z2024-05-28T13:24:29Zby Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68237-0">http://dx.doi.org/10.1007/978-3-540-68237-0</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027302024-05-28T13:24:29Z2024-05-28T13:24:29Zby Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5035332024-05-28T13:24:29Z2024-05-28T13:24:29Zby Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5036362024-05-28T13:24:29Z2024-05-28T13:24:29Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85563-7">http://dx.doi.org/10.1007/978-3-540-85563-7</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5036372024-05-28T13:24:29Z2024-05-28T13:24:29Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85565-1">http://dx.doi.org/10.1007/978-3-540-85565-1</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5036382024-05-28T13:24:29Z2024-05-28T13:24:29Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85567-5">http://dx.doi.org/10.1007/978-3-540-85567-5</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602024-05-28T13:24:29Z2024-05-28T13:24:29Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642024-05-28T13:24:29Z2024-05-28T13:24:29Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037242024-05-28T13:24:29Z2024-05-28T13:24:29Zby Czarnecki, Krzysztof. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87875-9">http://dx.doi.org/10.1007/978-3-540-87875-9</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037492024-05-28T13:24:29Z2024-05-28T13:24:29Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Object-Oriented Technology. ECOOP 2007 Workshop Reader ECOOP 2007 Workshops, Berlin, Germany, July 30-31, 2007, Final Reportsent://SD_ILS/0/SD_ILS:5033352024-05-28T13:24:29Z2024-05-28T13:24:29Zby Cebulla, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78195-0">http://dx.doi.org/10.1007/978-3-540-78195-0</a><br/>Format: Electronic Resources<br/>TestGoal Result-Driven Testingent://SD_ILS/0/SD_ILS:5034392024-05-28T13:24:29Z2024-05-28T13:24:29Zby De Grood, Derk-Jan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78829-4">http://dx.doi.org/10.1007/978-3-540-78829-4</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037082024-05-28T13:24:29Z2024-05-28T13:24:29Zby Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036132024-05-28T13:24:29Z2024-05-28T13:24:29Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-05-28T13:24:29Z2024-05-28T13:24:29Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Biosurveillance and Biosecurity International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038312024-05-28T13:24:29Z2024-05-28T13:24:29Zby Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89746-0">http://dx.doi.org/10.1007/978-3-540-89746-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038322024-05-28T13:24:29Z2024-05-28T13:24:29Zby Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-05-28T13:24:29Z2024-05-28T13:24:29Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038432024-05-28T13:24:29Z2024-05-28T13:24:29Zby Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038462024-05-28T13:24:29Z2024-05-28T13:24:29Zby Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format: Electronic Resources<br/>Software Process and Product Measurement International Conference, IWSM-Mensura 2007, Palma de Mallorca, Spain, November 5-8, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5036342024-05-28T13:24:29Z2024-05-28T13:24:29Zby Cuadrado-Gallego, Juan J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85553-8">http://dx.doi.org/10.1007/978-3-540-85553-8</a><br/>Format: Electronic Resources<br/>Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036052024-05-28T13:24:29Z2024-05-28T13:24:29Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format: Electronic Resources<br/>Modelling, Computation and Optimization in Information Systems and Management Sciences Second International Conference MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036922024-05-28T13:24:29Z2024-05-28T13:24:29Zby Le Thi, Hoai An. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87477-5">http://dx.doi.org/10.1007/978-3-540-87477-5</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038182024-05-28T13:24:29Z2024-05-28T13:24:29Zby Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035862024-05-28T13:24:29Z2024-05-28T13:24:29Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Data Management in Grid and Peer-to-Peer Systems First International Conference, Globe 2008, Turin, Italy, September 3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036012024-05-28T13:24:29Z2024-05-28T13:24:29Zby Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85176-9">http://dx.doi.org/10.1007/978-3-540-85176-9</a><br/>Format: Electronic Resources<br/>Emerging Web Services Technology, Volume IIent://SD_ILS/0/SD_ILS:5039422024-05-28T13:24:29Z2024-05-28T13:24:29Zby Gschwind, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8864-5">http://dx.doi.org/10.1007/978-3-7643-8864-5</a><br/>Format: Electronic Resources<br/>Web Services and Formal Methods 4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5034962024-05-28T13:24:29Z2024-05-28T13:24:29Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79230-7">http://dx.doi.org/10.1007/978-3-540-79230-7</a><br/>Format: Electronic Resources<br/>Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036782024-05-28T13:24:29Z2024-05-28T13:24:29Zby Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format: Electronic Resources<br/>Modelling Autonomic Communications Environments Third IEEE International Workshop, MACE 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036792024-05-28T13:24:29Z2024-05-28T13:24:29Zby Meer, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87355-6">http://dx.doi.org/10.1007/978-3-540-87355-6</a><br/>Format: Electronic Resources<br/>Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037892024-05-28T13:24:29Z2024-05-28T13:24:29Zby Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 9th International Conference, XP 2008, Limerick, Ireland, June 10-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026342024-05-28T13:24:29Z2024-05-28T13:24:29Zby Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68255-4">http://dx.doi.org/10.1007/978-3-540-68255-4</a><br/>Format: Electronic Resources<br/>Objects, Components, Models and Patterns 46th International Conference, TOOLS EUROPE 2008, Zurich, Switzerland, June 30 - July 4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027772024-05-28T13:24:29Z2024-05-28T13:24:29Zby Paige, Richard F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69824-1">http://dx.doi.org/10.1007/978-3-540-69824-1</a><br/>Format: Electronic Resources<br/>Software Evolutionent://SD_ILS/0/SD_ILS:5031722024-05-28T13:24:29Z2024-05-28T13:24:29Zby Mens, Tom. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76440-3">http://dx.doi.org/10.1007/978-3-540-76440-3</a><br/>Format: Electronic Resources<br/>Model-Driven Testingent://SD_ILS/0/SD_ILS:5028922024-05-28T13:24:29Z2024-05-28T13:24:29Zby Baker, Paul. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72563-3">http://dx.doi.org/10.1007/978-3-540-72563-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034552024-05-28T13:24:29Z2024-05-28T13:24:29Zby Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038212024-05-28T13:24:29Z2024-05-28T13:24:29Zby Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-05-28T13:24:29Z2024-05-28T13:24:29Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Principles of Distributed Systems 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038572024-05-28T13:24:29Z2024-05-28T13:24:29Zby Baker, Theodore P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92221-6">http://dx.doi.org/10.1007/978-3-540-92221-6</a><br/>Format: Electronic Resources<br/>Open Source Development, Communities and Quality IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015432024-05-28T13:24:29Z2024-05-28T13:24:29Zby Russo, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09684-1">http://dx.doi.org/10.1007/978-0-387-09684-1</a><br/>Format: Electronic Resources<br/>Guide to Advanced Empirical Software Engineeringent://SD_ILS/0/SD_ILS:5024682024-05-28T13:24:29Z2024-05-28T13:24:29Zby Shull, Forrest. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-044-5">http://dx.doi.org/10.1007/978-1-84800-044-5</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada-Europe 2008 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026622024-05-28T13:24:29Z2024-05-28T13:24:29Zby Kordon, Fabrice. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68624-8">http://dx.doi.org/10.1007/978-3-540-68624-8</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 9th International Conference, PROFES 2008 Monte Porzio Catone, Italy, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027642024-05-28T13:24:29Z2024-05-28T13:24:29Zby Jedlitschka, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69566-0">http://dx.doi.org/10.1007/978-3-540-69566-0</a><br/>Format: Electronic Resources<br/>Active Knowledge Modeling of Enterprisesent://SD_ILS/0/SD_ILS:5035192024-05-28T13:24:29Z2024-05-28T13:24:29Zby Lillehagen, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79416-5">http://dx.doi.org/10.1007/978-3-540-79416-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912024-05-28T13:24:29Z2024-05-28T13:24:29Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Rationale-Based Software Engineeringent://SD_ILS/0/SD_ILS:5032702024-05-28T13:24:29Z2024-05-28T13:24:29Zby Burge, Janet E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77583-6">http://dx.doi.org/10.1007/978-3-540-77583-6</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033722024-05-28T13:24:29Z2024-05-28T13:24:29Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 14th International Working Conference, REFSQ 2008 Montpellier, France, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027042024-05-28T13:24:29Z2024-05-28T13:24:29Zby Paech, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69062-7">http://dx.doi.org/10.1007/978-3-540-69062-7</a><br/>Format: Electronic Resources<br/>Models in Software Engineering Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papersent://SD_ILS/0/SD_ILS:5027062024-05-28T13:24:29Z2024-05-28T13:24:29Zby Giese, Holger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69073-3">http://dx.doi.org/10.1007/978-3-540-69073-3</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033752024-05-28T13:24:29Z2024-05-28T13:24:29Zby Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability III New Challenges and Industrial Approachesent://SD_ILS/0/SD_ILS:5025252024-05-28T13:24:29Z2024-05-28T13:24:29Zby Mertins, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-221-0">http://dx.doi.org/10.1007/978-1-84800-221-0</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028122024-05-28T13:24:29Z2024-05-28T13:24:29Zby Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>Requirements Management The Interface Between Requirements Development and All Other Systems Engineering Processesent://SD_ILS/0/SD_ILS:5026462024-05-28T13:24:29Z2024-05-28T13:24:29Zby Hood, Colin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68476-3">http://dx.doi.org/10.1007/978-3-540-68476-3</a><br/>Format: Electronic Resources<br/>Testing of Software and Communicating Systems 20th IFIP TC 6/WG 6.1 International Conference, TestCom 2008 8th International Workshop, FATES 2008 Tokyo, Japan, June 10-13, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026522024-05-28T13:24:29Z2024-05-28T13:24:29Zby Suzuki, Kenji. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68524-1">http://dx.doi.org/10.1007/978-3-540-68524-1</a><br/>Format: Electronic Resources<br/>Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028182024-05-28T13:24:29Z2024-05-28T13:24:29Zby Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format: Electronic Resources<br/>ECOOP 2008 – Object-Oriented Programming 22nd European Conference Paphos, Cyprus, July 7-11, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028202024-05-28T13:24:29Z2024-05-28T13:24:29Zby Vitek, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70592-5">http://dx.doi.org/10.1007/978-3-540-70592-5</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-05-28T13:24:29Z2024-05-28T13:24:29Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027502024-05-28T13:24:29Z2024-05-28T13:24:29Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027562024-05-28T13:24:29Z2024-05-28T13:24:29Zby Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format: Electronic Resources<br/>Itil® Version 3 at a Glance Information Quick Referenceent://SD_ILS/0/SD_ILS:5019182024-05-28T13:24:29Z2024-05-28T13:24:29Zby Long, John O. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77393-3">http://dx.doi.org/10.1007/978-0-387-77393-3</a><br/>Format: Electronic Resources<br/>Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25–27, 2008ent://SD_ILS/0/SD_ILS:5015232024-05-28T13:24:29Z2024-05-28T13:24:29Zby Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format: Electronic Resources<br/>Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007ent://SD_ILS/0/SD_ILS:5019392024-05-28T13:24:29Z2024-05-28T13:24:29Zby Leeuw, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format: Electronic Resources<br/>