Search Results for - Narrowed by: Computer Communication Networks. - Coding and Information Theory.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Coding$002band$002bInformation$002bTheory.$002509Coding$002band$002bInformation$002bTheory.$0026ps$003d300?2024-05-24T23:36:52ZIoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20–22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841612024-05-24T23:36:52Z2024-05-24T23:36:52Zby Lin, Yi-Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format: Electronic Resources<br/>Space Information Networks Second International Conference, SINC 2017, Yinchuan, China, August 10-11, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842872024-05-24T23:36:52Z2024-05-24T23:36:52Zby Yu, Quan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7877-4">https://doi.org/10.1007/978-981-10-7877-4</a><br/>Format: Electronic Resources<br/>Secure Networked Inference with Unreliable Data Sourcesent://SD_ILS/0/SD_ILS:20842482024-05-24T23:36:52Z2024-05-24T23:36:52Zby Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format: Electronic Resources<br/>Wireless and Satellite Systems 9th International Conference, WiSATS 2017, Oxford, UK, September 14-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841162024-05-24T23:36:52Z2024-05-24T23:36:52Zby Pillai, Prashant. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76571-6">https://doi.org/10.1007/978-3-319-76571-6</a><br/>Format: Electronic Resources<br/>Communications and Networking 12th International Conference, ChinaCom 2017, Xi’an, China, October 10-12, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20844802024-05-24T23:36:52Z2024-05-24T23:36:52Zby Li, Bo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78139-6">https://doi.org/10.1007/978-3-319-78139-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860402024-05-24T23:36:52Z2024-05-24T23:36:52Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Mobile Web and Intelligent Information Systems 15th International Conference, MobiWIS 2018, Barcelona, Spain, August 6-8, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854972024-05-24T23:36:52Z2024-05-24T23:36:52Zby Younas, Muhammad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97163-6">https://doi.org/10.1007/978-3-319-97163-6</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853702024-05-24T23:36:52Z2024-05-24T23:36:52Zby Galinina, Olga. editor. (orcid)0000-0002-5386-1061<br/><a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format: Electronic Resources<br/>Computer Systems Digital Design, Fundamentals of Computer Architecture and Assembly Languageent://SD_ILS/0/SD_ILS:20872092024-05-24T23:36:52Z2024-05-24T23:36:52Zby Elahi, Ata. author.<br/><a href="https://doi.org/10.1007/978-3-319-66775-1">https://doi.org/10.1007/978-3-319-66775-1</a><br/>Format: Electronic Resources<br/>Communications and Networking 12th International Conference, ChinaCom 2017, Xi’an, China, October 10-12, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20848072024-05-24T23:36:52Z2024-05-24T23:36:52Zby Li, Bo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78130-3">https://doi.org/10.1007/978-3-319-78130-3</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26–27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858482024-05-24T23:36:52Z2024-05-24T23:36:52Zby Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852902024-05-24T23:36:52Z2024-05-24T23:36:52Zby Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Communication Technologies for Vehicles 13th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2018, Madrid, Spain, May 17-18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20856442024-05-24T23:36:52Z2024-05-24T23:36:52Zby Moreno García-Loygorri, Juan. editor. (orcid)0000-0002-4626-1535<br/><a href="https://doi.org/10.1007/978-3-319-90371-2">https://doi.org/10.1007/978-3-319-90371-2</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855512024-05-24T23:36:52Z2024-05-24T23:36:52Zby Budaghyan, Lilya. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05153-2">https://doi.org/10.1007/978-3-030-05153-2</a><br/>Format: Electronic Resources<br/>Autonomous Control for a Reliable Internet of Services Methods, Models, Approaches, Techniques, Algorithms, and Toolsent://SD_ILS/0/SD_ILS:20857822024-05-24T23:36:52Z2024-05-24T23:36:52Zby Ganchev, Ivan. editor. (orcid)0000-0003-0535-7087<br/><a href="https://doi.org/10.1007/978-3-319-90415-3">https://doi.org/10.1007/978-3-319-90415-3</a><br/>Format: Electronic Resources<br/>Algorithmic Game Theory 11th International Symposium, SAGT 2018, Beijing, China, September 11-14, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853482024-05-24T23:36:52Z2024-05-24T23:36:52Zby Deng, Xiaotie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99660-8">https://doi.org/10.1007/978-3-319-99660-8</a><br/>Format: Electronic Resources<br/>Cognitive Radio Oriented Wireless Networks 12th International Conference, CROWNCOM 2017, Lisbon, Portugal, September 20-21, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848042024-05-24T23:36:52Z2024-05-24T23:36:52Zby Marques, Paulo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76207-4">https://doi.org/10.1007/978-3-319-76207-4</a><br/>Format: Electronic Resources<br/>Innovations for Community Services 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846442024-05-24T23:36:52Z2024-05-24T23:36:52Zby Fahrnberger, Günter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49466-1">https://doi.org/10.1007/978-3-319-49466-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850452024-05-24T23:36:52Z2024-05-24T23:36:52Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49148-6">https://doi.org/10.1007/978-3-319-49148-6</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857902024-05-24T23:36:52Z2024-05-24T23:36:52Zby Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29485-8">https://doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857262024-05-24T23:36:52Z2024-05-24T23:36:52Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860172024-05-24T23:36:52Z2024-05-24T23:36:52Zby Nascimento, Anderson C.A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49175-2">https://doi.org/10.1007/978-3-319-49175-2</a><br/>Format: Electronic Resources<br/>Economics of Grids, Clouds, Systems, and Services 12th International Conference, GECON 2015, Cluj-Napoca, Romania, September 15-17, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855602024-05-24T23:36:52Z2024-05-24T23:36:52Zby Altmann, Jörn. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43177-2">https://doi.org/10.1007/978-3-319-43177-2</a><br/>Format: Electronic Resources<br/>Network Coding at Different Layers in Wireless Networksent://SD_ILS/0/SD_ILS:20869442024-05-24T23:36:52Z2024-05-24T23:36:52Zby Qin, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29770-5">https://doi.org/10.1007/978-3-319-29770-5</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859212024-05-24T23:36:52Z2024-05-24T23:36:52Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30303-1">https://doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856472024-05-24T23:36:52Z2024-05-24T23:36:52Zby Duquesne, Sylvain. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55227-9">https://doi.org/10.1007/978-3-319-55227-9</a><br/>Format: Electronic Resources<br/>Information and Communications Security 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037672024-05-24T23:36:52Z2024-05-24T23:36:52Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88625-9">http://dx.doi.org/10.1007/978-3-540-88625-9</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2008 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035762024-05-24T23:36:52Z2024-05-24T23:36:52Zby Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85053-3">http://dx.doi.org/10.1007/978-3-540-85053-3</a><br/>Format: Electronic Resources<br/>Encyclopedia of Multimediaent://SD_ILS/0/SD_ILS:5019572024-05-24T23:36:52Z2024-05-24T23:36:52Zby Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-78414-4">http://dx.doi.org/10.1007/978-0-387-78414-4</a><br/>Format: Electronic Resources<br/>Analysis of Computer and Communication Networksent://SD_ILS/0/SD_ILS:5017882024-05-24T23:36:52Z2024-05-24T23:36:52Zby Gebali, Fayez. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74437-7">http://dx.doi.org/10.1007/978-0-387-74437-7</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:5016902024-05-24T23:36:52Z2024-05-24T23:36:52Zby Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5037912024-05-24T23:36:52Z2024-05-24T23:36:52Zby Schulzrinne, Henning. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-05-24T23:36:52Z2024-05-24T23:36:52Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Precoding Techniques for Digital Communication Systemsent://SD_ILS/0/SD_ILS:5016802024-05-24T23:36:52Z2024-05-24T23:36:52Zby Kuo, C.-C. Jay. