Search Results for - Narrowed by: Management of Computing and Information Systems. - IYTE LibrarySirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dLIBRARY$002509Library$0025091$00253AIYTE$002509IYTE$002bLibrary$0026ps$003d300?2024-06-06T21:41:09ZEnterprise Modeling Facilitating the Process and the Peopleent://SD_ILS/0/SD_ILS:20843422024-06-06T21:41:09Z2024-06-06T21:41:09Zby Stirna, Janis. author. (orcid)0000-0002-3669-832X<br/><a href="https://doi.org/10.1007/978-3-319-94857-7">https://doi.org/10.1007/978-3-319-94857-7</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management to Support Industry 4.0 15th IFIP WG 5.1 International Conference, PLM 2018, Turin, Italy, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843532024-06-06T21:41:09Z2024-06-06T21:41:09Zby Chiabert, Paolo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01614-2">https://doi.org/10.1007/978-3-030-01614-2</a><br/>Format: Electronic Resources<br/>Semantic Applications Methodology, Technology, Corporate Useent://SD_ILS/0/SD_ILS:20844512024-06-06T21:41:09Z2024-06-06T21:41:09Zby Hoppe, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-55433-3">https://doi.org/10.1007/978-3-662-55433-3</a><br/>Format: Electronic Resources<br/>Health Informatics on FHIR: How HL7's New API is Transforming Healthcareent://SD_ILS/0/SD_ILS:20842472024-06-06T21:41:09Z2024-06-06T21:41:09Zby Braunstein, Mark L. author.<br/><a href="https://doi.org/10.1007/978-3-319-93414-3">https://doi.org/10.1007/978-3-319-93414-3</a><br/>Format: Electronic Resources<br/>Combinatorial Image Analysis 19th International Workshop, IWCIA 2018, Porto, Portugal, November 22–24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852812024-06-06T21:41:09Z2024-06-06T21:41:09Zby Barneva, Reneta P. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05288-1">https://doi.org/10.1007/978-3-030-05288-1</a><br/>Format: Electronic Resources<br/>Handbook of Mobile Data Privacyent://SD_ILS/0/SD_ILS:20843032024-06-06T21:41:09Z2024-06-06T21:41:09Zby Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Information Literacy in the Workplace 5th European Conference, ECIL 2017, Saint Malo, France, September 18-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847982024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74334-9">https://doi.org/10.1007/978-3-319-74334-9</a><br/>Format: Electronic Resources<br/>Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860372024-06-06T21:41:09Z2024-06-06T21:41:09Zby Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91635-4">https://doi.org/10.1007/978-3-319-91635-4</a><br/>Format: Electronic Resources<br/>Fog Computing Concepts, Frameworks and Technologiesent://SD_ILS/0/SD_ILS:20849832024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94890-4">https://doi.org/10.1007/978-3-319-94890-4</a><br/>Format: Electronic Resources<br/>Software Development Measurement Programs Development, Management and Evolutionent://SD_ILS/0/SD_ILS:20849912024-06-06T21:41:09Z2024-06-06T21:41:09Zby Staron, Miroslaw. author.<br/><a href="https://doi.org/10.1007/978-3-319-91836-5">https://doi.org/10.1007/978-3-319-91836-5</a><br/>Format: Electronic Resources<br/>Sailing Routes in the World of Computation 14th Conference on Computability in Europe, CiE 2018, Kiel, Germany, July 30 – August 3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851242024-06-06T21:41:09Z2024-06-06T21:41:09Zby Manea, Florin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94418-0">https://doi.org/10.1007/978-3-319-94418-0</a><br/>Format: Electronic Resources<br/>Software Business 9th International Conference, ICSOB 2018, Tallinn, Estonia, June 11–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843512024-06-06T21:41:09Z2024-06-06T21:41:09Zby Wnuk, Krzysztof. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04840-2">https://doi.org/10.1007/978-3-030-04840-2</a><br/>Format: Electronic Resources<br/>Align Client and Provider Perspectives Best Practices in IT Outsourcingent://SD_ILS/0/SD_ILS:20841892024-06-06T21:41:09Z2024-06-06T21:41:09Zby Haas, Lionel. author.<br/><a href="https://doi.org/10.1007/978-3-319-92064-1">https://doi.org/10.1007/978-3-319-92064-1</a><br/>Format: Electronic Resources<br/>Cybersecurity in China The Next Waveent://SD_ILS/0/SD_ILS:20841182024-06-06T21:41:09Z2024-06-06T21:41:09Zby Austin, Greg. author.<br/><a href="https://doi.org/10.1007/978-3-319-68436-9">https://doi.org/10.1007/978-3-319-68436-9</a><br/>Format: Electronic Resources<br/>Advanced Computing Strategies for Engineering 25th EG-ICE International Workshop 2018, Lausanne, Switzerland, June 10-13, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851172024-06-06T21:41:09Z2024-06-06T21:41:09Zby Smith, Ian F. C. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91638-5">https://doi.org/10.1007/978-3-319-91638-5</a><br/>Format: Electronic Resources<br/>Economic Models for Managing Cloud Servicesent://SD_ILS/0/SD_ILS:20848992024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mistry, Sajib. author.<br/><a href="https://doi.org/10.1007/978-3-319-73876-5">https://doi.org/10.1007/978-3-319-73876-5</a><br/>Format: Electronic Resources<br/>The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?ent://SD_ILS/0/SD_ILS:20849012024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lysne, Olav. author.<br/><a href="https://doi.org/10.1007/978-3-319-74950-1">https://doi.org/10.1007/978-3-319-74950-1</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 19th International Conference, XP 2018, Porto, Portugal, May 21–25, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20844832024-06-06T21:41:09Z2024-06-06T21:41:09Zby Garbajosa, Juan. editor. (orcid)0000-0003-0161-3485<br/><a href="https://doi.org/10.1007/978-3-319-91602-6">https://doi.org/10.1007/978-3-319-91602-6</a><br/>Format: Electronic Resources<br/>Graphics Recognition. Current Trends and Evolutions 12th IAPR International Workshop, GREC 2017, Kyoto, Japan, November 9-10, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20853012024-06-06T21:41:09Z2024-06-06T21:41:09Zby Fornés, Alicia. editor. (orcid)0000-0002-9692-5336<br/><a href="https://doi.org/10.1007/978-3-030-02284-6">https://doi.org/10.1007/978-3-030-02284-6</a><br/>Format: Electronic Resources<br/>The Agile Safety Caseent://SD_ILS/0/SD_ILS:20849612024-06-06T21:41:09Z2024-06-06T21:41:09Zby Myklebust, Thor. author.<br/><a href="https://doi.org/10.1007/978-3-319-70265-0">https://doi.org/10.1007/978-3-319-70265-0</a><br/>Format: Electronic Resources<br/>Proceedings of the Eleventh International Conference on Management Science and Engineering Managementent://SD_ILS/0/SD_ILS:20882812024-06-06T21:41:09Z2024-06-06T21:41:09Zby Xu, Jiuping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59280-0">https://doi.org/10.1007/978-3-319-59280-0</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847972024-06-06T21:41:09Z2024-06-06T21:41:09Zby Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Collaborative Networks of Cognitive Systems 19th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2018, Cardiff, UK, September 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842582024-06-06T21:41:09Z2024-06-06T21:41:09Zby Camarinha-Matos, Luis M. editor. (orcid)0000-0003-0594-1961<br/><a href="https://doi.org/10.1007/978-3-319-99127-6">https://doi.org/10.1007/978-3-319-99127-6</a><br/>Format: Electronic Resources<br/>Cyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:20869802024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Information Technology - New Generations 14th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:20875522024-06-06T21:41:09Z2024-06-06T21:41:09Zby Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54978-1">https://doi.org/10.1007/978-3-319-54978-1</a><br/>Format: Electronic Resources<br/>Computer and Information Scienceent://SD_ILS/0/SD_ILS:20882152024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lee, Roger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60170-0">https://doi.org/10.1007/978-3-319-60170-0</a><br/>Format: Electronic Resources<br/>Agile Methods 8th Brazilian Workshop, WBMA 2017, Belém, Brazil, September 13–14, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841852024-06-06T21:41:09Z2024-06-06T21:41:09Zby Santos, Viviane Almeida dos. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73673-0">https://doi.org/10.1007/978-3-319-73673-0</a><br/>Format: Electronic Resources<br/>Smart Cities Development and Governance Frameworksent://SD_ILS/0/SD_ILS:20844502024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76669-0">https://doi.org/10.1007/978-3-319-76669-0</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 25th European Conference, EuroSPI 2018, Bilbao, Spain, September 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842112024-06-06T21:41:09Z2024-06-06T21:41:09Zby Larrucea, Xabier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97925-0">https://doi.org/10.1007/978-3-319-97925-0</a><br/>Format: Electronic Resources<br/>Project Management at the Edge of Chaos Social Techniques for Complex Systemsent://SD_ILS/0/SD_ILS:20846982024-06-06T21:41:09Z2024-06-06T21:41:09Zby Oswald, Alfred. author.