Search Results for Law. - Narrowed by: Application software. SirsiDynix Enterprise http://librarycatalog.yyu.edu.tr/client/en_US/default/default/qu$003dLaw.$0026qf$003dSUBJECT$002509Subject$002509Application$002bsoftware.$002509Application$002bsoftware.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2025-02-13T12:36:37Z Semantic Processing of Legal Texts Where the Language of Law Meets the Law of Language ent://SD_ILS/0/SD_ILS:170644 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Francesconi, Enrico. editor.<br/><a href="https://doi.org/10.1007/978-3-642-12837-0">https://doi.org/10.1007/978-3-642-12837-0</a><br/>Format:&#160;Electronic Resources<br/> Computable Models of the Law Languages, Dialogues, Games, Ontologies ent://SD_ILS/0/SD_ILS:171293 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Sartor, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-540-85569-9">https://doi.org/10.1007/978-3-540-85569-9</a><br/>Format:&#160;Electronic Resources<br/> Recordkeeping, Ethics and Law Regulatory Models, Participant Relationships and Rights and Responsibilities in the Online World ent://SD_ILS/0/SD_ILS:155104 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Iacovino, Livia. author.<br/><a href="https://doi.org/10.1007/1-4020-4714-2">https://doi.org/10.1007/1-4020-4714-2</a><br/>Format:&#160;Electronic Resources<br/> Law and the Semantic Web Legal Ontologies, Methodologies, Legal Information Retrieval, and Applications ent://SD_ILS/0/SD_ILS:169683 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Benjamins, V. Richard. editor.<br/><a href="https://doi.org/10.1007/b106624">https://doi.org/10.1007/b106624</a><br/>Format:&#160;Electronic Resources<br/> Legal Principles for Combatting Cyberlaundering ent://SD_ILS/0/SD_ILS:173654 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Leslie, Daniel Adeoy&eacute;. author.<br/><a href="https://doi.org/10.1007/978-3-319-06416-1">https://doi.org/10.1007/978-3-319-06416-1</a><br/>Format:&#160;Electronic Resources<br/> The Circulation of Agency in E-Justice Interoperability and Infrastructures for European Transborder Judicial Proceedings ent://SD_ILS/0/SD_ILS:158053 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Contini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-94-007-7525-1">https://doi.org/10.1007/978-94-007-7525-1</a><br/>Format:&#160;Electronic Resources<br/> Agreement Technologies ent://SD_ILS/0/SD_ILS:160497 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Ossowski, Sascha. editor.<br/><a href="https://doi.org/10.1007/978-94-007-5583-3">https://doi.org/10.1007/978-94-007-5583-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Applications for Handling Legal Evidence, Police Investigation and Case Argumentation ent://SD_ILS/0/SD_ILS:166915 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Nissan, Ephraim. author.<br/><a href="https://doi.org/10.1007/978-90-481-8990-8">https://doi.org/10.1007/978-90-481-8990-8</a><br/>Format:&#160;Electronic Resources<br/> Maturing Usability Quality in Software, Interaction and Value ent://SD_ILS/0/SD_ILS:140273 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Law, Effie Lai-Chong. editor.<br/><a href="https://doi.org/10.1007/978-1-84628-941-5">https://doi.org/10.1007/978-1-84628-941-5</a><br/>Format:&#160;Electronic Resources<br/> Safeguards in a World of Ambient Intelligence ent://SD_ILS/0/SD_ILS:155500 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Wright, David. editor.<br/><a href="https://doi.org/10.1007/978-1-4020-6662-7">https://doi.org/10.1007/978-1-4020-6662-7</a><br/>Format:&#160;Electronic Resources<br/> AI Approaches to the Complexity of Legal Systems AICOL 2013 International Workshops, AICOL-IV@IVR, Belo Horizonte, Brazil, July 21-27, 2013 and AICOL-V@SINTELNET-JURIX, Bologna, Italy, December 11, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:147402 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Casanovas, Pompeu. editor.<br/><a href="https://doi.org/10.1007/978-3-662-45960-7">https://doi.org/10.1007/978-3-662-45960-7</a><br/>Format:&#160;Electronic Resources<br/> Open Source Software: Mobile Open Source Technologies 10th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2014, San Jos&eacute;, Costa Rica, May 6-9, 2014, Proceedings ent://SD_ILS/0/SD_ILS:169022 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Corral, Luis. editor.<br/><a href="https://doi.org/10.1007/978-3-642-55128-4">https://doi.org/10.1007/978-3-642-55128-4</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:172499 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-36213-2">https://doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:176951 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Chbeir, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-7091-0894-9">https://doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Electronic Resources<br/> Informationelle Selbstbestimmung im Web 2.0 Chancen und Risiken sozialer Verschlagwortungssysteme ent://SD_ILS/0/SD_ILS:184432 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Doerfel, Stephan. author.