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71769-2">http://dx.doi.org/10.1007/978-0-387-71769-2</a><br/>Format: Electronic Resources<br/>Cryptanalytic Attacks on RSAent://SD_ILS/0/SD_ILS:5015842024-05-24T23:36:52Z2024-05-24T23:36:52Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48742-7">http://dx.doi.org/10.1007/978-0-387-48742-7</a><br/>Format: Electronic Resources<br/>Electronic Postage Systems Technology, Security, Economicsent://SD_ILS/0/SD_ILS:5055712024-05-24T23:36:52Z2024-05-24T23:36:52Zby Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:5056282024-05-24T23:36:52Z2024-05-24T23:36:52Zby Liu, Donggang. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46781-8">http://dx.doi.org/10.1007/978-0-387-46781-8</a><br/>Format: Electronic Resources<br/>Malware Detectionent://SD_ILS/0/SD_ILS:5055692024-05-24T23:36:52Z2024-05-24T23:36:52Zby Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networksent://SD_ILS/0/SD_ILS:5056122024-05-24T23:36:52Z2024-05-24T23:36:52Zby Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126752024-05-24T23:36:52Z2024-05-24T23:36:52Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>Sequences, Subsequences, and Consequences International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papersent://SD_ILS/0/SD_ILS:5130372024-05-24T23:36:52Z2024-05-24T23:36:52Zby Golomb, Solomon W. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77404-4">http://dx.doi.org/10.1007/978-3-540-77404-4</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130232024-05-24T23:36:52Z2024-05-24T23:36:52Zby Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Guide to Wireless Network Securityent://SD_ILS/0/SD_ILS:5049532024-05-24T23:36:52Z2024-05-24T23:36:52Zby Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Applications for Communications Securityent://SD_ILS/0/SD_ILS:5044612024-05-24T23:36:52Z2024-05-24T23:36:52Zby Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Computer Viruses and Malwareent://SD_ILS/0/SD_ILS:5052842024-05-24T23:36:52Z2024-05-24T23:36:52Zby Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Hop Integrity in the Internetent://SD_ILS/0/SD_ILS:5049162024-05-24T23:36:52Z2024-05-24T23:36:52Zby Huang, Chin-Tser. author.<br/><a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format: Electronic Resources<br/>CryptoGraphics Exploiting Graphics Cards for Securityent://SD_ILS/0/SD_ILS:5052852024-05-24T23:36:52Z2024-05-24T23:36:52Zby Cook, Debra L. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format: Electronic Resources<br/>Encyclopedia of Multimediaent://SD_ILS/0/SD_ILS:5049632024-05-24T23:36:52Z2024-05-24T23:36:52Zby Furht, Borko. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-30038-4">http://dx.doi.org/10.1007/0-387-30038-4</a><br/>Format: Electronic Resources<br/>Orthogonal Frequency Division Multiplexing for Wireless Communicationsent://SD_ILS/0/SD_ILS:5049782024-05-24T23:36:52Z2024-05-24T23:36:52Zby Li, Ye. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-30235-2">http://dx.doi.org/10.1007/0-387-30235-2</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Exercise Bookent://SD_ILS/0/SD_ILS:5048372024-05-24T23:36:52Z2024-05-24T23:36:52Zby Baigèneres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5112782024-05-24T23:36:52Z2024-05-24T23:36:52Zby Batten, Lynn Margaret. editor.<br/><a href="http://dx.doi.org/10.1007/11780656">http://dx.doi.org/10.1007/11780656</a><br/>Format: Electronic Resources<br/>Foundations of Computer Securityent://SD_ILS/0/SD_ILS:5085252024-05-24T23:36:52Z2024-05-24T23:36:52Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format: Electronic Resources<br/>Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5112882024-05-24T23:36:52Z2024-05-24T23:36:52Zby Ytrehus, Øyvind. editor.<br/><a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format: Electronic Resources<br/>The Multimedia Internetent://SD_ILS/0/SD_ILS:5046692024-05-24T23:36:52Z2024-05-24T23:36:52Zby Weinstein, Stephen. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27603-3">http://dx.doi.org/10.1007/0-387-27603-3</a><br/>Format: Electronic Resources<br/>Intrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:5041652024-05-24T23:36:52Z2024-05-24T23:36:52Zby Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5101352024-05-24T23:36:52Z2024-05-24T23:36:52Zby Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/b137750">http://dx.doi.org/10.1007/b137750</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106442024-05-24T23:36:52Z2024-05-24T23:36:52Zby Smart, Nigel P. editor.<br/><a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format: Electronic Resources<br/>