<br/><a href="https://doi.org/10.1007/978-3-662-48261-2">https://doi.org/10.1007/978-3-662-48261-2</a><br/>Format: Electronic Resources<br/>Towards Extensible and Adaptable Methods in Computingent://SD_ILS/0/SD_ILS:20844102024-06-06T21:41:09Z2024-06-06T21:41:09Zby Chakraverty, Shampa. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2348-5">https://doi.org/10.1007/978-981-13-2348-5</a><br/>Format: Electronic Resources<br/>Crowdsourcing of Sensor Cloud Servicesent://SD_ILS/0/SD_ILS:20847192024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ghari Neiat, Azadeh. author.<br/><a href="https://doi.org/10.1007/978-3-319-91536-4">https://doi.org/10.1007/978-3-319-91536-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855382024-06-06T21:41:09Z2024-06-06T21:41:09Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852902024-06-06T21:41:09Z2024-06-06T21:41:09Zby Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2018 The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855792024-06-06T21:41:09Z2024-06-06T21:41:09Zby Smart, Nigel P. editor. (orcid)0000-0003-3567-3304<br/><a href="https://doi.org/10.1007/978-3-319-76953-0">https://doi.org/10.1007/978-3-319-76953-0</a><br/>Format: Electronic Resources<br/>Bidirectional Transformations International Summer School, Oxford, UK, July 25-29, 2016, Tutorial Lecturesent://SD_ILS/0/SD_ILS:20856412024-06-06T21:41:09Z2024-06-06T21:41:09Zby Gibbons, Jeremy. editor. (orcid)0000-0002-8426-9917<br/><a href="https://doi.org/10.1007/978-3-319-79108-1">https://doi.org/10.1007/978-3-319-79108-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855232024-06-06T21:41:09Z2024-06-06T21:41:09Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Automated Invention for Smart Industries 18th International TRIZ Future Conference, TFC 2018, Strasbourg, France, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20841812024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cavallucci, Denis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02456-7">https://doi.org/10.1007/978-3-030-02456-7</a><br/>Format: Electronic Resources<br/>The Essence of Software Engineeringent://SD_ILS/0/SD_ILS:20846632024-06-06T21:41:09Z2024-06-06T21:41:09Zby Gruhn, Volker. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73897-0">https://doi.org/10.1007/978-3-319-73897-0</a><br/>Format: Electronic Resources<br/>Software Process Improvement and Capability Determination 18th International Conference, SPICE 2018, Thessaloniki, Greece, October 9–10, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20843292024-06-06T21:41:09Z2024-06-06T21:41:09Zby Stamelos, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00623-5">https://doi.org/10.1007/978-3-030-00623-5</a><br/>Format: Electronic Resources<br/>Software Quality: Methods and Tools for Better Software and Systems 10th International Conference, SWQD 2018, Vienna, Austria, January 16–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20845722024-06-06T21:41:09Z2024-06-06T21:41:09Zby Winkler, Dietmar. editor. (orcid)0000-0002-4743-3124<br/><a href="https://doi.org/10.1007/978-3-319-71440-0">https://doi.org/10.1007/978-3-319-71440-0</a><br/>Format: Electronic Resources<br/>IT Management The art of managing IT based on a solid framework leveraging the company´s political ecosystement://SD_ILS/0/SD_ILS:20846622024-06-06T21:41:09Z2024-06-06T21:41:09Zby Pilorget, Lionel. author.<br/><a href="https://doi.org/10.1007/978-3-658-19309-6">https://doi.org/10.1007/978-3-658-19309-6</a><br/>Format: Electronic Resources<br/>A Knowledge Representation Practionary Guidelines Based on Charles Sanders Peirceent://SD_ILS/0/SD_ILS:20843832024-06-06T21:41:09Z2024-06-06T21:41:09Zby Bergman, Michael K. author.<br/><a href="https://doi.org/10.1007/978-3-319-98092-8">https://doi.org/10.1007/978-3-319-98092-8</a><br/>Format: Electronic Resources<br/>Software Processes and Life Cycle Models An Introduction to Modelling, Using and Managing Agile, Plan-Driven and Hybrid Processesent://SD_ILS/0/SD_ILS:20842212024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kneuper, Ralf. author.<br/><a href="https://doi.org/10.1007/978-3-319-98845-0">https://doi.org/10.1007/978-3-319-98845-0</a><br/>Format: Electronic Resources<br/>Nordic Contributions in IS Research 9th Scandinavian Conference on Information Systems, SCIS 2018, Odder, Denmark, August 5–8, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20849292024-06-06T21:41:09Z2024-06-06T21:41:09Zby Müller, Sune Dueholm. editor. (orcid)0000-0003-3194-0233<br/><a href="https://doi.org/10.1007/978-3-319-96367-9">https://doi.org/10.1007/978-3-319-96367-9</a><br/>Format: Electronic Resources<br/>Thinking-Driven Testing The Most Reasonable Approach to Quality Controlent://SD_ILS/0/SD_ILS:20846962024-06-06T21:41:09Z2024-06-06T21:41:09Zby Roman, Adam. author.<br/><a href="https://doi.org/10.1007/978-3-319-73195-7">https://doi.org/10.1007/978-3-319-73195-7</a><br/>Format: Electronic Resources<br/>SafeScrum® – Agile Development of Safety-Critical Softwareent://SD_ILS/0/SD_ILS:20842732024-06-06T21:41:09Z2024-06-06T21:41:09Zby Hanssen, Geir Kjetil. author.<br/><a href="https://doi.org/10.1007/978-3-319-99334-8">https://doi.org/10.1007/978-3-319-99334-8</a><br/>Format: Electronic Resources<br/>Transforming the IT Services Lifecycle with AI Technologiesent://SD_ILS/0/SD_ILS:20843102024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kloeckner, Kristof. author.<br/><a href="https://doi.org/10.1007/978-3-319-94048-9">https://doi.org/10.1007/978-3-319-94048-9</a><br/>Format: Electronic Resources<br/>Applications and Usability of Interactive Television 6th Iberoamerican Conference, jAUTI 2017, Aveiro, Portugal, October 12-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844622024-06-06T21:41:09Z2024-06-06T21:41:09Zby Abásolo, María José. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90170-1">https://doi.org/10.1007/978-3-319-90170-1</a><br/>Format: Electronic Resources<br/>Data Privacy Gamesent://SD_ILS/0/SD_ILS:20845012024-06-06T21:41:09Z2024-06-06T21:41:09Zby Xu, Lei. author.<br/><a href="https://doi.org/10.1007/978-3-319-77965-2">https://doi.org/10.1007/978-3-319-77965-2</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Languages, Methods, and Tools for Systems Engineering 10th International Conference, SAM 2018, Copenhagen, Denmark, October 15–16, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854082024-06-06T21:41:09Z2024-06-06T21:41:09Zby Khendek, Ferhat. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01042-3">https://doi.org/10.1007/978-3-030-01042-3</a><br/>Format: Electronic Resources<br/>Introducing ethereum and solidity : foundations of cryptocurrency and blockchain programming for beginnersent://SD_ILS/0/SD_ILS:23128782024-06-06T21:41:09Z2024-06-06T21:41:09Zby Dannen, Chris, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484225356/?ar">https://learning.oreilly.com/library/view/~/9781484225356/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484225356/?ar">https://go.oreilly.com/library-access/library/view/-/9781484225356/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484225356">https://learning.oreilly.com/library/view/~/9781484225356</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850872024-06-06T21:41:09Z2024-06-06T21:41:09Zby Grabowski, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46613-2">https://doi.org/10.1007/978-3-319-46613-2</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850892024-06-06T21:41:09Z2024-06-06T21:41:09Zby Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850972024-06-06T21:41:09Z2024-06-06T21:41:09Zby Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Testing Software and Systems 28th IFIP WG 6.1 International Conference, ICTSS 2016, Graz, Austria, October 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854412024-06-06T21:41:09Z2024-06-06T21:41:09Zby Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47443-4">https://doi.org/10.1007/978-3-319-47443-4</a><br/>Format: Electronic Resources<br/>Advances in Computing Applicationsent://SD_ILS/0/SD_ILS:20844742024-06-06T21:41:09Z2024-06-06T21:41:09Zby Chakrabarti, Amlan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2630-0">https://doi.org/10.1007/978-981-10-2630-0</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857282024-06-06T21:41:09Z2024-06-06T21:41:09Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-06-06T21:41:09Z2024-06-06T21:41:09Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857322024-06-06T21:41:09Z2024-06-06T21:41:09Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857352024-06-06T21:41:09Z2024-06-06T21:41:09Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Transactions on Modularity and Composition Ient://SD_ILS/0/SD_ILS:20858312024-06-06T21:41:09Z2024-06-06T21:41:09Zby Chiba, Shigeru. