Search Results for İzmir Institute of Technology. Computer Engineering. - Narrowed by: 2010SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/tr_TR/default_tr/default_tr/qu$003d$0025C4$0025B0zmir$002bInstitute$002bof$002bTechnology.$002bComputer$002bEngineering.$0026qf$003dPUBDATE$002509Yay$0025C4$0025B1n$002bTarihi$0025092010$0025092010$0026rm$003dTEZ$002bKOLEKSIYONU0$00257C$00257C$00257C1$00257C$00257C$00257C0$00257C$00257C$00257Ctrue$0026te$003dILS$0026ps$003d300?2024-05-20T06:08:32ZPerformance enhancement of real-time protocol master of scienceent://SD_ILS/0/SD_ILS:923422024-05-20T06:08:32Z2024-05-20T06:08:32Zby Yücel, Çağan Selçuk.<br/><a href="http://hdl.handle.net/11147/4022">Access to Electronic Version</a><br/>Format: El Yazması<br/>Utilization of timed automata as a verification tool for real-time security protocolsent://SD_ILS/0/SD_ILS:1067372024-05-20T06:08:32Z2024-05-20T06:08:32Zby Külahçıoğlu, Burcu.<br/><a href="http://hdl.handle.net/11147/3046">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Modeling and verification of a stream authentication protocol using communicating sequential processesent://SD_ILS/0/SD_ILS:631642024-05-20T06:08:32Z2024-05-20T06:08:32Zby Özkan, Süleyman Murat.<br/><a href="http://hdl.handle.net/11147/3819">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Designing programmable logic controller for data acquisition and controlent://SD_ILS/0/SD_ILS:264032024-05-20T06:08:32Z2024-05-20T06:08:32Zby Gözütok, Mehmet Emre.<br/><a href="http://hdl.handle.net/11147/3511">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Impacts of frequent itemset hiding algorithms on privacy preserving data miningent://SD_ILS/0/SD_ILS:1063892024-05-20T06:08:32Z2024-05-20T06:08:32Zby Yıldız, Barış.<br/><a href="http://hdl.handle.net/11147/3037">Access to Electronic Version</a><br/>Format: El Yazması<br/>Level based labeling scheme for extensible markup language (XML) data processingent://SD_ILS/0/SD_ILS:930792024-05-20T06:08:32Z2024-05-20T06:08:32Zby Atıcı, Beray.<br/><a href="http://hdl.handle.net/11147/4023">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Development of a static analysis tool to find securty vulnerabilities in java applicationsent://SD_ILS/0/SD_ILS:1063912024-05-20T06:08:32Z2024-05-20T06:08:32Zby Topuz, Bertan.<br/><a href="http://hdl.handle.net/11147/3039">Access to Electronic Version.</a><br/>Format: El Yazması<br/>Development of fuzzy syllogistic algorithms and applications distributed reasoning approachesent://SD_ILS/0/SD_ILS:1080182024-05-20T06:08:32Z2024-05-20T06:08:32Zby Çakır, Hüseyin.<br/><a href="http://hdl.handle.net/11147/3057">Access to Electronic Version.</a><br/>Format: El Yazması<br/>