Search Results for - Narrowed by: Computers and Society. - Computational complexity.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computers$002band$002bSociety.$002509Computers$002band$002bSociety.$0026qf$003dSUBJECT$002509Subject$002509Computational$002bcomplexity.$002509Computational$002bcomplexity.$0026ps$003d300?2024-06-08T17:22:43ZDiagrammatic Representation and Inference 9th International Conference, Diagrams 2016, Philadelphia, PA, USA, August 7-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852282024-06-08T17:22:43Z2024-06-08T17:22:43Zby Jamnik, Mateja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42333-3">https://doi.org/10.1007/978-3-319-42333-3</a><br/>Format: Electronic Resources<br/>Internet and Network Economics 4th International Workshop, WINE 2008, Shanghai, China, December 17-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038542024-06-08T17:22:43Z2024-06-08T17:22:43Zby Papadimitriou, Christos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92185-1">http://dx.doi.org/10.1007/978-3-540-92185-1</a><br/>Format: Electronic Resources<br/>Algorithmic Game Theory First International Symposium, SAGT 2008, Paderborn, Germany, April 30-May 2, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035072024-06-08T17:22:43Z2024-06-08T17:22:43Zby Monien, Burkhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79309-0">http://dx.doi.org/10.1007/978-3-540-79309-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033872024-06-08T17:22:43Z2024-06-08T17:22:43Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-06-08T17:22:43Z2024-06-08T17:22:43Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5122482024-06-08T17:22:43Z2024-06-08T17:22:43Zby Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5127612024-06-08T17:22:43Z2024-06-08T17:22:43Zby Menezes, Alfred. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">http://dx.doi.org/10.1007/978-3-540-74143-5</a><br/>Format: Electronic Resources<br/>Internet and Network Economics Third International Workshop, WINE 2007, San Diego, CA, USA, December 12-14, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130132024-06-08T17:22:43Z2024-06-08T17:22:43Zby Deng, Xiaotie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77105-0">http://dx.doi.org/10.1007/978-3-540-77105-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5107492024-06-08T17:22:43Z2024-06-08T17:22:43Zby Halevi, Shai. editor.<br/><a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - CRYPTO 2006 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5114992024-06-08T17:22:43Z2024-06-08T17:22:43Zby Dwork, Cynthia. editor.<br/><a href="http://dx.doi.org/10.1007/11818175">http://dx.doi.org/10.1007/11818175</a><br/>Format: Electronic Resources<br/>Internet and Network Economics Second International Workshop, WINE 2006, Patras, Greece, December 15-17, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5120542024-06-08T17:22:43Z2024-06-08T17:22:43Zby Spirakis, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/11944874">http://dx.doi.org/10.1007/11944874</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097532024-06-08T17:22:43Z2024-06-08T17:22:43Zby Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2005 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5102532024-06-08T17:22:43Z2024-06-08T17:22:43Zby Shoup, Victor. editor.<br/><a href="http://dx.doi.org/10.1007/11535218">http://dx.doi.org/10.1007/11535218</a><br/>Format: Electronic Resources<br/>