<br/><a href="https://doi.org/10.1007/978-3-642-38056-3">https://doi.org/10.1007/978-3-642-38056-3</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings ent://SD_ILS/0/SD_ILS:173723 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30428-6">https://doi.org/10.1007/978-3-642-30428-6</a><br/>Format:&#160;Electronic Resources<br/> Theory and Applications of Formal Argumentation First International Workshop, TAFA 2011. Barcelona, Spain, July 16-17, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170951 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Modgil, Sanjay. editor.<br/><a href="https://doi.org/10.1007/978-3-642-29184-5">https://doi.org/10.1007/978-3-642-29184-5</a><br/>Format:&#160;Electronic Resources<br/> AI Approaches to the Complexity of Legal Systems - Models and Ethical Challenges for Legal Systems, Legal Language and Legal Ontologies, Argumentation and Software Agents International Workshop AICOL-III, Held as Part of the 25th IVR Congress, Frankfurt am Main, Germany, August 15-16, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:172405 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Palmirani, Monica. editor. (orcid)0000-0002-8557-8084<br/><a href="https://doi.org/10.1007/978-3-642-35731-2">https://doi.org/10.1007/978-3-642-35731-2</a><br/>Format:&#160;Electronic Resources<br/> Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:173546 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Aschenbruck, Nils. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33161-9">https://doi.org/10.1007/978-3-642-33161-9</a><br/>Format:&#160;Electronic Resources<br/> Auctions, Market Mechanisms and Their Applications Second International ICST Conference, AMMA 2011, New York, USA, August 22-23, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:142891 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Coles, Peter. editor.<br/><a href="https://doi.org/10.1007/978-3-642-30913-7">https://doi.org/10.1007/978-3-642-30913-7</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government 11th IFIP WG 8.5 International Conference, EGOV 2012, Kristiansand, Norway, September 3-6, 2012, Proceedings ent://SD_ILS/0/SD_ILS:135278 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Scholl, Hans Jochen. editor.<br/><a href="https://doi.org/10.1007/978-3-642-33489-4">https://doi.org/10.1007/978-3-642-33489-4</a><br/>Format:&#160;Electronic Resources<br/> Analysis of Social Media and Ubiquitous Data International Workshops MSM 2010, Toronto, Canada, June 13, 2010, and MUSE 2010, Barcelona, Spain, September 20, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:170868 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Atzmueller, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-642-23599-3">https://doi.org/10.1007/978-3-642-23599-3</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVI 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:171772 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Christianson, Bruce. editor. (orcid)0000-0002-3777-7476<br/><a href="https://doi.org/10.1007/978-3-642-22137-8">https://doi.org/10.1007/978-3-642-22137-8</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:144179 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-642-22039-5">https://doi.org/10.1007/978-3-642-22039-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for Life ent://SD_ILS/0/SD_ILS:161234 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-642-20317-6">https://doi.org/10.1007/978-3-642-20317-6</a><br/>Format:&#160;Electronic Resources<br/> AI Approaches to the Complexity of Legal Systems International Workshops AICOL-I/IVR-XXIV, Beijing, China, September 19, 2009 and AICOL-II/JURIX 2009, Rotterdam, The Netherlands, December 16, 2009 Revised Selected Papers ent://SD_ILS/0/SD_ILS:170140 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Casanovas, Pompeu. editor.<br/><a href="https://doi.org/10.1007/978-3-642-16524-5">https://doi.org/10.1007/978-3-642-16524-5</a><br/>Format:&#160;Electronic Resources<br/> Online Communities and Social Computing Third International Conference, OCSC 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedings ent://SD_ILS/0/SD_ILS:171119 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Ozok, A. Ant. editor.<br/><a href="https://doi.org/10.1007/978-3-642-02774-1">https://doi.org/10.1007/978-3-642-02774-1</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Location-Based Applications Research Issues and Emerging Trends ent://SD_ILS/0/SD_ILS:147888 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Bettini, Claudio. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03511-1">https://doi.org/10.1007/978-3-642-03511-1</a><br/>Format:&#160;Electronic Resources<br/> Business Information Systems Workshops BIS 2009 International Workshops, Poznan, Poland, April 27-29, 2009, Revised Papers ent://SD_ILS/0/SD_ILS:162191 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Abramowicz, Witold. editor. (orcid)0000-0001-5464-9698<br/><a href="https://doi.org/10.1007/978-3-642-03424-4">https://doi.org/10.1007/978-3-642-03424-4</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:138859 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01393-5">https://doi.org/10.1007/978-3-642-01393-5</a><br/>Format:&#160;Electronic Resources<br/> Electronic Participation First International Conference, ePart 2009 Linz, Austria, August 31-September 4, 2009 Proceedings ent://SD_ILS/0/SD_ILS:142041 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Macintosh, Ann. editor.