Search Results for - Narrowed by: 2008 - Management of Computing and Information Systems. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300? 2024-05-28T13:24:29Z Critical Infrastructure Protection II ent://SD_ILS/0/SD_ILS:502009 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501546 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> The Open Knowlege Society. A Computer Science and Information Systems Manifesto First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503718 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87783-7">http://dx.doi.org/10.1007/978-3-540-87783-7</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503719 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, M&aacute;laga, Spain, October 3-5, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:503793 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format:&#160;Electronic Resources<br/> Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502620 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502623 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format:&#160;Electronic Resources<br/> The IT Measurement Compendium Estimating and Benchmarking Success with Functional Size Measurement ent://SD_ILS/0/SD_ILS:502627 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Bundschuh, Manfred. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68188-5">http://dx.doi.org/10.1007/978-3-540-68188-5</a><br/>Format:&#160;Electronic Resources<br/> Rightshore! Successfully SAP(R) Projects Offshore ent://SD_ILS/0/SD_ILS:503226 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Messner, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77288-0">http://dx.doi.org/10.1007/978-3-540-77288-0</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management Workshops BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503339 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Hofstede, Arthur. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78238-4">http://dx.doi.org/10.1007/978-3-540-78238-4</a><br/>Format:&#160;Electronic Resources<br/> Making Globally Distributed Software Development a Success Story International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503544 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79588-9">http://dx.doi.org/10.1007/978-3-540-79588-9</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502803 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format:&#160;Electronic Resources<br/> Balancing Agility and Formalism in Software Engineering Second IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2007, Poznan, Poland, October 10-12, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503615 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85279-7">http://dx.doi.org/10.1007/978-3-540-85279-7</a><br/>Format:&#160;Electronic Resources<br/> Software Process and Product Measurement International Conferences IWSM 2008, Metrikon 2008, and Mensura 2008 Munich, Germany, November 18-19, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503809 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Dumke, Reiner R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89403-2">http://dx.doi.org/10.1007/978-3-540-89403-2</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503387 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2008 The Cryptographers&rsquo; Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503503 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503649 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Collaborative Networks IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES, September 8-10, 2008, Poznan, Poland ent://SD_ILS/0/SD_ILS:501998 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-84837-2">http://dx.doi.org/10.1007/978-0-387-84837-2</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks in Pattern Recognition Third IAPR Workshop, ANNPR 2008 Paris, France, July 2-4, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502791 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Prevost, Lionel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69939-2">http://dx.doi.org/10.1007/978-3-540-69939-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502793 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security III ent://SD_ILS/0/SD_ILS:502699 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503563 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503610 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/> Formal Methods and Testing An Outcome of the FORTEST Network, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503449 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Hierons, Robert M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78917-8">http://dx.doi.org/10.1007/978-3-540-78917-8</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503650 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies and Information Systems for the Knowledge Society First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503717 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87781-3">http://dx.doi.org/10.1007/978-3-540-87781-3</a><br/>Format:&#160;Electronic Resources<br/> IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503680 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503684 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503753 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/> The Practice of Enterprise Modeling First IFIP WG 8.1 Working Conference, PoEM 2008, Stockholm, Sweden, November 12-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503796 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Stirna, Janis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89218-2">http://dx.doi.org/10.1007/978-3-540-89218-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503800 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503805 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Kulkarni, Sandeep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89335-6">http://dx.doi.org/10.1007/978-3-540-89335-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Methods for Inconsistent Knowledge Management ent://SD_ILS/0/SD_ILS:502434 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format:&#160;Electronic Resources<br/> Resources, Co-Evolution and Artifacts Theory in CSCW ent://SD_ILS/0/SD_ILS:502435 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Ackerman, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-901-9">http://dx.doi.org/10.1007/978-1-84628-901-9</a><br/>Format:&#160;Electronic Resources<br/> High Confidence Software Reuse in Large Systems 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502613 