Search Results for - Narrowed by: E-Book - 2013 - Algorithm Analysis and Problem Complexity. - Mathematics. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026qf$003dSUBJECT$002509Subject$002509Algorithm$002bAnalysis$002band$002bProblem$002bComplexity.$002509Algorithm$002bAnalysis$002band$002bProblem$002bComplexity.$0026qf$003dSUBJECT$002509Subject$002509Mathematics.$002509Mathematics.$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300$0026isd$003dtrue? 2024-08-27T01:53:51Z Theory and Applications of Satisfiability Testing &ndash; SAT 2013 16th International Conference, Helsinki, Finland, July 8-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334724 2024-08-27T01:53:51Z 2024-08-27T01:53:51Z Author&#160;J&auml;rvisalo, Matti. editor.&#160;Van Gelder, Allen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334724.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39071-5">http://dx.doi.org/10.1007/978-3-642-39071-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I ent://SD_ILS/0/SD_ILS:335157 2024-08-27T01:53:51Z 2024-08-27T01:53:51Z Author&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335157.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II ent://SD_ILS/0/SD_ILS:335160 2024-08-27T01:53:51Z 2024-08-27T01:53:51Z Author&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335160.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Logical Foundations of Mathematics and Computational Complexity A Gentle Introduction ent://SD_ILS/0/SD_ILS:332681 2024-08-27T01:53:51Z 2024-08-27T01:53:51Z Author&#160;Pudl&aacute;k, Pavel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332681.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-00119-7">http://dx.doi.org/10.1007/978-3-319-00119-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Tower of Hanoi &ndash; Myths and Maths ent://SD_ILS/0/SD_ILS:332606 2024-08-27T01:53:51Z 2024-08-27T01:53:51Z Author&#160;Hinz, Andreas M. author.&#160;Klav&#382;ar, Sandi. author.&#160;Milutinovi&#263;, Uro&scaron;. author.&#160;Petr, Ciril. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332606.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-0348-0237-6">http://dx.doi.org/10.1007/978-3-0348-0237-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Structure of Solutions of Variational Problems ent://SD_ILS/0/SD_ILS:332024 2024-08-27T01:53:51Z 2024-08-27T01:53:51Z Author&#160;Zaslavski, Alexander J. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332024.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6387-0">http://dx.doi.org/10.1007/978-1-4614-6387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332947 2024-08-27T01:53:51Z 2024-08-27T01:53:51Z Author&#160;Das, Sajal K. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Kantarcioglu, Murat. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332947.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02786-9">http://dx.doi.org/10.1007/978-3-319-02786-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Connected Dominating Set: Theory and Applications ent://SD_ILS/0/SD_ILS:331720 2024-08-27T01:53:51Z 2024-08-27T01:53:51Z Author&#160;Du, Ding-Zhu. author.&#160;Wan, Peng-Jun. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331720.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5242-3">http://dx.doi.org/10.1007/978-1-4614-5242-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>