<br/><a href="https://doi.org/10.1007/978-3-642-03781-8">https://doi.org/10.1007/978-3-642-03781-8</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:142927 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-642-01718-6">https://doi.org/10.1007/978-3-642-01718-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised, Selected Papers ent://SD_ILS/0/SD_ILS:175837 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Bonchi, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-540-78478-4">https://doi.org/10.1007/978-3-540-78478-4</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:140542 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Ortiz-Arroyo, Daniel. editor.<br/><a href="https://doi.org/10.1007/978-3-540-89900-6">https://doi.org/10.1007/978-3-540-89900-6</a><br/>Format:&#160;Electronic Resources<br/> Medienrecht und Medienm&auml;rkte ent://SD_ILS/0/SD_ILS:188455 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Fischer, Joerg K. author.<br/><a href="https://doi.org/10.1007/978-3-540-72222-9">https://doi.org/10.1007/978-3-540-72222-9</a><br/>Format:&#160;Electronic Resources<br/> Online Communities and Social Computing Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings ent://SD_ILS/0/SD_ILS:170156 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Schuler, Douglas. editor.<br/><a href="https://doi.org/10.1007/978-3-540-73257-0">https://doi.org/10.1007/978-3-540-73257-0</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2006 Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis ent://SD_ILS/0/SD_ILS:168431 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Blyth, Andrew. editor.<br/><a href="https://doi.org/10.1007/978-1-84628-750-3">https://doi.org/10.1007/978-1-84628-750-3</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings ent://SD_ILS/0/SD_ILS:142541 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Yang, Christopher C. editor.<br/><a href="https://doi.org/10.1007/978-3-540-71549-8">https://doi.org/10.1007/978-3-540-71549-8</a><br/>Format:&#160;Electronic Resources<br/> IT-Projektrecht Vertragliche Gestaltung und Steuerung von IT-Projekten, Best Practices, Haftung der Gesch&auml;ftsleitung ent://SD_ILS/0/SD_ILS:180421 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Koch, Frank. author.<br/><a href="https://doi.org/10.1007/978-3-540-73224-2">https://doi.org/10.1007/978-3-540-73224-2</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. ent://SD_ILS/0/SD_ILS:171913 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Mehrotra, Sharad. editor.<br/><a href="https://doi.org/10.1007/11760146">https://doi.org/10.1007/11760146</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings ent://SD_ILS/0/SD_ILS:174745 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Chen, Hsinchun. editor.<br/><a href="https://doi.org/10.1007/11734628">https://doi.org/10.1007/11734628</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance Security in the Information Environment ent://SD_ILS/0/SD_ILS:168669 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Blyth, Andrew. author.<br/><a href="https://doi.org/10.1007/1-84628-489-9">https://doi.org/10.1007/1-84628-489-9</a><br/>Format:&#160;Electronic Resources<br/> EC2ND 2005 Proceedings of the First European Conference on Computer Network Defence ent://SD_ILS/0/SD_ILS:168934 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Blyth, Andrew. editor.<br/><a href="https://doi.org/10.1007/1-84628-352-3">https://doi.org/10.1007/1-84628-352-3</a><br/>Format:&#160;Electronic Resources<br/> Information Technology and Lawyers Advanced Technology in the Legal Domain, from Challenges to Daily Routine ent://SD_ILS/0/SD_ILS:137268 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Lodder, Arno R. editor.<br/><a href="https://doi.org/10.1007/1-4020-4146-2">https://doi.org/10.1007/1-4020-4146-2</a><br/>Format:&#160;Electronic Resources<br/> Handbuch IT in der Verwaltung ent://SD_ILS/0/SD_ILS:184762 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Wind, Martin. editor.<br/><a href="https://doi.org/10.1007/3-540-46272-4">https://doi.org/10.1007/3-540-46272-4</a><br/>Format:&#160;Electronic Resources<br/> Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 3rd International Conference on Human-Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings ent://SD_ILS/0/SD_ILS:171794 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Shimojo, Shinji. editor.<br/><a href="https://doi.org/10.1007/11527725">https://doi.org/10.1007/11527725</a><br/>Format:&#160;Electronic Resources<br/> E-Government: Towards Electronic Democracy International Conference, TCGOV 2005, Bolzano, Italy, March 2-4, 2005, Proceedings ent://SD_ILS/0/SD_ILS:146424 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;B&ouml;hlen, Michael. editor.<br/><a href="https://doi.org/10.1007/b106542">https://doi.org/10.1007/b106542</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings ent://SD_ILS/0/SD_ILS:142224 2025-02-13T12:36:37Z 2025-02-13T12:36:37Z by&#160;Kantor, Paul. editor.<br/><a href="https://doi.org/10.1007/b136511">https://doi.org/10.1007/b136511</a><br/>Format:&#160;Electronic Resources<br/>