Search Results for Coding theory.SirsiDynix Enterprisehttps://tarama.pau.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dCoding$002btheory.$0026ps$003d300?2026-04-01T12:47:28ZHandbook of coding theoryent://SD_ILS/0/SD_ILS:1198832026-04-01T12:47:28Z2026-04-01T12:47:28Zby Pless, Vera.<br/>Format: Books<br/>Coding Theory and Applications 4th International Castle Meeting, Palmela Castle, Portugal, September 15-18, 2014ent://SD_ILS/0/SD_ILS:796282026-04-01T12:47:28Z2026-04-01T12:47:28Zby Pinto, Raquel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17296-5">http://dx.doi.org/10.1007/978-3-319-17296-5</a><br/>Format: Electronic Resources<br/>Coding approaches to fault tolerance in combinational and dynamic systemsent://SD_ILS/0/SD_ILS:27732026-04-01T12:47:28Z2026-04-01T12:47:28Zby Hadjicostis, Christoforos N.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/fy031/2001053971.html">http://www.loc.gov/catdir/toc/fy031/2001053971.html</a><br/>Format: Books<br/>Kriptografiye giriş : şifreleme teorisient://SD_ILS/0/SD_ILS:1050972026-04-01T12:47:28Z2026-04-01T12:47:28Zby Afacan, Erkan, yazar.<br/>Format: Books<br/>Scalable Information Systems 5th International Conference, INFOSCALE 2014, Seoul, South Korea, September 25-26, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:795082026-04-01T12:47:28Z2026-04-01T12:47:28Zby Jung, Jason J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16868-5">http://dx.doi.org/10.1007/978-3-319-16868-5</a><br/>Format: Electronic Resources<br/>Dijital elektronikent://SD_ILS/0/SD_ILS:653472026-04-01T12:47:28Z2026-04-01T12:47:28Zby Güven, İlker.<br/>Format: Books<br/>Directed Information Measures in Neuroscienceent://SD_ILS/0/SD_ILS:843212026-04-01T12:47:28Z2026-04-01T12:47:28Zby Wibral, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54474-3">http://dx.doi.org/10.1007/978-3-642-54474-3</a><br/>Format: Electronic Resources<br/>Linear Network Error Correction Codingent://SD_ILS/0/SD_ILS:735152026-04-01T12:47:28Z2026-04-01T12:47:28Zby Guang, Xuan. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0588-1">http://dx.doi.org/10.1007/978-1-4939-0588-1</a><br/>Format: Electronic Resources<br/>Error-control coding for data networksent://SD_ILS/0/SD_ILS:1229782026-04-01T12:47:28Z2026-04-01T12:47:28Zby Reed, Irving S.<br/>Format: Books<br/>Storing and Transmitting Data Rudolf Ahlswede’s Lectures on Information Theory 1ent://SD_ILS/0/SD_ILS:759982026-04-01T12:47:28Z2026-04-01T12:47:28Zby Ahlswede, Rudolf. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05479-7">http://dx.doi.org/10.1007/978-3-319-05479-7</a><br/>Format: Electronic Resources<br/>High Efficiency Video Coding Coding Tools and Specificationent://SD_ILS/0/SD_ILS:850812026-04-01T12:47:28Z2026-04-01T12:47:28Zby Wien, Mathias. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44276-0">http://dx.doi.org/10.1007/978-3-662-44276-0</a><br/>Format: Electronic Resources<br/>Introduction to the Theory of Quantum Information Processingent://SD_ILS/0/SD_ILS:722702026-04-01T12:47:28Z2026-04-01T12:47:28Zby Bergou, János A. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7092-2">http://dx.doi.org/10.1007/978-1-4614-7092-2</a><br/>Format: Electronic Resources<br/>Multimedia Signal Coding and Transmissionent://SD_ILS/0/SD_ILS:855282026-04-01T12:47:28Z2026-04-01T12:47:28Zby Ohm, Jens-Rainer. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46691-9">http://dx.doi.org/10.1007/978-3-662-46691-9</a><br/>Format: Electronic Resources<br/>Code Biology A New Science of Lifeent://SD_ILS/0/SD_ILS:788332026-04-01T12:47:28Z2026-04-01T12:47:28Zby Barbieri, Marcello. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14535-8">http://dx.doi.org/10.1007/978-3-319-14535-8</a><br/>Format: Electronic Resources<br/>Security for Wireless Implantable Medical Devicesent://SD_ILS/0/SD_ILS:722892026-04-01T12:47:28Z2026-04-01T12:47:28Zby Hei, Xiali. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:831312026-04-01T12:47:28Z2026-04-01T12:47:28Zby Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format: Electronic Resources<br/>Forward Error Correction Based On Algebraic-Geometric Theoryent://SD_ILS/0/SD_ILS:768922026-04-01T12:47:28Z2026-04-01T12:47:28Zby A. Alzubi, Jafar. