Search Results for - Narrowed by: Tez Koleksiyonu - 2010 - İzmir Institute of Technology. Computer Engineering.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ATHESIS$002509Tez$002bKoleksiyonu$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bTarihi$0025092010$0025092010$0026qf$003dAUTHOR$002509Yazar$002509$0025C4$0025B0zmir$002bInstitute$002bof$002bTechnology.$002bComputer$002bEngineering.$002509$0025C4$0025B0zmir$002bInstitute$002bof$002bTechnology.$002bComputer$002bEngineering.$0026rm$003dTEZ$002bKOLEKSIYONU0$00257C$00257C$00257C1$00257C$00257C$00257C0$00257C$00257C$00257Ctrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-05-23T14:20:09ZPerformance enhancement of real-time protocol master of scienceent://SD_ILS/0/SD_ILS:923422024-05-23T14:20:09Z2024-05-23T14:20:09Zby Yücel, Çağan Selçuk.<br/><a href="http://hdl.handle.net/11147/4022">Access to Electronic Version</a><br/>Format: El Yazması<br/>Level based labeling scheme for extensible markup language (XML) data processingent://SD_ILS/0/SD_ILS:930792024-05-23T14:20:09Z2024-05-23T14:20:09Zby Atıcı, Beray.<br/><a href="http://hdl.handle.net/11147/4023">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Impacts of frequent itemset hiding algorithms on privacy preserving data miningent://SD_ILS/0/SD_ILS:1063892024-05-23T14:20:09Z2024-05-23T14:20:09Zby Yıldız, Barış.<br/><a href="http://hdl.handle.net/11147/3037">Access to Electronic Version</a><br/>Format: El Yazması<br/>Development of fuzzy syllogistic algorithms and applications distributed reasoning approachesent://SD_ILS/0/SD_ILS:1080182024-05-23T14:20:09Z2024-05-23T14:20:09Zby Çakır, Hüseyin.<br/><a href="http://hdl.handle.net/11147/3057">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Utilization of timed automata as a verification tool for real-time security protocolsent://SD_ILS/0/SD_ILS:1067372024-05-23T14:20:09Z2024-05-23T14:20:09Zby Külahçıoğlu, Burcu.<br/><a href="http://hdl.handle.net/11147/3046">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Modeling and verification of a stream authentication protocol using communicating sequential processesent://SD_ILS/0/SD_ILS:631642024-05-23T14:20:09Z2024-05-23T14:20:09Zby Özkan, Süleyman Murat.<br/><a href="http://hdl.handle.net/11147/3819">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Development of a static analysis tool to find securty vulnerabilities in java applicationsent://SD_ILS/0/SD_ILS:1063912024-05-23T14:20:09Z2024-05-23T14:20:09Zby Topuz, Bertan.<br/><a href="http://hdl.handle.net/11147/3039">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Designing programmable logic controller for data acquisition and controlent://SD_ILS/0/SD_ILS:264032024-05-23T14:20:09Z2024-05-23T14:20:09Zby Gözütok, Mehmet Emre.<br/><a href="http://hdl.handle.net/11147/3511">Access to Electronic Version.</a><br/>Format: El Yazması<br/>