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46969-0">https://doi.org/10.1007/978-3-319-46969-0</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20858402024-06-06T21:41:09Z2024-06-06T21:41:09Zby Yang, Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42836-9">https://doi.org/10.1007/978-3-319-42836-9</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860662024-06-06T21:41:09Z2024-06-06T21:41:09Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20859622024-06-06T21:41:09Z2024-06-06T21:41:09Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20856852024-06-06T21:41:09Z2024-06-06T21:41:09Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Web Services, Formal Methods, and Behavioral Types 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860782024-06-06T21:41:09Z2024-06-06T21:41:09Zby Hildebrandt, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33612-1">https://doi.org/10.1007/978-3-319-33612-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20860792024-06-06T21:41:09Z2024-06-06T21:41:09Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857132024-06-06T21:41:09Z2024-06-06T21:41:09Zby Standaert, François-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861262024-06-06T21:41:09Z2024-06-06T21:41:09Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854282024-06-06T21:41:09Z2024-06-06T21:41:09Zby Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854302024-06-06T21:41:09Z2024-06-06T21:41:09Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854432024-06-06T21:41:09Z2024-06-06T21:41:09Zby Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 23rd European Conference, EuroSPI 2016, Graz, Austria, September 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848852024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kreiner, Christian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44817-6">https://doi.org/10.1007/978-3-319-44817-6</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859282024-06-06T21:41:09Z2024-06-06T21:41:09Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857442024-06-06T21:41:09Z2024-06-06T21:41:09Zby Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:20858582024-06-06T21:41:09Z2024-06-06T21:41:09Zby Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Mathematical and Engineering Methods in Computer Science 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23–25, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20855252024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kofroň, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29817-7">https://doi.org/10.1007/978-3-319-29817-7</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762024-06-06T21:41:09Z2024-06-06T21:41:09Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing – ICSOC 2015 Workshops WESOA, RMSOC, ISC, DISCO, WESE, BSCI, FOR-MOVES, Goa, India, November 16-19, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858682024-06-06T21:41:09Z2024-06-06T21:41:09Zby Norta, Alex. editor.<br/><a href="https://doi.org/10.1007/978-3-662-50539-7">https://doi.org/10.1007/978-3-662-50539-7</a><br/>Format: Electronic Resources<br/>Managing Software Process Evolution Traditional, Agile and Beyond – How to Handle Process Changeent://SD_ILS/0/SD_ILS:20850102024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kuhrmann, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31545-4">https://doi.org/10.1007/978-3-319-31545-4</a><br/>Format: Electronic Resources<br/>Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857682024-06-06T21:41:09Z2024-06-06T21:41:09Zby La Rosa, Marcello. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45348-4">https://doi.org/10.1007/978-3-319-45348-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-06-06T21:41:09Z2024-06-06T21:41:09Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859862024-06-06T21:41:09Z2024-06-06T21:41:09Zby Badonnel, Rémi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Information and Communications Security 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856982024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lam, Kwok-Yan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50011-9">https://doi.org/10.1007/978-3-319-50011-9</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 22nd International Working Conference, REFSQ 2016, Gothenburg, Sweden, March 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857012024-06-06T21:41:09Z2024-06-06T21:41:09Zby Daneva, Maya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30282-9">https://doi.org/10.1007/978-3-319-30282-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860952024-06-06T21:41:09Z2024-06-06T21:41:09Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857042024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20858002024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858022024-06-06T21:41:09Z2024-06-06T21:41:09Zby Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859962024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mattoso, Marta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40593-3">https://doi.org/10.1007/978-3-319-40593-3</a><br/>Format: Electronic Resources<br/>Modelling Foundations and Applications 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858202024-06-06T21:41:09Z2024-06-06T21:41:09Zby Wąsowski, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-319-42061-5">https://doi.org/10.1007/978-3-319-42061-5</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861582024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format: Electronic Resources<br/>Software Quality. The Future of Systems- and Software Development 8th International Conference, SWQD 2016, Vienna, Austria, January 18-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20844382024-06-06T21:41:09Z2024-06-06T21:41:09Zby Winkler, Dietmar. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27033-3">https://doi.org/10.1007/978-3-319-27033-3</a><br/>Format: Electronic Resources<br/>Managing Information Technologyent://SD_ILS/0/SD_ILS:20840892024-06-06T21:41:09Z2024-06-06T21:41:09Zby Castillo, Francisco. author.<br/><a href="https://doi.org/10.1007/978-3-319-38891-5">https://doi.org/10.1007/978-3-319-38891-5</a><br/>Format: Electronic Resources<br/>Evaluation of Novel Approaches to Software Engineering 10th International Conference, ENASE 2015, Barcelona, Spain, April 29–30, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844142024-06-06T21:41:09Z2024-06-06T21:41:09Zby Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30243-0">https://doi.org/10.1007/978-3-319-30243-0</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-06-06T21:41:09Z2024-06-06T21:41:09Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20857362024-06-06T21:41:09Z2024-06-06T21:41:09Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20857372024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Model and Data Engineering 6th International Conference, MEDI 2016, Almería, Spain, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856142024-06-06T21:41:09Z2024-06-06T21:41:09Zby Bellatreche, Ladjel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45547-1">https://doi.org/10.1007/978-3-319-45547-1</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859532024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860592024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857092024-06-06T21:41:09Z2024-06-06T21:41:09Zby Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Transactions on Computational Collective Intelligence XXVent://SD_ILS/0/SD_ILS:20857182024-06-06T21:41:09Z2024-06-06T21:41:09Zby Nguyen, Ngoc Thanh. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53580-6">https://doi.org/10.1007/978-3-662-53580-6</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860032024-06-06T21:41:09Z2024-06-06T21:41:09Zby Sheng, Quan Z. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46295-0">https://doi.org/10.1007/978-3-319-46295-0</a><br/>Format: Electronic Resources<br/>Transactions on Foundations for Mastering Change Ient://SD_ILS/0/SD_ILS:20861172024-06-06T21:41:09Z2024-06-06T21:41:09Zby Steffen, Bernhard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46508-1">https://doi.org/10.1007/978-3-319-46508-1</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-06-06T21:41:09Z2024-06-06T21:41:09Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Logistics and Supply Chain Innovation Bridging the Gap between Theory and Practiceent://SD_ILS/0/SD_ILS:20866922024-06-06T21:41:09Z2024-06-06T21:41:09Zby Zijm, Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-22288-2">https://doi.org/10.1007/978-3-319-22288-2</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability VII Enterprise Interoperability in the Digitized and Networked Factory of the Futureent://SD_ILS/0/SD_ILS:20876942024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mertins, Kai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30957-6">https://doi.org/10.1007/978-3-319-30957-6</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852382024-06-06T21:41:09Z2024-06-06T21:41:09Zby Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20852462024-06-06T21:41:09Z2024-06-06T21:41:09Zby Sun, Xingming. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48671-0">https://doi.org/10.1007/978-3-319-48671-0</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852562024-06-06T21:41:09Z2024-06-06T21:41:09Zby Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Software Architecture 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852602024-06-06T21:41:09Z2024-06-06T21:41:09Zby Tekinerdogan, Bedir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48992-6">https://doi.org/10.1007/978-3-319-48992-6</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 17th International Conference, PROFES 2016, Trondheim, Norway, November 22-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852622024-06-06T21:41:09Z2024-06-06T21:41:09Zby Abrahamsson, Pekka. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49094-6">https://doi.org/10.1007/978-3-319-49094-6</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392024-06-06T21:41:09Z2024-06-06T21:41:09Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Social Media: The Good, the Bad, and the Ugly 15th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2016, Swansea, UK, September 13–15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20851962024-06-06T21:41:09Z2024-06-06T21:41:09Zby Dwivedi, Yogesh K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45234-0">https://doi.org/10.1007/978-3-319-45234-0</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850152024-06-06T21:41:09Z2024-06-06T21:41:09Zby Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850162024-06-06T21:41:09Z2024-06-06T21:41:09Zby Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860062024-06-06T21:41:09Z2024-06-06T21:41:09Zby Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850952024-06-06T21:41:09Z2024-06-06T21:41:09Zby Madsen, Tatiana K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51376-8">https://doi.org/10.1007/978-3-319-51376-8</a><br/>Format: Electronic Resources<br/>Evaluation of Novel Approaches to Software Engineering 11th International Conference, ENASE 2016, Rome, Italy, April 27–28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20843672024-06-06T21:41:09Z2024-06-06T21:41:09Zby Maciaszek, Leszek A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56390-9">https://doi.org/10.1007/978-3-319-56390-9</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847772024-06-06T21:41:09Z2024-06-06T21:41:09Zby Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Software Technologies 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849412024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lorenz, Pascal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30142-6">https://doi.org/10.1007/978-3-319-30142-6</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847162024-06-06T21:41:09Z2024-06-06T21:41:09Zby Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854652024-06-06T21:41:09Z2024-06-06T21:41:09Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855852024-06-06T21:41:09Z2024-06-06T21:41:09Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Formal Methods: Foundations and Applications 19th Brazilian Symposium, SBMF 2016, Natal, Brazil, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856182024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ribeiro, Leila. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49815-7">https://doi.org/10.1007/978-3-319-49815-7</a><br/>Format: Electronic Resources<br/>Open Source Systems: Integrating Communities 12th IFIP WG 2.13 International Conference, OSS 2016, Gothenburg, Sweden, May 30 - June 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20849992024-06-06T21:41:09Z2024-06-06T21:41:09Zby Crowston, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39225-7">https://doi.org/10.1007/978-3-319-39225-7</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20860622024-06-06T21:41:09Z2024-06-06T21:41:09Zby Bécue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632024-06-06T21:41:09Z2024-06-06T21:41:09Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Software Engineering for Resilient Systems 8th International Workshop, SERENE 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858982024-06-06T21:41:09Z2024-06-06T21:41:09Zby Crnkovic, Ivica. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45892-2">https://doi.org/10.1007/978-3-319-45892-2</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860872024-06-06T21:41:09Z2024-06-06T21:41:09Zby Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860992024-06-06T21:41:09Z2024-06-06T21:41:09Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857262024-06-06T21:41:09Z2024-06-06T21:41:09Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850822024-06-06T21:41:09Z2024-06-06T21:41:09Zby Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861442024-06-06T21:41:09Z2024-06-06T21:41:09Zby Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format: Electronic Resources<br/>Information Technology for Management Federated Conference on Computer Science and Information Systems, ISM 2015 and AITM 2015, Lodz, Poland, September 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20843342024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ziemba, Ewa. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30528-8">https://doi.org/10.1007/978-3-319-30528-8</a><br/>Format: Electronic Resources<br/>Cloud Computing and Services Science 5th International Conference, CLOSER 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20845542024-06-06T21:41:09Z2024-06-06T21:41:09Zby Helfert, Markus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29582-4">https://doi.org/10.1007/978-3-319-29582-4</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management for Digital Transformation of Industries 13th IFIP WG 5.1 International Conference, PLM 2016, Columbia, SC, USA, July 11-13, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841082024-06-06T21:41:09Z2024-06-06T21:41:09Zby Harik, Ramy. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54660-5">https://doi.org/10.1007/978-3-319-54660-5</a><br/>Format: Electronic Resources<br/>Advanced Multimedia and Ubiquitous Engineering FutureTech & MUEent://SD_ILS/0/SD_ILS:20840362024-06-06T21:41:09Z2024-06-06T21:41:09Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-1536-6">https://doi.org/10.1007/978-981-10-1536-6</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:20861542024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Formal Methods: Foundations and Applications 18th Brazilian Symposium, SBMF 2015, Belo Horizonte, Brazil, September 21-22, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20861552024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cornélio, Márcio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29473-5">https://doi.org/10.1007/978-3-319-29473-5</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management in the Era of Internet of Things 12th IFIP WG 5.1 International Conference, PLM 2015, Doha, Qatar, October 19-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20841742024-06-06T21:41:09Z2024-06-06T21:41:09Zby Bouras, Abdelaziz. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33111-9">https://doi.org/10.1007/978-3-319-33111-9</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-06-06T21:41:09Z2024-06-06T21:41:09Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-06-06T21:41:09Z2024-06-06T21:41:09Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Collaboration in a Hyperconnected World 17th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2016, Porto, Portugal, October 3-5, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848422024-06-06T21:41:09Z2024-06-06T21:41:09Zby Afsarmanesh, Hamideh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45390-3">https://doi.org/10.1007/978-3-319-45390-3</a><br/>Format: Electronic Resources<br/>Beyond Interpretivism? New Encounters with Technology and Organization IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&O 2016, Dublin, Ireland, December 9-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848432024-06-06T21:41:09Z2024-06-06T21:41:09Zby Introna, Lucas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49733-4">https://doi.org/10.1007/978-3-319-49733-4</a><br/>Format: Electronic Resources<br/>Pragmatic Evaluation of Software Architecturesent://SD_ILS/0/SD_ILS:20847612024-06-06T21:41:09Z2024-06-06T21:41:09Zby Knodel, Jens. author.<br/><a href="https://doi.org/10.1007/978-3-319-34177-4">https://doi.org/10.1007/978-3-319-34177-4</a><br/>Format: Electronic Resources<br/>Tamed Agility Pragmatic Contracting and Collaboration in Agile Software Projectsent://SD_ILS/0/SD_ILS:20847682024-06-06T21:41:09Z2024-06-06T21:41:09Zby Book, Matthias. author.