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08293-6">http://dx.doi.org/10.1007/978-3-319-08293-6</a><br/>Format: Electronic Resources<br/>Cooperative Networking in a Heterogeneous Wireless Mediument://SD_ILS/0/SD_ILS:722662026-04-01T12:47:28Z2026-04-01T12:47:28Zby Ismail, Muhammad. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7079-3">http://dx.doi.org/10.1007/978-1-4614-7079-3</a><br/>Format: Electronic Resources<br/>QC-LDPC Code-Based Cryptographyent://SD_ILS/0/SD_ILS:751382026-04-01T12:47:28Z2026-04-01T12:47:28Zby Baldi, Marco. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02556-8">http://dx.doi.org/10.1007/978-3-319-02556-8</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:795562026-04-01T12:47:28Z2026-04-01T12:47:28Zby Cuppens, Frédéric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedingsent://SD_ILS/0/SD_ILS:796782026-04-01T12:47:28Z2026-04-01T12:47:28Zby Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2014 The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:757992026-04-01T12:47:28Z2026-04-01T12:47:28Zby Benaloh, Josh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04852-9">http://dx.doi.org/10.1007/978-3-319-04852-9</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:759442026-04-01T12:47:28Z2026-04-01T12:47:28Zby Danger, Jean Luc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05302-8">http://dx.doi.org/10.1007/978-3-319-05302-8</a><br/>Format: Electronic Resources<br/>The Local Information Dynamics of Distributed Computation in Complex Systemsent://SD_ILS/0/SD_ILS:819952026-04-01T12:47:28Z2026-04-01T12:47:28Zby Lizier, Joseph T. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-32952-4">http://dx.doi.org/10.1007/978-3-642-32952-4</a><br/>Format: Electronic Resources<br/>Visual Cryptography for Image Processing and Security Theory, Methods, and Applicationsent://SD_ILS/0/SD_ILS:808662026-04-01T12:47:28Z2026-04-01T12:47:28Zby Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23473-1">http://dx.doi.org/10.1007/978-3-319-23473-1</a><br/>Format: Electronic Resources<br/>Visual Cryptography for Image Processing and Security Theory, Methods, and Applicationsent://SD_ILS/0/SD_ILS:773172026-04-01T12:47:28Z2026-04-01T12:47:28Zby Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09644-5">http://dx.doi.org/10.1007/978-3-319-09644-5</a><br/>Format: Electronic Resources<br/>Video coding standards AVS China, H.264/MPEG-4 PART 10, HEVC, VP6, DIRAC and VC-1ent://SD_ILS/0/SD_ILS:876462026-04-01T12:47:28Z2026-04-01T12:47:28Zby Rao, K.R. author.<br/><a href="http://dx.doi.org/10.1007/978-94-007-6742-3">http://dx.doi.org/10.1007/978-94-007-6742-3</a><br/>Format: Electronic Resources<br/>Ubiquitous Computing Application and Wireless Sensor UCAWSN-14ent://SD_ILS/0/SD_ILS:884352026-04-01T12:47:28Z2026-04-01T12:47:28Zby Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9618-7">http://dx.doi.org/10.1007/978-94-017-9618-7</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:801712026-04-01T12:47:28Z2026-04-01T12:47:28Zby Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format: Electronic Resources<br/>Theory of Quantum Computation, Communication, and Cryptography 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:843102026-04-01T12:47:28Z2026-04-01T12:47:28Zby Bacon, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54429-3">http://dx.doi.org/10.1007/978-3-642-54429-3</a><br/>Format: Electronic Resources<br/>Construction and Analysis of Cryptographic Functionsent://SD_ILS/0/SD_ILS:783742026-04-01T12:47:28Z2026-04-01T12:47:28Zby Budaghyan, Lilya. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12991-4">http://dx.doi.org/10.1007/978-3-319-12991-4</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:758062026-04-01T12:47:28Z2026-04-01T12:47:28Zby Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Advanced Video Coding Systemsent://SD_ILS/0/SD_ILS:787502026-04-01T12:47:28Z2026-04-01T12:47:28Zby Gao, Wen. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14243-2">http://dx.doi.org/10.1007/978-3-319-14243-2</a><br/>Format: Electronic Resources<br/>Zhang Functions and Various Modelsent://SD_ILS/0/SD_ILS:856142026-04-01T12:47:28Z2026-04-01T12:47:28Zby Zhang, Yunong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47334-4">http://dx.doi.org/10.1007/978-3-662-47334-4</a><br/>Format: Electronic Resources<br/>Quantum Computational Number Theoryent://SD_ILS/0/SD_ILS:811222026-04-01T12:47:28Z2026-04-01T12:47:28Zby Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:825892026-04-01T12:47:28Z2026-04-01T12:47:28Zby Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedingsent://SD_ILS/0/SD_ILS:752492026-04-01T12:47:28Z2026-04-01T12:47:28Zby Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format: Electronic Resources<br/>Information Theory, Combinatorics, and Search Theory In Memory of Rudolf Ahlswedeent://SD_ILS/0/SD_ILS:827532026-04-01T12:47:28Z2026-04-01T12:47:28Zby Aydinian, Harout. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36899-8">http://dx.doi.org/10.1007/978-3-642-36899-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:843502026-04-01T12:47:28Z2026-04-01T12:47:28Zby Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:781002026-04-01T12:47:28Z2026-04-01T12:47:28Zby Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format: Electronic Resources<br/>Evolution of Semantic Systemsent://SD_ILS/0/SD_ILS:822952026-04-01T12:47:28Z2026-04-01T12:47:28Zby Küppers, Bernd-Olaf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-34997-3">http://dx.doi.org/10.1007/978-3-642-34997-3</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security Xent://SD_ILS/0/SD_ILS:855362026-04-01T12:47:28Z2026-04-01T12:47:28Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:855322026-04-01T12:47:28Z2026-04-01T12:47:28Zby Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format: Electronic Resources<br/>Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptographyent://SD_ILS/0/SD_ILS:844492026-04-01T12:47:28Z2026-04-01T12:47:28Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedingsent://SD_ILS/0/SD_ILS:831402026-04-01T12:47:28Z2026-04-01T12:47:28Zby Youssef, Amr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:856702026-04-01T12:47:28Z2026-04-01T12:47:28Zby Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:850142026-04-01T12:47:28Z2026-04-01T12:47:28Zby Moriai, Shiho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43933-3">http://dx.doi.org/10.1007/978-3-662-43933-3</a><br/>Format: Electronic Resources<br/>Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:794692026-04-01T12:47:28Z2026-04-01T12:47:28Zby Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:849152026-04-01T12:47:28Z2026-04-01T12:47:28Zby Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format: Electronic Resources<br/>Why Cryptography Should Not Rely on Physical Attack Complexityent://SD_ILS/0/SD_ILS:891582026-04-01T12:47:28Z2026-04-01T12:47:28Zby Krämer, Juliane. author.<br/><a href="http://dx.doi.org/10.1007/978-981-287-787-1">http://dx.doi.org/10.1007/978-981-287-787-1</a><br/>Format: Electronic Resources<br/>Channel Estimation for Physical Layer Network Coding Systemsent://SD_ILS/0/SD_ILS:779662026-04-01T12:47:28Z2026-04-01T12:47:28Zby Gao, Feifei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11668-6">http://dx.doi.org/10.1007/978-3-319-11668-6</a><br/>Format: Electronic Resources<br/>Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:793482026-04-01T12:47:28Z2026-04-01T12:47:28Zby Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:812202026-04-01T12:47:28Z2026-04-01T12:47:28Zby Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format: Electronic Resources<br/>Interference Cancellation Using Space-Time Processing and Precoding Designent://SD_ILS/0/SD_ILS:816882026-04-01T12:47:28Z2026-04-01T12:47:28Zby Li, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-30712-6">http://dx.doi.org/10.1007/978-3-642-30712-6</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:783932026-04-01T12:47:28Z2026-04-01T12:47:28Zby Joux, Antoine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13051-4">http://dx.doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Electronic Resources<br/>Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Bergerent://SD_ILS/0/SD_ILS:800012026-04-01T12:47:28Z2026-04-01T12:47:28Zby El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:781582026-04-01T12:47:28Z2026-04-01T12:47:28Zby Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:850022026-04-01T12:47:28Z2026-04-01T12:47:28Zby Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format: Electronic Resources<br/>The International Workshop on Digital Forensics and Watermarking 2012 11th International Workshop, IWDW 2012, Shanghai, China, October 31 – November 3, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:835762026-04-01T12:47:28Z2026-04-01T12:47:28Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format: Electronic Resources<br/>Advances in Image and Graphics Technologies Chinese Conference, IGTA 2014, Beijing, China, June 19-20, 2014. Proceedingsent://SD_ILS/0/SD_ILS:853262026-04-01T12:47:28Z2026-04-01T12:47:28Zby Tan, Tieniu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45498-5">http://dx.doi.org/10.1007/978-3-662-45498-5</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:794792026-04-01T12:47:28Z2026-04-01T12:47:28Zby Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format: Electronic Resources<br/>Digital Communication Communication, Multimedia, Securityent://SD_ILS/0/SD_ILS:842842026-04-01T12:47:28Z2026-04-01T12:47:28Zby Meinel, Christoph. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54331-9">http://dx.doi.org/10.1007/978-3-642-54331-9</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:825972026-04-01T12:47:28Z2026-04-01T12:47:28Zby Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:857072026-04-01T12:47:28Z2026-04-01T12:47:28Zby Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:857082026-04-01T12:47:28Z2026-04-01T12:47:28Zby Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Reachability Problems 8th International Workshop, RP 2014, Oxford, UK, September 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:778942026-04-01T12:47:28Z2026-04-01T12:47:28Zby Ouaknine, Joël. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11439-2">http://dx.doi.org/10.1007/978-3-319-11439-2</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:838532026-04-01T12:47:28Z2026-04-01T12:47:28Zby Palamidessi, Catuscia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format: Electronic Resources<br/>Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papersent://SD_ILS/0/SD_ILS:824142026-04-01T12:47:28Z2026-04-01T12:47:28Zby Iwama, Kazuo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:854822026-04-01T12:47:28Z2026-04-01T12:47:28Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format: Electronic Resources<br/>Compressed Sensing and its Applications MATHEON Workshop 2013ent://SD_ILS/0/SD_ILS:792712026-04-01T12:47:28Z2026-04-01T12:47:28Zby Boche, Holger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16042-9">http://dx.doi.org/10.1007/978-3-319-16042-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:853452026-04-01T12:47:28Z2026-04-01T12:47:28Zby Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:853462026-04-01T12:47:28Z2026-04-01T12:47:28Zby Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:793432026-04-01T12:47:28Z2026-04-01T12:47:28Zby Koç, Çetin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16277-5">http://dx.doi.org/10.1007/978-3-319-16277-5</a><br/>Format: Electronic Resources<br/>Topics in Cryptology – CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedingsent://SD_ILS/0/SD_ILS:825282026-04-01T12:47:28Z2026-04-01T12:47:28Zby Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format: Electronic Resources<br/>Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedingsent://SD_ILS/0/SD_ILS:811312026-04-01T12:47:28Z2026-04-01T12:47:28Zby Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedingsent://SD_ILS/0/SD_ILS:832682026-04-01T12:47:28Z2026-04-01T12:47:28Zby Jacobson, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:763932026-04-01T12:47:28Z2026-04-01T12:47:28Zby Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedingsent://SD_ILS/0/SD_ILS:756152026-04-01T12:47:28Z2026-04-01T12:47:28Zby Padró, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:806972026-04-01T12:47:28Z2026-04-01T12:47:28Zby Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format: Electronic Resources<br/>Channel Coding Techniques for Wireless Communicationsent://SD_ILS/0/SD_ILS:865832026-04-01T12:47:28Z2026-04-01T12:47:28Zby Deergha Rao, K. author.