Search Results for - Narrowed by: Management of Computing and Information Systems. - Information Storage and Retrieval. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Subject$002509Information$002bStorage$002band$002bRetrieval.$002509Information$002bStorage$002band$002bRetrieval.$0026ps$003d300? 2024-05-24T01:25:39Z Data Privacy Games ent://SD_ILS/0/SD_ILS:2084501 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Xu, Lei. author.<br/><a href="https://doi.org/10.1007/978-3-319-77965-2">https://doi.org/10.1007/978-3-319-77965-2</a><br/>Format:&#160;Electronic Resources<br/> Semantic Applications Methodology, Technology, Corporate Use ent://SD_ILS/0/SD_ILS:2084451 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Hoppe, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-55433-3">https://doi.org/10.1007/978-3-662-55433-3</a><br/>Format:&#160;Electronic Resources<br/> Information Literacy in the Workplace 5th European Conference, ECIL 2017, Saint Malo, France, September 18-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084798 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74334-9">https://doi.org/10.1007/978-3-319-74334-9</a><br/>Format:&#160;Electronic Resources<br/> Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085443 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 14th International Conference, BPM 2016, Rio de Janeiro, Brazil, September 18-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085768 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;La Rosa, Marcello. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45348-4">https://doi.org/10.1007/978-3-319-45348-4</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086066 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format:&#160;Electronic Resources<br/> Model and Data Engineering 6th International Conference, MEDI 2016, Almer&iacute;a, Spain, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085614 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Bellatreche, Ladjel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45547-1">https://doi.org/10.1007/978-3-319-45547-1</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 22nd International Working Conference, REFSQ 2016, Gothenburg, Sweden, March 14-17, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085701 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Daneva, Maya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30282-9">https://doi.org/10.1007/978-3-319-30282-9</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085082 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format:&#160;Electronic Resources<br/> System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085087 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Grabowski, Jens. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46613-2">https://doi.org/10.1007/978-3-319-46613-2</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086153 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes 6th International Provenance and Annotation Workshop, IPAW 2016, McLean, VA, USA, June 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085996 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Mattoso, Marta. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40593-3">https://doi.org/10.1007/978-3-319-40593-3</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086003 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Sheng, Quan Z. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46295-0">https://doi.org/10.1007/978-3-319-46295-0</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503846 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Freire, Juliana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89965-5">http://dx.doi.org/10.1007/978-3-540-89965-5</a><br/>Format:&#160;Electronic Resources<br/> Service Availability 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502620 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Nanya, Takashi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68129-8">http://dx.doi.org/10.1007/978-3-540-68129-8</a><br/>Format:&#160;Electronic Resources<br/> Managing Large-Scale Service Deployment 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503678 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Turck, Filip. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87353-2">http://dx.doi.org/10.1007/978-3-540-87353-2</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503613 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85259-9">http://dx.doi.org/10.1007/978-3-540-85259-9</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 6th International Conference, BPM 2008, Milan, Italy, September 2-4, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503650 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Dumas, Marlon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85758-7">http://dx.doi.org/10.1007/978-3-540-85758-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503839 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Sekar, R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89862-7">http://dx.doi.org/10.1007/978-3-540-89862-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503481 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Chen, Liqun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79104-1">http://dx.doi.org/10.1007/978-3-540-79104-1</a><br/>Format:&#160;Electronic Resources<br/> Advanced Methods for Inconsistent Knowledge Management ent://SD_ILS/0/SD_ILS:502434 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Nguyen, Ngoc Thanh. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-889-0">http://dx.doi.org/10.1007/978-1-84628-889-0</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies for Embedded and Ubiquitous Systems 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503719 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Brinkschulte, Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87785-1">http://dx.doi.org/10.1007/978-3-540-87785-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502827 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70630-4">http://dx.doi.org/10.1007/978-3-540-70630-4</a><br/>Format:&#160;Electronic Resources<br/> Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502818 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Hausheer, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502756 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69485-4">http://dx.doi.org/10.1007/978-3-540-69485-4</a><br/>Format:&#160;Electronic Resources<br/> Active Networks IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papers ent://SD_ILS/0/SD_ILS:512352 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Minden, Gary J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71500-9">http://dx.doi.org/10.1007/978-3-540-71500-9</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512880 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Alonso, Gustavo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75183-0">http://dx.doi.org/10.1007/978-3-540-75183-0</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512888 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75227-1">http://dx.doi.org/10.1007/978-3-540-75227-1</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512889 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">http://dx.doi.org/10.1007/978-3-540-75248-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512922 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Borisov, Nikita. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75551-7">http://dx.doi.org/10.1007/978-3-540-75551-7</a><br/>Format:&#160;Electronic Resources<br/> Business Information Systems 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512429 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Abramowicz, Witold. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72035-5">http://dx.doi.org/10.1007/978-3-540-72035-5</a><br/>Format:&#160;Electronic Resources<br/> Business Intelligence for the Real-Time Enterprises First International Workshop, BIRTE 2006, Seoul, Korea, September 11, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512739 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Bussler, Christoph. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73950-0">http://dx.doi.org/10.1007/978-3-540-73950-0</a><br/>Format:&#160;Electronic Resources<br/> Preserving Digital Information ent://SD_ILS/0/SD_ILS:511579 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Gladney, Henry M. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-37887-7">http://dx.doi.org/10.1007/978-3-540-37887-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512362 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512660 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73408-6">http://dx.doi.org/10.1007/978-3-540-73408-6</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence and Security International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512782 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Wang, Yuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74377-4">http://dx.doi.org/10.1007/978-3-540-74377-4</a><br/>Format:&#160;Electronic Resources<br/> IP Operations and Management 7th IEEE International Workshop, IPOM 2007 San Jos&eacute;, USA, October 31 - November 2, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512942 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Medhi, Deep. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75853-2">http://dx.doi.org/10.1007/978-3-540-75853-2</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513007 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;McDaniel, Patrick. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">http://dx.doi.org/10.1007/978-3-540-77086-2</a><br/>Format:&#160;Electronic Resources<br/> Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512572 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Bandara, Arosha K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK ent://SD_ILS/0/SD_ILS:508664 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Blyth, Andrew. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-750-3">http://dx.doi.org/10.1007/978-1-84628-750-3</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies for Embedded and Ubiquitous Systems 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papers ent://SD_ILS/0/SD_ILS:512928 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Obermaisser, Roman. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75664-4">http://dx.doi.org/10.1007/978-3-540-75664-4</a><br/>Format:&#160;Electronic Resources<br/> Service Availability 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512528 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72736-1">http://dx.doi.org/10.1007/978-3-540-72736-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512440 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72163-5">http://dx.doi.org/10.1007/978-3-540-72163-5</a><br/>Format:&#160;Electronic Resources<br/> Service Availability Third International Service Availability Symposium, ISAS 2006, Helsinki, Finland, May 15-16, 2006. Revised Selected Papers ent://SD_ILS/0/SD_ILS:512093 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Penkler, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/11955498">http://dx.doi.org/10.1007/11955498</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511208 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11767831">http://dx.doi.org/10.1007/11767831</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects in Security and Trust Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510720 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/11679219">http://dx.doi.org/10.1007/11679219</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510825 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Chen, Kefei. editor.<br/><a href="http://dx.doi.org/10.1007/11689522">http://dx.doi.org/10.1007/11689522</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510918 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Chen, Hsinchun. editor.<br/><a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part I ent://SD_ILS/0/SD_ILS:511812 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11892960">http://dx.doi.org/10.1007/11892960</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part II ent://SD_ILS/0/SD_ILS:511813 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11893004">http://dx.doi.org/10.1007/11893004</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006. Proceedings, Part III ent://SD_ILS/0/SD_ILS:511814 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Gabrys, Bogdan. editor.<br/><a href="http://dx.doi.org/10.1007/11893011">http://dx.doi.org/10.1007/11893011</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management Workshops BPM 2006 International Workshops, BPD, BPI, ENEI, GPWW, DPM, semantics4ws, Vienna, Austria, September 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511602 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Eder, Johann. editor.<br/><a href="http://dx.doi.org/10.1007/11837862">http://dx.doi.org/10.1007/11837862</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:512125 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Bagchi, Aditya. editor.<br/><a href="http://dx.doi.org/10.1007/11961635">http://dx.doi.org/10.1007/11961635</a><br/>Format:&#160;Electronic Resources<br/> Autonomic Principles of IP Operations and Management 6th IEEE International Workshop on IP Operations and Management, IPOM 2006, Dublin, Ireland, October 23-25, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511853 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Parr, Gerard. editor.<br/><a href="http://dx.doi.org/10.1007/11908852">http://dx.doi.org/10.1007/11908852</a><br/>Format:&#160;Electronic Resources<br/> Designing Smart Homes The Role of Artificial Intelligence ent://SD_ILS/0/SD_ILS:511341 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Augusto, Juan Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/11788485">http://dx.doi.org/10.1007/11788485</a><br/>Format:&#160;Electronic Resources<br/> Trust Management 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511090 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;St&oslash;len, Ketil. editor.<br/><a href="http://dx.doi.org/10.1007/11755593">http://dx.doi.org/10.1007/11755593</a><br/>Format:&#160;Electronic Resources<br/> Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511771 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data International Provenance and Annotation Workshop, IPAW 2006, Chicago, IL, USA, May 3-5, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:511781 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Moreau, Luc. editor.<br/><a href="http://dx.doi.org/10.1007/11890850">http://dx.doi.org/10.1007/11890850</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512107 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Danezis, George. editor.