<br/><a href="https://doi.org/10.1007/978-3-319-41478-2">https://doi.org/10.1007/978-3-319-41478-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861432024-06-06T21:41:09Z2024-06-06T21:41:09Zby Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861532024-06-06T21:41:09Z2024-06-06T21:41:09Zby Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861862024-06-06T21:41:09Z2024-06-06T21:41:09Zby Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Shared Services and Outsourcing: A Contemporary Outlook 10th Global Sourcing Workshop 2016, Val d'Isère, France, February 16-19, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848462024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kotlarsky, Julia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47009-2">https://doi.org/10.1007/978-3-319-47009-2</a><br/>Format: Electronic Resources<br/>Guide to Software Development Designing and Managing the Life Cycleent://SD_ILS/0/SD_ILS:20847702024-06-06T21:41:09Z2024-06-06T21:41:09Zby Langer, Arthur M. author.<br/><a href="https://doi.org/10.1007/978-1-4471-6799-0">https://doi.org/10.1007/978-1-4471-6799-0</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852302024-06-06T21:41:09Z2024-06-06T21:41:09Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Social, Cultural, and Behavioral Modeling 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852312024-06-06T21:41:09Z2024-06-06T21:41:09Zby Xu, Kevin S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39931-7">https://doi.org/10.1007/978-3-319-39931-7</a><br/>Format: Electronic Resources<br/>Data Science and Big Data Computing Frameworks and Methodologiesent://SD_ILS/0/SD_ILS:20848742024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31861-5">https://doi.org/10.1007/978-3-319-31861-5</a><br/>Format: Electronic Resources<br/>Formal SQL Tuning for Oracle Databases Practical Efficiency - Efficient Practiceent://SD_ILS/0/SD_ILS:20843652024-06-06T21:41:09Z2024-06-06T21:41:09Zby Nossov, Leonid. author.<br/><a href="https://doi.org/10.1007/978-3-662-50417-8">https://doi.org/10.1007/978-3-662-50417-8</a><br/>Format: Electronic Resources<br/>Modeling with UML Language, Concepts, Methodsent://SD_ILS/0/SD_ILS:20847412024-06-06T21:41:09Z2024-06-06T21:41:09Zby Rumpe, Bernhard. author.<br/><a href="https://doi.org/10.1007/978-3-319-33933-7">https://doi.org/10.1007/978-3-319-33933-7</a><br/>Format: Electronic Resources<br/>Software Process Improvement and Capability Determination 16th International Conference, SPICE 2016, Dublin, Ireland, June 9-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846742024-06-06T21:41:09Z2024-06-06T21:41:09Zby Clarke, Paul M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38980-6">https://doi.org/10.1007/978-3-319-38980-6</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 5th International Conference, EGOVIS 2016, Porto, Portugal, September 5-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20862082024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kő, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44159-7">https://doi.org/10.1007/978-3-319-44159-7</a><br/>Format: Electronic Resources<br/>Agile Processes, in Software Engineering, and Extreme Programming 17th International Conference, XP 2016, Edinburgh, UK, May 24-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846022024-06-06T21:41:09Z2024-06-06T21:41:09Zby Sharp, Helen. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33515-5">https://doi.org/10.1007/978-3-319-33515-5</a><br/>Format: Electronic Resources<br/>Co-production in the Public Sector Experiences and Challengesent://SD_ILS/0/SD_ILS:20846942024-06-06T21:41:09Z2024-06-06T21:41:09Zby Fugini, Mariagrazia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30558-5">https://doi.org/10.1007/978-3-319-30558-5</a><br/>Format: Electronic Resources<br/>Computer and Information Scienceent://SD_ILS/0/SD_ILS:20873062024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lee, Roger. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40171-3">https://doi.org/10.1007/978-3-319-40171-3</a><br/>Format: Electronic Resources<br/>Advances in Network Science 12th International Conference and School, NetSci-X 2016, Wroclaw, Poland, January 11-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20855492024-06-06T21:41:09Z2024-06-06T21:41:09Zby Wierzbicki, Adam. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28361-6">https://doi.org/10.1007/978-3-319-28361-6</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857452024-06-06T21:41:09Z2024-06-06T21:41:09Zby Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857472024-06-06T21:41:09Z2024-06-06T21:41:09Zby Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20855262024-06-06T21:41:09Z2024-06-06T21:41:09Zby Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854062024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>FM 2016: Formal Methods 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859582024-06-06T21:41:09Z2024-06-06T21:41:09Zby Fitzgerald, John. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48989-6">https://doi.org/10.1007/978-3-319-48989-6</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858872024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858882024-06-06T21:41:09Z2024-06-06T21:41:09Zby Chen, Lidong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49100-4">https://doi.org/10.1007/978-3-319-49100-4</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859802024-06-06T21:41:09Z2024-06-06T21:41:09Zby Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Formal Aspects of Component Software 12th International Conference, FACS 2015, Niterói, Brazil, October 14-16, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857862024-06-06T21:41:09Z2024-06-06T21:41:09Zby Braga, Christiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28934-2">https://doi.org/10.1007/978-3-319-28934-2</a><br/>Format: Electronic Resources<br/>Mobility Management Principle, Technology and Applicationsent://SD_ILS/0/SD_ILS:20865652024-06-06T21:41:09Z2024-06-06T21:41:09Zby Chen, Shanzhi. author.<br/><a href="https://doi.org/10.1007/978-3-662-52726-9">https://doi.org/10.1007/978-3-662-52726-9</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Modelling, Computation and Optimization in Information Systems and Management Sciences Second International Conference MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036922024-06-06T21:41:09Z2024-06-06T21:41:09Zby Le Thi, Hoai An. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87477-5">http://dx.doi.org/10.1007/978-3-540-87477-5</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028272024-06-06T21:41:09Z2024-06-06T21:41:09Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format: Electronic Resources<br/>Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033752024-06-06T21:41:09Z2024-06-06T21:41:09Zby Bonchi, Francesco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format: Electronic Resources<br/>Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037492024-06-06T21:41:09Z2024-06-06T21:41:09Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037532024-06-06T21:41:09Z2024-06-06T21:41:09Zby Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Electronic Government 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036052024-06-06T21:41:09Z2024-06-06T21:41:09Zby Wimmer, Maria A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85204-9">http://dx.doi.org/10.1007/978-3-540-85204-9</a><br/>Format: Electronic Resources<br/>Web Services and Formal Methods 4th International Workshop, WS-FM 2007, Brisbane, Australia, September 28-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5034962024-06-06T21:41:09Z2024-06-06T21:41:09Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79230-7">http://dx.doi.org/10.1007/978-3-540-79230-7</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038052024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kulkarni, Sandeep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89335-6">http://dx.doi.org/10.1007/978-3-540-89335-6</a><br/>Format: Electronic Resources<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015462024-06-06T21:41:09Z2024-06-06T21:41:09Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Guide to Advanced Empirical Software Engineeringent://SD_ILS/0/SD_ILS:5024682024-06-06T21:41:09Z2024-06-06T21:41:09Zby Shull, Forrest. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-044-5">http://dx.doi.org/10.1007/978-1-84800-044-5</a><br/>Format: Electronic Resources<br/>Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026202024-06-06T21:41:09Z2024-06-06T21:41:09Zby Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format: Electronic Resources<br/>FM 2008: Formal Methods 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026332024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68237-0">http://dx.doi.org/10.1007/978-3-540-68237-0</a><br/>Format: Electronic Resources<br/>Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027302024-06-06T21:41:09Z2024-06-06T21:41:09Zby Rong, Chunming. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada-Europe 2008 13th Ada-Europe International Conference on Reliable Software Technologies, Venice, Italy, June 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026622024-06-06T21:41:09Z2024-06-06T21:41:09Zby Kordon, Fabrice. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68624-8">http://dx.doi.org/10.1007/978-3-540-68624-8</a><br/>Format: Electronic Resources<br/>Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027562024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format: Electronic Resources<br/>Software Evolutionent://SD_ILS/0/SD_ILS:5031722024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mens, Tom. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-76440-3">http://dx.doi.org/10.1007/978-3-540-76440-3</a><br/>Format: Electronic Resources<br/>Active Knowledge Modeling of Enterprisesent://SD_ILS/0/SD_ILS:5035192024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lillehagen, Frank. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79416-5">http://dx.doi.org/10.1007/978-3-540-79416-5</a><br/>Format: Electronic Resources<br/>Business Process Management Workshops BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5033392024-06-06T21:41:09Z2024-06-06T21:41:09Zby Hofstede, Arthur. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78238-4">http://dx.doi.org/10.1007/978-3-540-78238-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5035332024-06-06T21:41:09Z2024-06-06T21:41:09Zby Pei, Dingyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79499-8">http://dx.doi.org/10.1007/978-3-540-79499-8</a><br/>Format: Electronic Resources<br/>Making Globally Distributed Software Development a Success Story International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5035442024-06-06T21:41:09Z2024-06-06T21:41:09Zby Wang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79588-9">http://dx.doi.org/10.1007/978-3-540-79588-9</a><br/>Format: Electronic Resources<br/>Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037192024-06-06T21:41:09Z2024-06-06T21:41:09Zby Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format: Electronic Resources<br/>Model Driven Engineering Languages and Systems 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037242024-06-06T21:41:09Z2024-06-06T21:41:09Zby Czarnecki, Krzysztof. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87875-9">http://dx.doi.org/10.1007/978-3-540-87875-9</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038182024-06-06T21:41:09Z2024-06-06T21:41:09Zby Matsuura, Kanta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89598-5">http://dx.doi.org/10.1007/978-3-540-89598-5</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038212024-06-06T21:41:09Z2024-06-06T21:41:09Zby Franklin, Matthew K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89641-8">http://dx.doi.org/10.1007/978-3-540-89641-8</a><br/>Format: Electronic Resources<br/>Software Process and Product Measurement International Conference, IWSM-Mensura 2007, Palma de Mallorca, Spain, November 5-8, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5036342024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cuadrado-Gallego, Juan J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85553-8">http://dx.doi.org/10.1007/978-3-540-85553-8</a><br/>Format: Electronic Resources<br/>Biosurveillance and Biosecurity International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038312024-06-06T21:41:09Z2024-06-06T21:41:09Zby Zeng, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89746-0">http://dx.doi.org/10.1007/978-3-540-89746-0</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:5036382024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85567-5">http://dx.doi.org/10.1007/978-3-540-85567-5</a><br/>Format: Electronic Resources<br/>Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038392024-06-06T21:41:09Z2024-06-06T21:41:09Zby Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2008 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5034552024-06-06T21:41:09Z2024-06-06T21:41:09Zby Smart, Nigel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78967-3">http://dx.doi.org/10.1007/978-3-540-78967-3</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5034812024-06-06T21:41:09Z2024-06-06T21:41:09Zby Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035032024-06-06T21:41:09Z2024-06-06T21:41:09Zby Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79263-5">http://dx.doi.org/10.1007/978-3-540-79263-5</a><br/>Format: Electronic Resources<br/>Model-Driven Testingent://SD_ILS/0/SD_ILS:5028922024-06-06T21:41:09Z2024-06-06T21:41:09Zby Baker, Paul. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72563-3">http://dx.doi.org/10.1007/978-3-540-72563-3</a><br/>Format: Electronic Resources<br/>Advanced Methods for Inconsistent Knowledge Managementent://SD_ILS/0/SD_ILS:5024342024-06-06T21:41:09Z2024-06-06T21:41:09Zby Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format: Electronic Resources<br/>Resources, Co-Evolution and Artifacts Theory in CSCWent://SD_ILS/0/SD_ILS:5024352024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ackerman, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-901-9">http://dx.doi.org/10.1007/978-1-84628-901-9</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability III New Challenges and Industrial Approachesent://SD_ILS/0/SD_ILS:5025252024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mertins, Kai. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-221-0">http://dx.doi.org/10.1007/978-1-84800-221-0</a><br/>Format: Electronic Resources<br/>High Confidence Software Reuse in Large Systems 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026132024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mei, Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68073-4">http://dx.doi.org/10.1007/978-3-540-68073-4</a><br/>Format: Electronic Resources<br/>Model Driven Architecture – Foundations and Applications 4th European Conference, ECMDA-FA 2008, Berlin, Germany, June 9-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027092024-06-06T21:41:09Z2024-06-06T21:41:09Zby Schieferdecker, Ina. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69100-6">http://dx.doi.org/10.1007/978-3-540-69100-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2008 First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026232024-06-06T21:41:09Z2024-06-06T21:41:09Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68164-9">http://dx.doi.org/10.1007/978-3-540-68164-9</a><br/>Format: Electronic Resources<br/>TestGoal Result-Driven Testingent://SD_ILS/0/SD_ILS:5034392024-06-06T21:41:09Z2024-06-06T21:41:09Zby De Grood, Derk-Jan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78829-4">http://dx.doi.org/10.1007/978-3-540-78829-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038322024-06-06T21:41:09Z2024-06-06T21:41:09Zby Chowdhury, Dipanwita Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89754-5">http://dx.doi.org/10.1007/978-3-540-89754-5</a><br/>Format: Electronic Resources<br/>Rationale-Based Software Engineeringent://SD_ILS/0/SD_ILS:5032702024-06-06T21:41:09Z2024-06-06T21:41:09Zby Burge, Janet E. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77583-6">http://dx.doi.org/10.1007/978-3-540-77583-6</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5036492024-06-06T21:41:09Z2024-06-06T21:41:09Zby Furnell, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85735-8">http://dx.doi.org/10.1007/978-3-540-85735-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036002024-06-06T21:41:09Z2024-06-06T21:41:09Zby Wagner, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85174-5">http://dx.doi.org/10.1007/978-3-540-85174-5</a><br/>Format: Electronic Resources<br/>Data Management in Grid and Peer-to-Peer Systems First International Conference, Globe 2008, Turin, Italy, September 3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036012024-06-06T21:41:09Z2024-06-06T21:41:09Zby Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85176-9">http://dx.doi.org/10.1007/978-3-540-85176-9</a><br/>Format: Electronic Resources<br/>Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036502024-06-06T21:41:09Z2024-06-06T21:41:09Zby Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format: Electronic Resources<br/>Modelling Autonomic Communications Environments Third IEEE International Workshop, MACE 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036792024-06-06T21:41:09Z2024-06-06T21:41:09Zby Meer, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87355-6">http://dx.doi.org/10.1007/978-3-540-87355-6</a><br/>Format: Electronic Resources<br/>IP Operations and Management 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036802024-06-06T21:41:09Z2024-06-06T21:41:09Zby Akar, Nail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87357-0">http://dx.doi.org/10.1007/978-3-540-87357-0</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 9th International Conference, XP 2008, Limerick, Ireland, June 10-14, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026342024-06-06T21:41:09Z2024-06-06T21:41:09Zby Abrahamsson, Pekka. