Search Results for - Narrowed by: Artificial intelligence. - Data Structures, Cryptology and Information Theory. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Artificial$002bintelligence.$002509Artificial$002bintelligence.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300? 2024-06-28T07:19:10Z Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:512052 2024-06-28T07:19:10Z 2024-06-28T07:19:10Z by&#160;Bella, Giampaolo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/> Developing Ambient Intelligence Proceedings of the First International Conference on Ambient Intelligence Developments (AmID&rsquo;06) ent://SD_ILS/0/SD_ILS:508738 2024-06-28T07:19:10Z 2024-06-28T07:19:10Z by&#160;Ma&ntilde;a, Antonio. author.<br/><a href="http://dx.doi.org/10.1007/978-2-287-47610-5">http://dx.doi.org/10.1007/978-2-287-47610-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics for International Security Information Sharing and Data Mining ent://SD_ILS/0/SD_ILS:504985 2024-06-28T07:19:10Z 2024-06-28T07:19:10Z by&#160;Chen, Hsinchun. author.<br/><a href="http://dx.doi.org/10.1007/0-387-30332-4">http://dx.doi.org/10.1007/0-387-30332-4</a><br/>Format:&#160;Electronic Resources<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:505426 2024-06-28T07:19:10Z 2024-06-28T07:19:10Z by&#160;Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Electronic Resources<br/> Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems ent://SD_ILS/0/SD_ILS:504179 2024-06-28T07:19:10Z 2024-06-28T07:19:10Z by&#160;Pejaƛ, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/b101135">http://dx.doi.org/10.1007/b101135</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Systems V ent://SD_ILS/0/SD_ILS:506262 2024-06-28T07:19:10Z 2024-06-28T07:19:10Z by&#160;Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-2673-0">http://dx.doi.org/10.1007/1-4020-2673-0</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic Learning in a Random World ent://SD_ILS/0/SD_ILS:504342 2024-06-28T07:19:10Z 2024-06-28T07:19:10Z by&#160;Vovk, Vladimir. author.<br/><a href="http://dx.doi.org/10.1007/b106715">http://dx.doi.org/10.1007/b106715</a><br/>Format:&#160;Electronic Resources<br/>