Search Results for - Narrowed by: Electronic Library - 2006 - Computer Communication Networks. - Computer science. - Data structures (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092006$0025092006$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300$0026isd$003dtrue? 2024-08-27T20:08:36Z Algorithmic Aspects of Wireless Sensor Networks Second International Workshop, ALGOSENSORS 2006, Venice, Italy, July 15, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:185708 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Nikoletseas, Sotiris E. editor.&#160;Rolim, Jos&eacute; D. P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11963271">http://dx.doi.org/10.1007/11963271</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:165205 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Vaudenay, Serge. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Intrusion Detection Through Visualization ent://SD_ILS/0/SD_ILS:165418 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Axelsson, Stefan. author.&#160;Sands, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Computer Security ent://SD_ILS/0/SD_ILS:175390 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Salomon, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-84628-341-8">http://dx.doi.org/10.1007/1-84628-341-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theoretical Computer Science Essays in Memory of Shimon Even ent://SD_ILS/0/SD_ILS:183542 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Goldreich, Oded. editor.&#160;Rosenberg, Arnold L. editor.&#160;Selman, Alan L. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11685654">http://dx.doi.org/10.1007/11685654</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing in Sensor Systems Second IEEE International Conference, DCOSS 2006, San Francisco, CA, USA, June 18-20, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184223 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Gibbons, Phillip B. editor.&#160;Abdelzaher, Tarek. editor.&#160;Aspnes, James. editor.&#160;Rao, Ramesh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11776178">http://dx.doi.org/10.1007/11776178</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Structural Information and Communication Complexity 13th International Colloquium, SIROCCO 2006, Chester, UK, July 2-5, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184264 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Flocchini, Paola. editor.&#160;G&#261;sieniec, Leszek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11780823">http://dx.doi.org/10.1007/11780823</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithm Theory &ndash; SWAT 2006 10th Scandinavian Workshop on Algorithm Theory, Riga, Latvia, July 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184302 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Arge, Lars. editor.&#160;Freivalds, Rusins. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11785293">http://dx.doi.org/10.1007/11785293</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computing and Combinatorics 12th Annual International Conference, COCOON 2006, Taipei, Taiwan, August 15-18, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184468 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Chen, Danny Z. editor.&#160;Lee, D. T. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11809678">http://dx.doi.org/10.1007/11809678</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithms &ndash; ESA 2006 14th Annual European Symposium, Zurich, Switzerland, September 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184699 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Azar, Yossi. editor.&#160;Erlebach, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11841036">http://dx.doi.org/10.1007/11841036</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> General Theory of Information Transfer and Combinatorics ent://SD_ILS/0/SD_ILS:184903 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Ahlswede, Rudolf. editor.&#160;B&auml;umer, Lars. editor.&#160;Cai, Ning. editor.&#160;Aydinian, Harout. editor.&#160;Blinovsky, Vladimir. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11889342">http://dx.doi.org/10.1007/11889342</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Languages and Compilers for Parallel Computing 18th International Workshop, LCPC 2005, Hawthorne, NY, USA, October 20-22, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:185788 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Ayguad&eacute;, Eduard. editor.&#160;Baumgartner, Gerald. editor.&#160;Ramanujam, J. editor.&#160;Sadayappan, P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69330-7">http://dx.doi.org/10.1007/978-3-540-69330-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Wireless Network Security ent://SD_ILS/0/SD_ILS:165680 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29845-0">http://dx.doi.org/10.1007/978-0-387-29845-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:166154 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Saeed, Khalid. editor.&#160;Peja&#347;, Jerzy. editor.&#160;Mosdorf, Romuald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality of Protection Security Measurements and Metrics ent://SD_ILS/0/SD_ILS:166159 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Gollmann, Dieter. editor.&#160;Massacci, Fabio. editor.&#160;Yautsiukhin, Artsiom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Access Control Systems Security, Identity Management and Trust Models ent://SD_ILS/0/SD_ILS:165433 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Benantar, Messaoud. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:166010 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CryptoGraphics Exploiting Graphics Cards for Security ent://SD_ILS/0/SD_ILS:166011 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Cook, Debra L. author.&#160;Keromytis, Angelos D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-34189-7">http://dx.doi.org/10.1007/0-387-34189-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:165571 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Baig&egrave;neres, Thomas. author.&#160;Lu, Yi. author.&#160;Vaudenay, Serge. author.&#160;Junod, Pascal. author.&#160;Monnerat, Jean. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:165645 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Huang, Chin-Tser. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Preserving Data Mining ent://SD_ILS/0/SD_ILS:165653 2024-08-27T20:08:36Z 2024-08-27T20:08:36Z Author&#160;Vaidya, Jaideep. author.&#160;Zhu, Yu Michael. author.&#160;Clifton, Christopher W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>