Search Results for - Narrowed by: Computer Applications. - Computer Systems Organization and Communication Networks. - Information systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bApplications.$002509Computer$002bApplications.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bSystems$002bOrganization$002band$002bCommunication$002bNetworks.$002509Computer$002bSystems$002bOrganization$002band$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Information$002bsystems.$002509Information$002bsystems.$0026ps$003d300?2024-06-21T03:20:23ZApplications and Usability of Interactive Television 6th Iberoamerican Conference, jAUTI 2017, Aveiro, Portugal, October 12-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844622024-06-21T03:20:23Z2024-06-21T03:20:23Zby Abásolo, María José. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90170-1">https://doi.org/10.1007/978-3-319-90170-1</a><br/>Format: Electronic Resources<br/>Context-Aware Communication and Computing: Applications for Smart Environmentent://SD_ILS/0/SD_ILS:20873922024-06-21T03:20:23Z2024-06-21T03:20:23Zby Temdee, Punnarumol. author.<br/><a href="https://doi.org/10.1007/978-3-319-59035-6">https://doi.org/10.1007/978-3-319-59035-6</a><br/>Format: Electronic Resources<br/>Computer and Computing Technologies in Agriculture IX 9th IFIP WG 5.14 International Conference, CCTA 2015, Beijing, China, September 27-30, 2015, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20841842024-06-21T03:20:23Z2024-06-21T03:20:23Zby Li, Daoliang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48357-3">https://doi.org/10.1007/978-3-319-48357-3</a><br/>Format: Electronic Resources<br/>Computer and Computing Technologies in Agriculture IX 9th IFIP WG 5.14 International Conference, CCTA 2015, Beijing, China, September 27-30, 2015, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:20848372024-06-21T03:20:23Z2024-06-21T03:20:23Zby Li, Daoliang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48354-2">https://doi.org/10.1007/978-3-319-48354-2</a><br/>Format: Electronic Resources<br/>Agent Technology and e-Healthent://SD_ILS/0/SD_ILS:5038972024-06-21T03:20:23Z2024-06-21T03:20:23Zby Annicchiarico, Roberta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8547-7">http://dx.doi.org/10.1007/978-3-7643-8547-7</a><br/>Format: Electronic Resources<br/>Embedded Java Security Security for Mobile Devicesent://SD_ILS/0/SD_ILS:5086482024-06-21T03:20:23Z2024-06-21T03:20:23Zby Debbabi, Mourad. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-711-4">http://dx.doi.org/10.1007/978-1-84628-711-4</a><br/>Format: Electronic Resources<br/>