Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
Tüm Alanlar
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
7
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
DEFAULT_TR
Tez Koleksiyonu
DEFAULT_TR
Kitap Koleksiyonu
E-Kitap Koleksiyonu
Multimedia Koleksiyonu
Tez Koleksiyonu
Ulaştırma Mühendisliği Koleksiyonu
Basılı Süreli Yayınlar
Yeşil Kampüs
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Author: İzmir Institute of Technology. Computer Engineering.
+
Publication Date: 2008
Author
Dahil
Hariç
Koltuksuz, Ahmet. Theis advisor.
(2)
Tuğlular, Tuğkan. Thesis advisor.
(2)
Akalp, Evren.
(1)
Ayav Tolga. Theis advisor.
(1)
Aycan, Esra.
(1)
Beyazıt, Mutlu.
(1)
Erdoğan, Yunus.
(1)
Gürel, Görkem.
(1)
Koltuksuz, Ahmet Hasan. Theis advisor.
(1)
Mutlu, Gökçe.
(1)
Püskülcü, Halis. Thesis advisor.
(1)
Çakı, Oğuzhan.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Material Type
Dahil
Hariç
Ek CD-ROM
Tez
Language
Dahil
Hariç
English
(7)
Subject
Dahil
Hariç
Computer networks -- Security measures -- Software.
(2)
Algorithms.
(1)
Computer algorithms.
(1)
Computer security -- Computer programs.
(1)
Computer software -- Development.
(1)
Constraint programming(Computer science)
(1)
Cryptography.
(1)
Data minning.
(1)
Digital signatures.
(1)
Extreme programming.
(1)
Firewall(Computer security)
(1)
Firewalls(Computer security)
(1)
Lattice theory.
(1)
Schedules, School.
(1)
Simulated anneling(Mathematics)
(1)
Software architecture.
(1)
XML(Document marcup language)
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Shelf Location
Dahil
Hariç
Tez Koleksiyonu
Library
Dahil
Hariç
IYTE Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
7 sonuç bulundu
1
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0000000
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
1.
Reduction algorithms for the cryptanalysis of lattice based asymmetrical cryptosystems
Reduction algorithms for the cryptanalysis of lattice based asymmetrical cryptosystems
by
Beyazıt, Mutlu.
Access to Electronic Version.
Format:
2.
Development of a distributed firewall administration tool
Development of a distributed firewall administration tool
by
Erdoğan, Yunus.
Access to Electronic Version.
Format:
3.
Mining XML documents with association rule algorithms
Mining XML documents with association rule algorithms
by
Gürel, Görkem.
Access to Electronic Version.
Format:
4.
Access monitoring system for distributed firewall policies
Access monitoring system for distributed firewall policies
by
Çakı, Oğuzhan.
Access to Electronic Version.
Format:
5.
Quality life cycle of object oriented software development in extreme programming
Quality life cycle of object oriented software development in extreme programming
by
Mutlu, Gökçe.
Access to Electronic Version.
Format:
6.
The web-based application of key exchange protocols for digital and mobile signatures.
The web-based application of key exchange protocols for digital and mobile signatures.
by
Akalp, Evren.
Access to Electronic Version.
Format:
7.
Solving the course scheduling problem by constraint programming and simulated annealing
Solving the course scheduling problem by constraint programming and simulated annealing
by
Aycan, Esra.
Access to Electronic Version.
Format:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1