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68255-4">http://dx.doi.org/10.1007/978-3-540-68255-4</a><br/>Format: Electronic Resources<br/>Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028122024-06-06T21:41:09Z2024-06-06T21:41:09Zby Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70567-3">http://dx.doi.org/10.1007/978-3-540-70567-3</a><br/>Format: Electronic Resources<br/>Requirements Management The Interface Between Requirements Development and All Other Systems Engineering Processesent://SD_ILS/0/SD_ILS:5026462024-06-06T21:41:09Z2024-06-06T21:41:09Zby Hood, Colin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68476-3">http://dx.doi.org/10.1007/978-3-540-68476-3</a><br/>Format: Electronic Resources<br/>Testing of Software and Communicating Systems 20th IFIP TC 6/WG 6.1 International Conference, TestCom 2008 8th International Workshop, FATES 2008 Tokyo, Japan, June 10-13, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026522024-06-06T21:41:09Z2024-06-06T21:41:09Zby Suzuki, Kenji. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68524-1">http://dx.doi.org/10.1007/978-3-540-68524-1</a><br/>Format: Electronic Resources<br/>Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027502024-06-06T21:41:09Z2024-06-06T21:41:09Zby Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Models in Software Engineering Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papersent://SD_ILS/0/SD_ILS:5027062024-06-06T21:41:09Z2024-06-06T21:41:09Zby Giese, Holger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69073-3">http://dx.doi.org/10.1007/978-3-540-69073-3</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102024-06-06T21:41:09Z2024-06-06T21:41:09Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Object-Oriented Technology. ECOOP 2007 Workshop Reader ECOOP 2007 Workshops, Berlin, Germany, July 30-31, 2007, Final Reportsent://SD_ILS/0/SD_ILS:5033352024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cebulla, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78195-0">http://dx.doi.org/10.1007/978-3-540-78195-0</a><br/>Format: Electronic Resources<br/>Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036132024-06-06T21:41:09Z2024-06-06T21:41:09Zby Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format: Electronic Resources<br/>Software Process and Product Measurement International Conferences IWSM 2008, Metrikon 2008, and Mensura 2008 Munich, Germany, November 18-19, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038092024-06-06T21:41:09Z2024-06-06T21:41:09Zby Dumke, Reiner R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89403-2">http://dx.doi.org/10.1007/978-3-540-89403-2</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part Ient://SD_ILS/0/SD_ILS:5036362024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85563-7">http://dx.doi.org/10.1007/978-3-540-85563-7</a><br/>Format: Electronic Resources<br/>Knowledge-Based Intelligent Information and Engineering Systems 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part IIent://SD_ILS/0/SD_ILS:5036372024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lovrek, Ignac. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85565-1">http://dx.doi.org/10.1007/978-3-540-85565-1</a><br/>Format: Electronic Resources<br/>Formal Methods and Testing An Outcome of the FORTEST Network, Revised Selected Papersent://SD_ILS/0/SD_ILS:5034492024-06-06T21:41:09Z2024-06-06T21:41:09Zby Hierons, Robert M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78917-8">http://dx.doi.org/10.1007/978-3-540-78917-8</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038462024-06-06T21:41:09Z2024-06-06T21:41:09Zby Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format: Electronic Resources<br/>Principles of Distributed Systems 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038572024-06-06T21:41:09Z2024-06-06T21:41:09Zby Baker, Theodore P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92221-6">http://dx.doi.org/10.1007/978-3-540-92221-6</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642024-06-06T21:41:09Z2024-06-06T21:41:09Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:5037892024-06-06T21:41:09Z2024-06-06T21:41:09Zby Solanki, Kaushal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papersent://SD_ILS/0/SD_ILS:5037932024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89173-4">http://dx.doi.org/10.1007/978-3-540-89173-4</a><br/>Format: Electronic Resources<br/>The Practice of Enterprise Modeling First IFIP WG 8.1 Working Conference, PoEM 2008, Stockholm, Sweden, November 12-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037962024-06-06T21:41:09Z2024-06-06T21:41:09Zby Stirna, Janis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89218-2">http://dx.doi.org/10.1007/978-3-540-89218-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038002024-06-06T21:41:09Z2024-06-06T21:41:09Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89255-7">http://dx.doi.org/10.1007/978-3-540-89255-7</a><br/>Format: Electronic Resources<br/>Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028182024-06-06T21:41:09Z2024-06-06T21:41:09Zby Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 9th International Conference, PROFES 2008 Monte Porzio Catone, Italy, June 23-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027642024-06-06T21:41:09Z2024-06-06T21:41:09Zby Jedlitschka, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69566-0">http://dx.doi.org/10.1007/978-3-540-69566-0</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912024-06-06T21:41:09Z2024-06-06T21:41:09Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIIent://SD_ILS/0/SD_ILS:5026992024-06-06T21:41:09Z2024-06-06T21:41:09Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69019-1">http://dx.doi.org/10.1007/978-3-540-69019-1</a><br/>Format: Electronic Resources<br/>Rightshore! Successfully SAP(R) Projects Offshoreent://SD_ILS/0/SD_ILS:5032262024-06-06T21:41:09Z2024-06-06T21:41:09Zby Messner, Wolfgang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77288-0">http://dx.doi.org/10.1007/978-3-540-77288-0</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 14th International Working Conference, REFSQ 2008 Montpellier, France, June 16-17, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027042024-06-06T21:41:09Z2024-06-06T21:41:09Zby Paech, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69062-7">http://dx.doi.org/10.1007/978-3-540-69062-7</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032024-06-06T21:41:09Z2024-06-06T21:41:09Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Balancing Agility and Formalism in Software Engineering Second IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2007, Poznan, Poland, October 10-12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5036152024-06-06T21:41:09Z2024-06-06T21:41:09Zby Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85279-7">http://dx.doi.org/10.1007/978-3-540-85279-7</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037082024-06-06T21:41:09Z2024-06-06T21:41:09Zby Harrison, Michael D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87698-4">http://dx.doi.org/10.1007/978-3-540-87698-4</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632024-06-06T21:41:09Z2024-06-06T21:41:09Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033722024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5038432024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ortiz-Arroyo, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format: Electronic Resources<br/>Information Theoretic Security Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035862024-06-06T21:41:09Z2024-06-06T21:41:09Zby Safavi-Naini, Reihaneh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85093-9">http://dx.doi.org/10.1007/978-3-540-85093-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033872024-06-06T21:41:09Z2024-06-06T21:41:09Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036782024-06-06T21:41:09Z2024-06-06T21:41:09Zby Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format: Electronic Resources<br/>Emerging Web Services Technology, Volume IIent://SD_ILS/0/SD_ILS:5039422024-06-06T21:41:09Z2024-06-06T21:41:09Zby Gschwind, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8864-5">http://dx.doi.org/10.1007/978-3-7643-8864-5</a><br/>Format: Electronic Resources<br/>ECOOP 2008 – Object-Oriented Programming 22nd European Conference Paphos, Cyprus, July 7-11, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5028202024-06-06T21:41:09Z2024-06-06T21:41:09Zby Vitek, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70592-5">http://dx.doi.org/10.1007/978-3-540-70592-5</a><br/>Format: Electronic Resources<br/>Advances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25–27, 2008ent://SD_ILS/0/SD_ILS:5015232024-06-06T21:41:09Z2024-06-06T21:41:09Zby Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format: Electronic Resources<br/>Itil® Version 3 at a Glance Information Quick Referenceent://SD_ILS/0/SD_ILS:5019182024-06-06T21:41:09Z2024-06-06T21:41:09Zby Long, John O. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77393-3">http://dx.doi.org/10.1007/978-0-387-77393-3</a><br/>Format: Electronic Resources<br/>Pervasive Collaborative Networks IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES, September 8-10, 2008, Poznan, Polandent://SD_ILS/0/SD_ILS:5019982024-06-06T21:41:09Z2024-06-06T21:41:09Zby Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-84837-2">http://dx.doi.org/10.1007/978-0-387-84837-2</a><br/>Format: Electronic Resources<br/>The IT Measurement Compendium Estimating and Benchmarking Success with Functional Size Measurementent://SD_ILS/0/SD_ILS:5026272024-06-06T21:41:09Z2024-06-06T21:41:09Zby Bundschuh, Manfred. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68188-5">http://dx.doi.org/10.1007/978-3-540-68188-5</a><br/>Format: Electronic Resources<br/>Objects, Components, Models and Patterns 46th International Conference, TOOLS EUROPE 2008, Zurich, Switzerland, June 30 - July 4, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027772024-06-06T21:41:09Z2024-06-06T21:41:09Zby Paige, Richard F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69824-1">http://dx.doi.org/10.1007/978-3-540-69824-1</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks in Pattern Recognition Third IAPR Workshop, ANNPR 2008 Paris, France, July 2-4, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5027912024-06-06T21:41:09Z2024-06-06T21:41:09Zby Prevost, Lionel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69939-2">http://dx.doi.org/10.1007/978-3-540-69939-2</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027932024-06-06T21:41:09Z2024-06-06T21:41:09Zby Mu, Yi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70500-0">http://dx.doi.org/10.1007/978-3-540-70500-0</a><br/>Format: Electronic Resources<br/>Emerging Technologies and Information Systems for the Knowledge Society First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037172024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87781-3">http://dx.doi.org/10.1007/978-3-540-87781-3</a><br/>Format: Electronic Resources<br/>The Open Knowlege Society. A Computer Science and Information Systems Manifesto First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5037182024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lytras, Miltiadis D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87783-7">http://dx.doi.org/10.1007/978-3-540-87783-7</a><br/>Format: Electronic Resources<br/>Open Source Development, Communities and Quality IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015432024-06-06T21:41:09Z2024-06-06T21:41:09Zby Russo, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09684-1">http://dx.doi.org/10.1007/978-0-387-09684-1</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IIent://SD_ILS/0/SD_ILS:5020092024-06-06T21:41:09Z2024-06-06T21:41:09Zby Papa, Mauricio. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-88523-0">http://dx.doi.org/10.1007/978-0-387-88523-0</a><br/>Format: Electronic Resources<br/>Policies and Research in Identity Management First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007ent://SD_ILS/0/SD_ILS:5019392024-06-06T21:41:09Z2024-06-06T21:41:09Zby Leeuw, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77996-6">http://dx.doi.org/10.1007/978-0-387-77996-6</a><br/>Format: Electronic Resources<br/>Enterprise Interoperability II New Challenges and Approachesent://SD_ILS/0/SD_ILS:5087022024-06-06T21:41:09Z2024-06-06T21:41:09Zby Gonçalves, Ricardo J. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-858-6">http://dx.doi.org/10.1007/978-1-84628-858-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5122482024-06-06T21:41:09Z2024-06-06T21:41:09Zby Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Successfully Implementing Microsoft Dynamics™ by Using the Regatta® Approach for Microsoft Dynamics™ent://SD_ILS/0/SD_ILS:5123702024-06-06T21:41:09Z2024-06-06T21:41:09Zby Koop, Reinder. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71593-1">http://dx.doi.org/10.1007/978-3-540-71593-1</a><br/>Format: Electronic Resources<br/>Rapid Integration of Software Engineering Techniques Third International Workshop, RISE 2006, Geneva, Switzerland, September 13-15, 2006. Revised Selected Papersent://SD_ILS/0/SD_ILS:5124022024-06-06T21:41:09Z2024-06-06T21:41:09Zby Guelfi, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71876-5">http://dx.doi.org/10.1007/978-3-540-71876-5</a><br/>Format: Electronic Resources<br/>Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124292024-06-06T21:41:09Z2024-06-06T21:41:09Zby Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format: Electronic Resources<br/>Preserving Digital Informationent://SD_ILS/0/SD_ILS:5115792024-06-06T21:41:09Z2024-06-06T21:41:09Zby Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format: Electronic Resources<br/>Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papersent://SD_ILS/0/SD_ILS:5123522024-06-06T21:41:09Z2024-06-06T21:41:09Zby Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124402024-06-06T21:41:09Z2024-06-06T21:41:09Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124602024-06-06T21:41:09Z2024-06-06T21:41:09Zby Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Reliable Software Technologies – Ada Europe 2007 12th Ada-Europe International Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126212024-06-06T21:41:09Z2024-06-06T21:41:09Zby Abdennadher, Nabil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73230-3">http://dx.doi.org/10.1007/978-3-540-73230-3</a><br/>Format: Electronic Resources<br/>Software Measurement Establish — Extract — Evaluate — Executeent://SD_ILS/0/SD_ILS:5123782024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ebert, Christof. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71649-5">http://dx.doi.org/10.1007/978-3-540-71649-5</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123812024-06-06T21:41:09Z2024-06-06T21:41:09Zby Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papersent://SD_ILS/0/SD_ILS:5129222024-06-06T21:41:09Z2024-06-06T21:41:09Zby Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format: Electronic Resources<br/>Requirements Engineering: Foundation for Software Quality 13th International Working Conference, REFSQ 2007, Trondheim, Norway, June 11-12, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125812024-06-06T21:41:09Z2024-06-06T21:41:09Zby Sawyer, Pete. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73031-6">http://dx.doi.org/10.1007/978-3-540-73031-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126752024-06-06T21:41:09Z2024-06-06T21:41:09Zby Pieprzyk, Josef. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73458-1">http://dx.doi.org/10.1007/978-3-540-73458-1</a><br/>Format: Electronic Resources<br/>Product-Focused Software Process Improvement 8th International Conference, PROFES 2007, Riga, Latvia, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126762024-06-06T21:41:09Z2024-06-06T21:41:09Zby Münch, Jürgen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73460-4">http://dx.doi.org/10.1007/978-3-540-73460-4</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 8th International Conference, XP 2007, Como, Italy, June 18-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125972024-06-06T21:41:09Z2024-06-06T21:41:09Zby Concas, Giulio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73101-6">http://dx.doi.org/10.1007/978-3-540-73101-6</a><br/>Format: Electronic Resources<br/>Information Hiding 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papersent://SD_ILS/0/SD_ILS:5127562024-06-06T21:41:09Z2024-06-06T21:41:09Zby Camenisch, Jan L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74124-4">http://dx.doi.org/10.1007/978-3-540-74124-4</a><br/>Format: Electronic Resources<br/>Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125282024-06-06T21:41:09Z2024-06-06T21:41:09Zby Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125292024-06-06T21:41:09Z2024-06-06T21:41:09Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5122762024-06-06T21:41:09Z2024-06-06T21:41:09Zby Lee, Jae Kwang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71093-6">http://dx.doi.org/10.1007/978-3-540-71093-6</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129272024-06-06T21:41:09Z2024-06-06T21:41:09Zby Miyaji, Atsuko. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">http://dx.doi.org/10.1007/978-3-540-75651-4</a><br/>Format: Electronic Resources<br/>Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129332024-06-06T21:41:09Z2024-06-06T21:41:09Zby Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IIent://SD_ILS/0/SD_ILS:5125942024-06-06T21:41:09Z2024-06-06T21:41:09Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73092-7">http://dx.doi.org/10.1007/978-3-540-73092-7</a><br/>Format: Electronic Resources<br/>ECOOP 2007 – Object-Oriented Programming 21st European Conference, Berlin, Germany, July 30 - August 3, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126992024-06-06T21:41:09Z2024-06-06T21:41:09Zby Ernst, Erik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73589-2">http://dx.doi.org/10.1007/978-3-540-73589-2</a><br/>Format: Electronic Resources<br/>