Search Results for - Narrowed by: 2006 - İzmir Institute of Technology. Computer Engineering.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026qf$003dAUTHOR$002509Author$002509$0025C4$0025B0zmir$002bInstitute$002bof$002bTechnology.$002bComputer$002bEngineering.$002509$0025C4$0025B0zmir$002bInstitute$002bof$002bTechnology.$002bComputer$002bEngineering.$0026rm$003dTEZ$002bKOLEKSIYONU0$00257C$00257C$00257C1$00257C$00257C$00257C0$00257C$00257C$00257Ctrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?2024-05-08T00:00:16ZAn Automatic Vision Guided Position Controller In A Conveyor Belt Pick And Place Systement://SD_ILS/0/SD_ILS:505482024-05-08T00:00:16Z2024-05-08T00:00:16Zby Çelikdemir, Özgür.<br/><a href="http://hdl.handle.net/11147/3751">Access to Electronic Version.</a><br/>Format: El Yazması<br/>3D Reconstruction Using A Spherical Spiral Scan Cameraent://SD_ILS/0/SD_ILS:504082024-05-08T00:00:16Z2024-05-08T00:00:16Zby Vatansever, Mustafa.<br/><a href="http://hdl.handle.net/11147/3737">Access to Electronic Version.</a><br/>Format: El Yazması<br/>A cluster based communication architecture for distributed applications in mobile ad hoc networksent://SD_ILS/0/SD_ILS:188532024-05-08T00:00:16Z2024-05-08T00:00:16Zby Dağdeviren, Orhan.<br/><a href="http://hdl.handle.net/11147/3437">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Web Services Security: A Proposed Architecture For Interdomain Trust Relationshipent://SD_ILS/0/SD_ILS:254022024-05-08T00:00:16Z2024-05-08T00:00:16Zby Hendrickson, Selim L.Y.<br/><a href="http://hdl.handle.net/11147/3469">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Defining a sample template for governmental procurements of cryptographic productsent://SD_ILS/0/SD_ILS:169352024-05-08T00:00:16Z2024-05-08T00:00:16Zby Taş, Levent.<br/><a href="http://hdl.handle.net/11147/3340">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Developing a security mechanism for software agentsent://SD_ILS/0/SD_ILS:188542024-05-08T00:00:16Z2024-05-08T00:00:16Zby Tekbacak, Fatih.<br/><a href="http://hdl.handle.net/11147/3438">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Statistical methods used for intrusion detectionent://SD_ILS/0/SD_ILS:187832024-05-08T00:00:16Z2024-05-08T00:00:16Zby Özardıç, Onur.<br/><a href="http://hdl.handle.net/11147/3435">Access to Electronic Version.</a><br/>Format: El Yazması<br/>