<br/><a href="http://dx.doi.org/10.1007/11957454">http://dx.doi.org/10.1007/11957454</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511137 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Mehrotra, Sharad. editor.<br/><a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UK ent://SD_ILS/0/SD_ILS:508531 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Blyth, Andrew. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-352-3">http://dx.doi.org/10.1007/1-84628-352-3</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management Workshops BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Nancy, France, September 5, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510709 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Bussler, Christoph J. editor.<br/><a href="http://dx.doi.org/10.1007/11678564">http://dx.doi.org/10.1007/11678564</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511244 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Atzeni, Andrea S. editor.<br/><a href="http://dx.doi.org/10.1007/11774716">http://dx.doi.org/10.1007/11774716</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 4th International Conference, BPM 2006, Vienna, Austria, September 5-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511623 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/11841760">http://dx.doi.org/10.1007/11841760</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511625 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11844662">http://dx.doi.org/10.1007/11844662</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510020 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Ioannidis, John. editor.<br/><a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510344 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Jonker, Willem. editor.<br/><a href="http://dx.doi.org/10.1007/11552338">http://dx.doi.org/10.1007/11552338</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510349 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/b107167">http://dx.doi.org/10.1007/b107167</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part I ent://SD_ILS/0/SD_ILS:510353 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11552413">http://dx.doi.org/10.1007/11552413</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II ent://SD_ILS/0/SD_ILS:510356 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11552451">http://dx.doi.org/10.1007/11552451</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence and Security International Conference, CIS 2005, Xi&rsquo;an, China, December 15-19, 2005, Proceedings, Part II ent://SD_ILS/0/SD_ILS:510075 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Hao, Yue. editor.<br/><a href="http://dx.doi.org/10.1007/11596981">http://dx.doi.org/10.1007/11596981</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence and Security International Conference, CIS 2005, Xi&rsquo;an, China, December 15-19, 2005, Proceedings Part I ent://SD_ILS/0/SD_ILS:510076 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Hao, Yue. editor.<br/><a href="http://dx.doi.org/10.1007/11596448">http://dx.doi.org/10.1007/11596448</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:504373 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/b106962">http://dx.doi.org/10.1007/b106962</a><br/>Format:&#160;Electronic Resources<br/> Quality of Service in Multiservice IP Networks Third International Workshop, QoS-IP 2005, Catania, Italy, February 2-4, 2004, Catania, Italy, February 2-4, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509751 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Ajmone Marsan, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/b105169">http://dx.doi.org/10.1007/b105169</a><br/>Format:&#160;Electronic Resources<br/> Quality of Service &ndash; IWQoS 2005 13th International Workshop, IWQoS 2005, Passau, Germany, June 21-23, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510114 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Meer, Hermann. editor.<br/><a href="http://dx.doi.org/10.1007/b137286">http://dx.doi.org/10.1007/b137286</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510424 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Kantor, Paul. editor.<br/><a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papers ent://SD_ILS/0/SD_ILS:510331 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Martin, David. editor.<br/><a href="http://dx.doi.org/10.1007/b136164">http://dx.doi.org/10.1007/b136164</a><br/>Format:&#160;Electronic Resources<br/> Operations and Management in IP-Based Networks 5th IEEE International Workshop on IP Operations and Management, IPOM 2005, Barcelona, Spain, October 26-28, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510456 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Magedanz, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/11567486">http://dx.doi.org/10.1007/11567486</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510648 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/> Service Availability Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25 &ndash; 26, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510383 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/11560333">http://dx.doi.org/10.1007/11560333</a><br/>Format:&#160;Electronic Resources<br/> Trust Management Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510403 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Herrmann, Peter. editor.<br/><a href="http://dx.doi.org/10.1007/b136639">http://dx.doi.org/10.1007/b136639</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III ent://SD_ILS/0/SD_ILS:510360 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11553939">http://dx.doi.org/10.1007/11553939</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Intelligent Information and Engineering Systems 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:510363 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Khosla, Rajiv. editor.<br/><a href="http://dx.doi.org/10.1007/11554028">http://dx.doi.org/10.1007/11554028</a><br/>Format:&#160;Electronic Resources<br/> Business Process Management 3rd International Conference, BPM 2005, Nancy, France, September 5-8, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510301 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Aalst, Wil M. P. editor.<br/><a href="http://dx.doi.org/10.1007/11538394">http://dx.doi.org/10.1007/11538394</a><br/>Format:&#160;Electronic Resources<br/> Service Availability First International Service Availability Symposium, ISAS 2004, Munich, Germany, May 13-14, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509684 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Malek, Miroslaw. editor.<br/><a href="http://dx.doi.org/10.1007/b105309">http://dx.doi.org/10.1007/b105309</a><br/>Format:&#160;Electronic Resources<br/> Intuitive Human Interfaces for Organizing and Accessing Intellectual Assets International Workshop, Dagstuhl Castle, Germany, March 1-5, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510555 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Grieser, Gunter. editor.<br/><a href="http://dx.doi.org/10.1007/b104697">http://dx.doi.org/10.1007/b104697</a><br/>Format:&#160;Electronic Resources<br/> Public Key Infrastructure Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510063 2024-05-24T01:25:39Z 2024-05-24T01:25:39Z by&#160;Chadwick, David. editor.<br/><a href="http://dx.doi.org/10.1007/11533733">http://dx.doi.org/10.1007/11533733</a><br/>Format:&#160;Electronic Resources<br/>