Giriş
|
Kütüphane Hesabım
|
Listelerim
|
|
Remember to clear the cache and close the browser window.
Search Limit
Tümü
E-Kitap
Dergiler
Beytepe Kütüphanesi
Sağlık Bilimleri Kütüphanesi
Konservatuvar Kütüphanesi
Hukuk Kütüphanesi
Sosyal Bilimler Meslek Yüksek Okulu
DVD Koleksiyonu
Prof.Dr. Onur Bilge Kula Koleksiyonu
Rooms Restriction Values
Tüm Alanlar
Başlık
Yazar
Konu
ISBN
ISSN
12
Search Field
Tüm Alanlar
Target Value
Limit Value
Restriction Value
Arama:
Gelişmiş Arama
Arama Sonuçlarını Sınırlandır
Daraltılmış:
+
Konu: Applications of Mathematics.
Yazar
Dahil
Hariç
SpringerLink (Online service)
(13)
Sako, Kazue. editor.
(2)
Sarkar, Palash. editor.
(2)
Ayesh, Aladdin. editor.
(1)
Betti, Renato. editor.
(1)
Cangiani, Andrea. editor.
(1)
Davidchack, Ruslan L. editor.
(1)
Georgoulis, Emmanuil. editor.
(1)
Gong, Zaiwu. author.
(1)
Gorban, Alexander N. editor.
(1)
Gosse, Laurent. author.
(1)
Guerraggio, Angelo. editor.
(1)
Jünger, Michael. editor.
(1)
Kubrusly, Carlos S. editor.
(1)
Lamour, René. author.
(1)
Levesley, Jeremy. editor.
(1)
Lin, Yi. author.
(1)
Marr, Alison M. author.
(1)
März, Roswitha. author.
(1)
Nievergelt, Yves. author.
(1)
Quarteroni, Alfio. author.
(1)
Rausch, Peter. editor.
(1)
Reinelt, Gerhard. editor.
(1)
Sheta, Alaa F. editor.
(1)
Termini, Settimo. editor.
(1)
Tischendorf, Caren. author.
(1)
Tretyakov, Michael V. editor.
(1)
Wallis, W.D. author.
(1)
Yao, Tianxiang. author.
(1)
de Moura, Carlos A. editor.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Dil
Dahil
Hariç
English
(11)
Italian
(2)
Yayın Yılı
Dahil
Hariç
-
2013
(13)
Konu
Dahil
Hariç
Mathematics.
(13)
Computational Mathematics and Numerical Analysis.
(6)
Computer science -- Mathematics.
(6)
Computer science.
(6)
Computational complexity.
(4)
Discrete Mathematics in Computer Science.
(4)
Algorithm Analysis and Problem Complexity.
(2)
Appl.Mathematics/Computational Methods of Engineering.
(2)
Computational Science and Engineering.
(2)
Computer software.
(2)
Data Encryption.
(2)
Data encryption (Computer science).
(2)
Data protection.
(2)
Differential equations, partial.
(2)
Engineering mathematics.
(2)
Information Systems.
(2)
Management of Computing and Information Systems.
(2)
Mathematical Modeling and Industrial Mathematics.
(2)
Numerical analysis.
(2)
Numerical and Computational Physics.
(2)
Partial Differential Equations.
(2)
Systems and Data Security.
(2)
Abstract Harmonic Analysis.
(1)
Algorithms.
(1)
Business Information Systems.
(1)
Combinatorics.
(1)
Computational Intelligence.
(1)
Computer Science, general.
(1)
Computer engineering.
(1)
Differential Equations.
(1)
Economics.
(1)
Economics/Management Science, general.
(1)
Electrical Engineering.
(1)
Engineering.
(1)
Fourier analysis.
(1)
Harmonic analysis.
(1)
History of Mathematical Sciences.
(1)
Information Systems Applications (incl. Internet).
(1)
Information theory.
(1)
Management information systems.
(1)
Mathematical optimization.
(1)
Mathematics Education.
(1)
Optimization.
(1)
Ordinary Differential Equations.
(1)
Popular Science in Mathematics/Computer Science/Natural Science/Technology.
(1)
Theoretical, Mathematical and Computational Physics.
(1)
Theory of Computation.
(1)
Daha fazla
Tümünü genişlet
Daha az
Hepsini Daralt
Materyal Türü
Dahil
Hariç
E-Kitap
Shelf Location
Dahil
Hariç
Elektronik Kütüphane
Kütüphane
Dahil
Hariç
Çevrimiçi Kütüphane
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
13 sonuç bulundu
1
2
Sıralama:
İlgiye Göre (Varsayılan)
Yıla Gore (Artan)
Yıla Gore (Azalan)
Başlık
Yazar
0
DEFAULT_TR
Liste seç
Geçici Liste
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
One or more items could not be added because you are not logged in.
13.
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
Yazar
Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)
Yer Numarası
ONLINE(335160.1)
Elektronik Erişim
http://dx.doi.org/10.1007/978-3-642-42045-0
Format:
Durum
Çevrimiçi Kütüphane~1
Rafta:
Kopya:
Eylem Seç
Ayırt
Listelerime ekle
Eposta
Yazdır
1
2