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Mei, Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68073-4">http://dx.doi.org/10.1007/978-3-540-68073-4</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Architecture &ndash; Foundations and Applications 4th European Conference, ECMDA-FA 2008, Berlin, Germany, June 9-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502709 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Schieferdecker, Ina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69100-6">http://dx.doi.org/10.1007/978-3-540-69100-6</a><br/>Format:&#160;Electronic Resources<br/> FM 2008: Formal Methods 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502633 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68237-0">http://dx.doi.org/10.1007/978-3-540-68237-0</a><br/>Format:&#160;Electronic Resources<br/> Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502730 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503533 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part I ent://SD_ILS/0/SD_ILS:503636 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85563-7">http://dx.doi.org/10.1007/978-3-540-85563-7</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part II ent://SD_ILS/0/SD_ILS:503637 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85565-1">http://dx.doi.org/10.1007/978-3-540-85565-1</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part III ent://SD_ILS/0/SD_ILS:503638 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85567-5">http://dx.doi.org/10.1007/978-3-540-85567-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503660 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503664 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format:&#160;Electronic Resources<br/> Model Driven Engineering Languages and Systems 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503724 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Czarnecki, Krzysztof. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87875-9">http://dx.doi.org/10.1007/978-3-540-87875-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503749 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/> Object-Oriented Technology. ECOOP 2007 Workshop Reader ECOOP 2007 Workshops, Berlin, Germany, July 30-31, 2007, Final Reports ent://SD_ILS/0/SD_ILS:503335 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Cebulla, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78195-0">http://dx.doi.org/10.1007/978-3-540-78195-0</a><br/>Format:&#160;Electronic Resources<br/> TestGoal Result-Driven Testing ent://SD_ILS/0/SD_ILS:503439 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;De Grood, Derk-Jan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78829-4">http://dx.doi.org/10.1007/978-3-540-78829-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503708 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503613 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503481 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format:&#160;Electronic Resources<br/> Biosurveillance and Biosecurity International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503831 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89746-0">http://dx.doi.org/10.1007/978-3-540-89746-0</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503832 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503839 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503843 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503846 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format:&#160;Electronic Resources<br/> Software Process and Product Measurement International Conference, IWSM-Mensura 2007, Palma de Mallorca, Spain, November 5-8, 2007. Revised Papers ent://SD_ILS/0/SD_ILS:503634 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Cuadrado-Gallego, Juan J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85553-8">http://dx.doi.org/10.1007/978-3-540-85553-8</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503605 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format:&#160;Electronic Resources<br/> Modelling, Computation and Optimization in Information Systems and Management Sciences Second International Conference MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503692 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Le Thi, Hoai An. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87477-5">http://dx.doi.org/10.1007/978-3-540-87477-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503818 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503586 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format:&#160;Electronic Resources<br/> Data Management in Grid and Peer-to-Peer Systems First International Conference, Globe 2008, Turin, Italy, September 3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503601 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85176-9">http://dx.doi.org/10.1007/978-3-540-85176-9</a><br/>Format:&#160;Electronic Resources<br/> Emerging Web Services Technology, Volume II ent://SD_ILS/0/SD_ILS:503942 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Gschwind, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8864-5">http://dx.doi.org/10.1007/978-3-7643-8864-5</a><br/>Format:&#160;Electronic Resources<br/> Web Services and Formal Methods 4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007. Proceedings ent://SD_ILS/0/SD_ILS:503496 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79230-7">http://dx.doi.org/10.1007/978-3-540-79230-7</a><br/>Format:&#160;Electronic Resources<br/> Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503678 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format:&#160;Electronic Resources<br/> Modelling Autonomic Communications Environments Third IEEE International Workshop, MACE 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503679 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Meer, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87355-6">http://dx.doi.org/10.1007/978-3-540-87355-6</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503789 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes in Software Engineering and Extreme Programming 9th International Conference, XP 2008, Limerick, Ireland, June 10-14, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502634 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68255-4">http://dx.doi.org/10.1007/978-3-540-68255-4</a><br/>Format:&#160;Electronic Resources<br/> Objects, Components, Models and Patterns 46th International Conference, TOOLS EUROPE 2008, Zurich, Switzerland, June 30 - July 4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502777 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Paige, Richard F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69824-1">http://dx.doi.org/10.1007/978-3-540-69824-1</a><br/>Format:&#160;Electronic Resources<br/> Software Evolution ent://SD_ILS/0/SD_ILS:503172 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Mens, Tom. