Arama Sonuçları Data science. - Daraltılmış: Mathematics.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dData$002bscience.$0026qf$003dSUBJECT$002509Konu$002509Mathematics.$002509Mathematics.$0026ps$003d300$0026isd$003dtrue?2024-11-15T04:20:07ZData Modeling for Metrology and Testing in Measurement Scienceent://SD_ILS/0/SD_ILS:1682952024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Pavese, Franco. editor. Forbes, Alistair B. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-8176-4804-6">http://dx.doi.org/10.1007/978-0-8176-4804-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Signal treatment and signal analysis in NMRent://SD_ILS/0/SD_ILS:2528052024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Rutledge, D. N. (Douglas N.)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444819864">http://www.sciencedirect.com/science/book/9780444819864</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335157.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE(335160.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Prime Numbers and Computer Methods for Factorizationent://SD_ILS/0/SD_ILS:1683742024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Riesel, Hans. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-8176-8298-9">http://dx.doi.org/10.1007/978-0-8176-8298-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Crittografia nel Paese delle Meraviglieent://SD_ILS/0/SD_ILS:2046512024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Venturi, Daniele. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-88-470-2481-6">http://dx.doi.org/10.1007/978-88-470-2481-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Rainbow Connections of Graphsent://SD_ILS/0/SD_ILS:1741962024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Li, Xueliang. author. Sun, Yuefang. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-3119-0">http://dx.doi.org/10.1007/978-1-4614-3119-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data Correcting Approaches in Combinatorial Optimizationent://SD_ILS/0/SD_ILS:1744242024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Goldengorin, Boris. author. Pardalos, Panos M. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5286-7">http://dx.doi.org/10.1007/978-1-4614-5286-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The Crossing of Heaven Memoirs of a Mathematicianent://SD_ILS/0/SD_ILS:1950632024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Gustafson, Karl. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-22558-1">http://dx.doi.org/10.1007/978-3-642-22558-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959312024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Geometric Structure of High-Dimensional Data and Dimensionality Reductionent://SD_ILS/0/SD_ILS:1962132024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Wang, Jianzhong. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-27497-8">http://dx.doi.org/10.1007/978-3-642-27497-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Einführung in die Kryptographieent://SD_ILS/0/SD_ILS:1916052024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Buchmann, Johannes. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-11186-0">http://dx.doi.org/10.1007/978-3-642-11186-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Permutation Complexity in Dynamical Systems Ordinal Patterns, Permutation Entropy and All Thatent://SD_ILS/0/SD_ILS:1908312024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Amigó, José. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-04084-9">http://dx.doi.org/10.1007/978-3-642-04084-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935242024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Alpcan, Tansu. editor. Buttyán, Levente. editor. Baras, John S. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17197-0">http://dx.doi.org/10.1007/978-3-642-17197-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935822024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Abe, Masayuki. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Elementary Number Theory, Cryptography and Codesent://SD_ILS/0/SD_ILS:1857362024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Baldoni, Maria Welleda. author. Ciliberto, Ciro. author. Cattaneo, Giulia Maria Piacentini. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-69200-3">http://dx.doi.org/10.1007/978-3-540-69200-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Signal Processing, Image Processing and Pattern Recognition International Conference, SIP 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1914012024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Ślęzak, Dominik. editor. Pal, Sankar K. editor. Kang, Byeong-Ho. editor. Gu, Junzhong. editor. Kuroda, Hideo. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10546-3">http://dx.doi.org/10.1007/978-3-642-10546-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Finite Automata and Application to Cryptographyent://SD_ILS/0/SD_ILS:1880682024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Tao, Renji. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1913462024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Random Trees An Interplay between Combinatorics and Probabilityent://SD_ILS/0/SD_ILS:1770402024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Drmota, Michael. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-211-75357-6">http://dx.doi.org/10.1007/978-3-211-75357-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Algebraic Function Fields and Codesent://SD_ILS/0/SD_ILS:1877122024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Stichtenoth, Henning. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-76878-4">http://dx.doi.org/10.1007/978-3-540-76878-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Post-Quantum Cryptographyent://SD_ILS/0/SD_ILS:1891062024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Bernstein, Daniel J. editor. Buchmann, Johannes. editor. Dahmen, Erik. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-88702-7">http://dx.doi.org/10.1007/978-3-540-88702-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Gröbner Bases, Coding, and Cryptographyent://SD_ILS/0/SD_ILS:1895132024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Sala, Massimiliano. editor. Sakata, Shojiro. editor. Mora, Teo. editor. Traverso, Carlo. editor. Perret, Ludovic. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-93806-4">http://dx.doi.org/10.1007/978-3-540-93806-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Random Curves Journeys of a Mathematicianent://SD_ILS/0/SD_ILS:1870492024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Koblitz, Neal. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-74078-0">http://dx.doi.org/10.1007/978-3-540-74078-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Einführung in die Kryptographieent://SD_ILS/0/SD_ILS:1871602024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Buchmann, Johannes. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-74452-8">http://dx.doi.org/10.1007/978-3-540-74452-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Securityent://SD_ILS/0/SD_ILS:1880612024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>An Introduction to Mathematical Cryptographyent://SD_ILS/0/SD_ILS:1675452024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Silverman, J.H. author. Pipher, Jill. author. Hoffstein, Jeffrey. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Codes: An Introduction to Information Communication and Cryptographyent://SD_ILS/0/SD_ILS:1757912024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Biggs, N.L. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Number Theory An Introduction via the Distribution of Primesent://SD_ILS/0/SD_ILS:1681862024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Fine, Benjamin. author. Rosenberger, Gerhard. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-8176-4541-0">http://dx.doi.org/10.1007/978-0-8176-4541-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Topics in Geometry, Coding Theory and Cryptographyent://SD_ILS/0/SD_ILS:1694372024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Garcia, Arnaldo. editor. Stichtenoth, Henning. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Visuelle Kryptographieent://SD_ILS/0/SD_ILS:1865172024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Klein, Andreas. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-72362-2">http://dx.doi.org/10.1007/978-3-540-72362-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Decrypted Secrets Methods and Maxims of Cryptologyent://SD_ILS/0/SD_ILS:1850532024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Bauer, Friedrich L. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Binary Quadratic Forms An Algorithmic Approachent://SD_ILS/0/SD_ILS:1849372024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Buchmann, Johannes. author. Vollmer, Ulrich. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-540-46368-9">http://dx.doi.org/10.1007/978-3-540-46368-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Arne Beurling und Hitlers Geheimschreiber Schwedische Entzifferungserfolge im 2. Weltkriegent://SD_ILS/0/SD_ILS:1825842024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Beckman, Bengt. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-540-31290-0">http://dx.doi.org/10.1007/3-540-31290-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Brute Force Cracking the Data Encryption Standardent://SD_ILS/0/SD_ILS:1519562024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Curtin, Matt. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1649302024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to Modern Number Theory Fundamental Problems, Ideas and Theoriesent://SD_ILS/0/SD_ILS:1815402024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Manin, Yuri Ivanovic. author. Panchishkin, Alexei A. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-540-27692-0">http://dx.doi.org/10.1007/3-540-27692-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Codici Cifrati Arne Beurling e la crittografia nella II guerra mondialeent://SD_ILS/0/SD_ILS:2041262024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Beckman, Bengt. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/88-470-0395-4">http://dx.doi.org/10.1007/88-470-0395-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Contemporary Cryptologyent://SD_ILS/0/SD_ILS:1978892024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Catalano, Dario. author. Cramer, Ronald. author. Crescenzo, Giovanni. author. Darmgård, Ivan. author. Pointcheval, David. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/3-7643-7394-6">http://dx.doi.org/10.1007/3-7643-7394-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:1651652024-11-15T04:20:07Z2024-11-15T04:20:07ZYazar Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>