Search Results for - Narrowed by: 2010 - İzmir Institute of Technology. Computer Engineering. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qf$003dPUBDATE$002509Publication$002bDate$0025092010$0025092010$0026qf$003dAUTHOR$002509Author$002509$0025C4$0025B0zmir$002bInstitute$002bof$002bTechnology.$002bComputer$002bEngineering.$002509$0025C4$0025B0zmir$002bInstitute$002bof$002bTechnology.$002bComputer$002bEngineering.$0026rm$003dTEZ$002bKOLEKSIYONU0$00257C$00257C$00257C1$00257C$00257C$00257C0$00257C$00257C$00257Ctrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-04-27T07:42:15Z Impacts of frequent itemset hiding algorithms on privacy preserving data mining ent://SD_ILS/0/SD_ILS:106389 2024-04-27T07:42:15Z 2024-04-27T07:42:15Z by&#160;Yıldız, Barış.<br/><a href="http://hdl.handle.net/11147/3037">Access to Electronic Version</a><br/>Format:&#160;El Yazması<br/> Development of fuzzy syllogistic algorithms and applications distributed reasoning approaches ent://SD_ILS/0/SD_ILS:108018 2024-04-27T07:42:15Z 2024-04-27T07:42:15Z by&#160;&Ccedil;akır, H&uuml;seyin.<br/><a href="http://hdl.handle.net/11147/3057">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Level based labeling scheme for extensible markup language (XML) data processing ent://SD_ILS/0/SD_ILS:93079 2024-04-27T07:42:15Z 2024-04-27T07:42:15Z by&#160;Atıcı, Beray.<br/><a href="http://hdl.handle.net/11147/4023">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Development of a static analysis tool to find securty vulnerabilities in java applications ent://SD_ILS/0/SD_ILS:106391 2024-04-27T07:42:15Z 2024-04-27T07:42:15Z by&#160;Topuz, Bertan.<br/><a href="http://hdl.handle.net/11147/3039">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Performance enhancement of real-time protocol master of science ent://SD_ILS/0/SD_ILS:92342 2024-04-27T07:42:15Z 2024-04-27T07:42:15Z by&#160;Y&uuml;cel, &Ccedil;ağan Sel&ccedil;uk.<br/><a href="http://hdl.handle.net/11147/4022">Access to Electronic Version</a><br/>Format:&#160;El Yazması<br/> Utilization of timed automata as a verification tool for real-time security protocols ent://SD_ILS/0/SD_ILS:106737 2024-04-27T07:42:15Z 2024-04-27T07:42:15Z by&#160;K&uuml;lah&ccedil;ıoğlu, Burcu.<br/><a href="http://hdl.handle.net/11147/3046">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Designing programmable logic controller for data acquisition and control ent://SD_ILS/0/SD_ILS:26403 2024-04-27T07:42:15Z 2024-04-27T07:42:15Z by&#160;G&ouml;z&uuml;tok, Mehmet Emre.<br/><a href="http://hdl.handle.net/11147/3511">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/> Modeling and verification of a stream authentication protocol using communicating sequential processes ent://SD_ILS/0/SD_ILS:63164 2024-04-27T07:42:15Z 2024-04-27T07:42:15Z by&#160;&Ouml;zkan, S&uuml;leyman Murat.<br/><a href="http://hdl.handle.net/11147/3819">Access to Electronic Version.</a><br/>Format:&#160;El Yazması<br/>