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76440-3">http://dx.doi.org/10.1007/978-3-540-76440-3</a><br/>Format:&#160;Electronic Resources<br/> Model-Driven Testing ent://SD_ILS/0/SD_ILS:502892 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Baker, Paul. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72563-3">http://dx.doi.org/10.1007/978-3-540-72563-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503455 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503821 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503600 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format:&#160;Electronic Resources<br/> Principles of Distributed Systems 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503857 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Baker, Theodore P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92221-6">http://dx.doi.org/10.1007/978-3-540-92221-6</a><br/>Format:&#160;Electronic Resources<br/> Open Source Development, Communities and Quality IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501543 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Russo, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09684-1">http://dx.doi.org/10.1007/978-0-387-09684-1</a><br/>Format:&#160;Electronic Resources<br/> Guide to Advanced Empirical Software Engineering ent://SD_ILS/0/SD_ILS:502468 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Shull, Forrest. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-044-5">http://dx.doi.org/10.1007/978-1-84800-044-5</a><br/>Format:&#160;Electronic Resources<br/> Reliable Software Technologies &ndash; Ada-Europe 2008 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502662 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Kordon, Fabrice. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68624-8">http://dx.doi.org/10.1007/978-3-540-68624-8</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 9th International Conference, PROFES 2008 Monte Porzio Catone, Italy, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502764 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Jedlitschka, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69566-0">http://dx.doi.org/10.1007/978-3-540-69566-0</a><br/>Format:&#160;Electronic Resources<br/> Active Knowledge Modeling of Enterprises ent://SD_ILS/0/SD_ILS:503519 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Lillehagen, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79416-5">http://dx.doi.org/10.1007/978-3-540-79416-5</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502691 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/> Rationale-Based Software Engineering ent://SD_ILS/0/SD_ILS:503270 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Burge, Janet E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77583-6">http://dx.doi.org/10.1007/978-3-540-77583-6</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503372 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 14th International Working Conference, REFSQ 2008 Montpellier, France, June 16-17, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502704 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Paech, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69062-7">http://dx.doi.org/10.1007/978-3-540-69062-7</a><br/>Format:&#160;Electronic Resources<br/> Models in Software Engineering Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papers ent://SD_ILS/0/SD_ILS:502706 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Giese, Holger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69073-3">http://dx.doi.org/10.1007/978-3-540-69073-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503375 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Interoperability III New Challenges and Industrial Approaches ent://SD_ILS/0/SD_ILS:502525 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Mertins, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-221-0">http://dx.doi.org/10.1007/978-1-84800-221-0</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502812 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format:&#160;Electronic Resources<br/> Requirements Management The Interface Between Requirements Development and All Other Systems Engineering Processes ent://SD_ILS/0/SD_ILS:502646 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Hood, Colin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68476-3">http://dx.doi.org/10.1007/978-3-540-68476-3</a><br/>Format:&#160;Electronic Resources<br/> Testing of Software and Communicating Systems 20th IFIP TC 6/WG 6.1 International Conference, TestCom 2008 8th International Workshop, FATES 2008 Tokyo, Japan, June 10-13, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502652 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Suzuki, Kenji. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68524-1">http://dx.doi.org/10.1007/978-3-540-68524-1</a><br/>Format:&#160;Electronic Resources<br/> Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502818 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format:&#160;Electronic Resources<br/> ECOOP 2008 &ndash; Object-Oriented Programming 22nd European Conference Paphos, Cyprus, July 7-11, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502820 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Vitek, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70592-5">http://dx.doi.org/10.1007/978-3-540-70592-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502827 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format:&#160;Electronic Resources<br/> Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502750 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502756 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format:&#160;Electronic Resources<br/> Itil&reg; Version 3 at a Glance Information Quick Reference ent://SD_ILS/0/SD_ILS:501918 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Long, John O. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77393-3">http://dx.doi.org/10.1007/978-0-387-77393-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25&ndash;27, 2008 ent://SD_ILS/0/SD_ILS:501523 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format:&#160;Electronic Resources<br/> Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 ent://SD_ILS/0/SD_ILS:501939 2024-05-28T13:24:29Z 2024-05-28T13:24:29Z by&#160;Leeuw, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format:&#160;Electronic Resources<br/>