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2292-7">http://dx.doi.org/10.1007/978-81-322-2292-7</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedingsent://SD_ILS/0/SD_ILS:832872026-04-01T12:47:28Z2026-04-01T12:47:28Zby Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format: Electronic Resources<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:768882026-04-01T12:47:28Z2026-04-01T12:47:28Zby Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Mathematics in Computing An Accessible Guide to Historical, Foundational and Application Contextsent://SD_ILS/0/SD_ILS:706642026-04-01T12:47:28Z2026-04-01T12:47:28Zby O’Regan, Gerard. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4534-9">http://dx.doi.org/10.1007/978-1-4471-4534-9</a><br/>Format: Electronic Resources<br/>Computation, Cryptography, and Network Securityent://SD_ILS/0/SD_ILS:798952026-04-01T12:47:28Z2026-04-01T12:47:28Zby Daras, Nicholas J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18275-9">http://dx.doi.org/10.1007/978-3-319-18275-9</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:781722026-04-01T12:47:28Z2026-04-01T12:47:28Zby Schmidt, Kai-Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12325-7">http://dx.doi.org/10.1007/978-3-319-12325-7</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:841002026-04-01T12:47:28Z2026-04-01T12:47:28Zby Stam, Martijn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Elements of information theoryent://SD_ILS/0/SD_ILS:995452026-04-01T12:47:28Z2026-04-01T12:47:28Zby Cover, T. M., 1938-2012.<br/>Format: Books<br/>Radio Frequency Source Coding Made Easyent://SD_ILS/0/SD_ILS:791402026-04-01T12:47:28Z2026-04-01T12:47:28Zby Faruque, Saleh. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15609-5">http://dx.doi.org/10.1007/978-3-319-15609-5</a><br/>Format: Electronic Resources<br/>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 20th Iberoamerican Congress, CIARP 2015, Montevideo, Uruguay, November 9-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:811102026-04-01T12:47:28Z2026-04-01T12:47:28Zby Pardo, Alvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25751-8">http://dx.doi.org/10.1007/978-3-319-25751-8</a><br/>Format: Electronic Resources<br/>Advances in Cognitive Neurodynamics (III) Proceedings of the Third International Conference on Cognitive Neurodynamics - 2011ent://SD_ILS/0/SD_ILS:871162026-04-01T12:47:28Z2026-04-01T12:47:28Zby Yamaguchi, Yoko. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-007-4792-0">http://dx.doi.org/10.1007/978-94-007-4792-0</a><br/>Format: Electronic Resources<br/>Algebraic Informatics 5th International Conference, CAI 2013, Porquerolles, France, September 3-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:837282026-04-01T12:47:28Z2026-04-01T12:47:28Zby Muntean, Traian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40663-8">http://dx.doi.org/10.1007/978-3-642-40663-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedingsent://SD_ILS/0/SD_ILS:753832026-04-01T12:47:28Z2026-04-01T12:47:28Zby Paul, Goutam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format: Electronic Resources<br/>Research methods in educationent://SD_ILS/0/SD_ILS:514782026-04-01T12:47:28Z2026-04-01T12:47:28Zby Cohen, Louis, 1928-<br/>Format: Books<br/>Low-Rank and Sparse Modeling for Visual Analysisent://SD_ILS/0/SD_ILS:780732026-04-01T12:47:28Z2026-04-01T12:47:28Zby Fu, Yun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12000-3">http://dx.doi.org/10.1007/978-3-319-12000-3</a><br/>Format: Electronic Resources<br/>Lattices and Codes A Course Partially Based on Lectures by Friedrich Hirzebruchent://SD_ILS/0/SD_ILS:845322026-04-01T12:47:28Z2026-04-01T12:47:28Zby Ebeling, Wolfgang. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-00360-9">http://dx.doi.org/10.1007/978-3-658-00360-9</a><br/>Format: Electronic Resources<br/>Analyzing qualitative data with MAXQDA: text, audio, and videoent://SD_ILS/0/SD_ILS:1169092026-04-01T12:47:28Z2026-04-01T12:47:28Zby Kuckartz, Udo, author.<br/>Format: Books<br/>Foundations of Bilingual Memoryent://SD_ILS/0/SD_ILS:729112026-04-01T12:47:28Z2026-04-01T12:47:28Zby Heredia, Roberto R. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9218-4">http://dx.doi.org/10.1007/978-1-4614-9218-4</a><br/>Format: Electronic Resources<br/>Feature Coding for Image Representation and Recognitionent://SD_ILS/0/SD_ILS:852422026-04-01T12:47:28Z2026-04-01T12:47:28Zby Huang, Yongzhen. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45000-0">http://dx.doi.org/10.1007/978-3-662-45000-0</a><br/>Format: Electronic Resources<br/>Applied Number Theoryent://SD_ILS/0/SD_ILS:807152026-04-01T12:47:28Z2026-04-01T12:47:28Zby Niederreiter, Harald. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22321-6">http://dx.doi.org/10.1007/978-3-319-22321-6</a><br/>Format: Electronic Resources<br/>Mathematical Methods in Biology and Neurobiologyent://SD_ILS/0/SD_ILS:710442026-04-01T12:47:28Z2026-04-01T12:47:28Zby Jost, Jürgen. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6353-4">http://dx.doi.org/10.1007/978-1-4471-6353-4</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 9th International Conference, WASA 2014, Harbin, China, June 23-25, 2014. Proceedingsent://SD_ILS/0/SD_ILS:767272026-04-01T12:47:28Z2026-04-01T12:47:28Zby Cai, Zhipeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07782-6">http://dx.doi.org/10.1007/978-3-319-07782-6</a><br/>Format: Electronic Resources<br/>Consciousness A Mathematical Treatment of the Global Neuronal Workspace Modelent://SD_ILS/0/SD_ILS:1225242026-04-01T12:47:28Z2026-04-01T12:47:28Zby Wallace, Rodrick. author.<br/><a href="https://doi.org/10.1007/b106970">https://doi.org/10.1007/b106970</a><br/>Format: Electronic Resources<br/>Algebraic Informatics 6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015. Proceedingsent://SD_ILS/0/SD_ILS:808112026-04-01T12:47:28Z2026-04-01T12:47:28Zby Maletti, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23021-4">http://dx.doi.org/10.1007/978-3-319-23021-4</a><br/>Format: Electronic Resources<br/>Computational Invariant Theoryent://SD_ILS/0/SD_ILS:856892026-04-01T12:47:28Z2026-04-01T12:47:28Zby Derksen, Harm. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48422-7">http://dx.doi.org/10.1007/978-3-662-48422-7</a><br/>Format: Electronic Resources<br/>Interactive Theorem Proving 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedingsent://SD_ILS/0/SD_ILS:806882026-04-01T12:47:28Z2026-04-01T12:47:28Zby Urban, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22102-1">http://dx.doi.org/10.1007/978-3-319-22102-1</a><br/>Format: Electronic Resources<br/>Fuzzy Social Choice Models Explaining the Government Formation Processent://SD_ILS/0/SD_ILS:768792026-04-01T12:47:28Z2026-04-01T12:47:28Zby C. Casey, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08248-6">http://dx.doi.org/10.1007/978-3-319-08248-6</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedingsent://SD_ILS/0/SD_ILS:831612026-04-01T12:47:28Z2026-04-01T12:47:28Zby Gaborit, Philippe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format: Electronic Resources<br/>Measures of Complexity Festschrift for Alexey Chervonenkisent://SD_ILS/0/SD_ILS:806472026-04-01T12:47:28Z2026-04-01T12:47:28Zby Vovk, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21852-6">http://dx.doi.org/10.1007/978-3-319-21852-6</a><br/>Format: Electronic Resources<br/>Polynomial Theory of Error Correcting Codesent://SD_ILS/0/SD_ILS:748962026-04-01T12:47:28Z2026-04-01T12:47:28Zby Cancellieri, Giovanni. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-01727-3">http://dx.doi.org/10.1007/978-3-319-01727-3</a><br/>Format: Electronic Resources<br/>Lectures on Sphere Arrangements – the Discrete Geometric Sideent://SD_ILS/0/SD_ILS:725742026-04-01T12:47:28Z2026-04-01T12:47:28Zby Bezdek, Károly. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8118-8">http://dx.doi.org/10.1007/978-1-4614-8118-8</a><br/>Format: Electronic Resources<br/>Self-Organizing Networks First International Conference, ICSON 2015, Beijing, China, January 13-14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:802632026-04-01T12:47:28Z2026-04-01T12:47:28Zby Sun, Songlin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19746-3">http://dx.doi.org/10.1007/978-3-319-19746-3</a><br/>Format: Electronic Resources<br/>Introduction to Quantum Information Scienceent://SD_ILS/0/SD_ILS:849262026-04-01T12:47:28Z2026-04-01T12:47:28Zby Hayashi, Masahito. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43502-1">http://dx.doi.org/10.1007/978-3-662-43502-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:842632026-04-01T12:47:28Z2026-04-01T12:47:28Zby Lindell, Yehuda. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54242-8">http://dx.doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Environmental Epigenomics in Health and Disease Epigenetics and Complex Diseasesent://SD_ILS/0/SD_ILS:827342026-04-01T12:47:28Z2026-04-01T12:47:28Zby Jirtle, Randy L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36827-1">http://dx.doi.org/10.1007/978-3-642-36827-1</a><br/>Format: Electronic Resources<br/>Multiscale Signal Analysis and Modelingent://SD_ILS/0/SD_ILS:714262026-04-01T12:47:28Z2026-04-01T12:47:28Zby Shen, Xiaoping. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-4145-8">http://dx.doi.org/10.1007/978-1-4614-4145-8</a><br/>Format: Electronic Resources<br/>Intelligent Computing Theories and Methodologies 11th International Conference, ICIC 2015, Fuzhou, China, August 20-23, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:806992026-04-01T12:47:28Z2026-04-01T12:47:28Zby Huang, De-Shuang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22180-9">http://dx.doi.org/10.1007/978-3-319-22180-9</a><br/>Format: Electronic Resources<br/>Advances in the Theory of Numbers Proceedings of the Thirteenth Conference of the Canadian Number Theory Associationent://SD_ILS/0/SD_ILS:740432026-04-01T12:47:28Z2026-04-01T12:47:28Zby Alaca, Ayşe. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3201-6">http://dx.doi.org/10.1007/978-1-4939-3201-6</a><br/>Format: Electronic Resources<br/>Fault-Tolerant Search Algorithms Reliable Computation with Unreliable Informationent://SD_ILS/0/SD_ILS:813652026-04-01T12:47:28Z2026-04-01T12:47:28Zby Cicalese, Ferdinando. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-17327-1">http://dx.doi.org/10.1007/978-3-642-17327-1</a><br/>Format: Electronic Resources<br/>Unifying Electrical Engineering and Electronics Engineering Proceedings of the 2012 International Conference on Electrical and Electronics Engineeringent://SD_ILS/0/SD_ILS:716452026-04-01T12:47:28Z2026-04-01T12:47:28Zby Xing, Song. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-4981-2">http://dx.doi.org/10.1007/978-1-4614-4981-2</a><br/>Format: Electronic Resources<br/>Encyclopedia of Distancesent://SD_ILS/0/SD_ILS:817122026-04-01T12:47:28Z2026-04-01T12:47:28Zby Deza, Michel Marie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-30958-8">http://dx.doi.org/10.1007/978-3-642-30958-8</a><br/>Format: Electronic Resources<br/>Encyclopedia of Distancesent://SD_ILS/0/SD_ILS:850912026-04-01T12:47:28Z2026-04-01T12:47:28Zby Deza, Michel Marie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44342-2">http://dx.doi.org/10.1007/978-3-662-44342-2</a><br/>Format: Electronic Resources<br/>Fundamentals of Parameterized Complexityent://SD_ILS/0/SD_ILS:709812026-04-01T12:47:28Z2026-04-01T12:47:28Zby Downey, Rodney G. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-5559-1">http://dx.doi.org/10.1007/978-1-4471-5559-1</a><br/>Format: Electronic Resources<br/>Wireless and Satellite Systems 7th International Conference, WiSATS 2015, Bradford, UK, July 6-7, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:810802026-04-01T12:47:28Z2026-04-01T12:47:28Zby Pillai, Prashant. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25479-1">http://dx.doi.org/10.1007/978-3-319-25479-1</a><br/>Format: Electronic Resources<br/>Intelligent Computing Theories and Methodologies 11th International Conference, ICIC 2015, Fuzhou, China, August 20-23, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:807012026-04-01T12:47:28Z2026-04-01T12:47:28Zby Huang, De-Shuang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22186-1">http://dx.doi.org/10.1007/978-3-319-22186-1</a><br/>Format: Electronic Resources<br/>Agile Processes in Software Engineering and Extreme Programming 15th International Conference, XP 2014, Rome, Italy, May 26-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:764352026-04-01T12:47:28Z2026-04-01T12:47:28Zby Cantone, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06862-6">http://dx.doi.org/10.1007/978-3-319-06862-6</a><br/>Format: Electronic Resources<br/>Stochastic Networked Control Systems Stabilization and Optimization under Information Constraintsent://SD_ILS/0/SD_ILS:722682026-04-01T12:47:28Z2026-04-01T12:47:28Zby Yüksel, Serdar. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7085-4">http://dx.doi.org/10.1007/978-1-4614-7085-4</a><br/>Format: Electronic Resources<br/>Scale Space and Variational Methods in Computer Vision 4th International Conference, SSVM 2013, Schloss Seggau, Leibnitz, Austria, June 2-6, 2013. Proceedingsent://SD_ILS/0/SD_ILS:830662026-04-01T12:47:28Z2026-04-01T12:47:28Zby Kuijper, Arjan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38267-3">http://dx.doi.org/10.1007/978-3-642-38267-3</a><br/>Format: Electronic Resources<br/>Information and Lifeent://SD_ILS/0/SD_ILS:877402026-04-01T12:47:28Z2026-04-01T12:47:28Zby Battail, Gérard. author.<br/><a href="http://dx.doi.org/10.1007/978-94-007-7040-9">http://dx.doi.org/10.1007/978-94-007-7040-9</a><br/>Format: Electronic Resources<br/>Algorithmic Probability and Friends. Bayesian Prediction and Artificial Intelligence Papers from the Ray Solomonoff 85th Memorial Conference, Melbourne, VIC, Australia, November 30 – December 2, 2011ent://SD_ILS/0/SD_ILS:840382026-04-01T12:47:28Z2026-04-01T12:47:28Zby Dowe, David L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-44958-1">http://dx.doi.org/10.1007/978-3-642-44958-1</a><br/>Format: Electronic Resources<br/>Acoustics, Information, and Communication Memorial Volume in Honor of Manfred R. Schroederent://SD_ILS/0/SD_ILS:760552026-04-01T12:47:28Z2026-04-01T12:47:28Zby Xiang, Ning. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05660-9">http://dx.doi.org/10.1007/978-3-319-05660-9</a><br/>Format: Electronic Resources<br/>Advanced Free Space Optics (FSO) A Systems Approachent://SD_ILS/0/SD_ILS:736022026-04-01T12:47:28Z2026-04-01T12:47:28Zby Majumdar, Arun K. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0918-6">http://dx.doi.org/10.1007/978-1-4939-0918-6</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 12th International Conference, ICIAR 2015, Niagara Falls, ON, Canada, July 22-24, 2015, Proceedingsent://SD_ILS/0/SD_ILS:804842026-04-01T12:47:28Z2026-04-01T12:47:28Zby Kamel, Mohamed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20801-5">http://dx.doi.org/10.1007/978-3-319-20801-5</a><br/>Format: Electronic Resources<br/>Handbook of Geomathematicsent://SD_ILS/0/SD_ILS:843372026-04-01T12:47:28Z2026-04-01T12:47:28Zby Freeden, Willi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54551-1">http://dx.doi.org/10.1007/978-3-642-54551-1</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Soft Computing 13th International Conference, ICAISC 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:765352026-04-01T12:47:28Z2026-04-01T12:47:28Zby Rutkowski, Leszek. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07176-3">http://dx.doi.org/10.1007/978-3-319-07176-3</a><br/>Format: Electronic Resources<br/>Basic Aspects of Hearing Physiology and Perceptionent://SD_ILS/0/SD_ILS:712342026-04-01T12:47:28Z2026-04-01T12:47:28Zby Moore, Brian C. J. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-1590-9">http://dx.doi.org/10.1007/978-1-4614-1590-9</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedingsent://SD_ILS/0/SD_ILS:834732026-04-01T12:47:28Z2026-04-01T12:47:28Zby Ren, Kui. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39701-1">http://dx.doi.org/10.1007/978-3-642-39701-1</a><br/>Format: Electronic Resources<br/>Advances in Cognitive Neurodynamics (IV) Proceedings of the Fourth International Conference on Cognitive Neurodynamics - 2013ent://SD_ILS/0/SD_ILS:884152026-04-01T12:47:28Z2026-04-01T12:47:28Zby Liljenström, Hans. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9548-7">http://dx.doi.org/10.1007/978-94-017-9548-7</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Modeling 19th International Conference, MMM 2013, Huangshan, China, January 7-9, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:824332026-04-01T12:47:28Z2026-04-01T12:47:28Zby Li, Shipeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35728-2">http://dx.doi.org/10.1007/978-3-642-35728-2</a><br/>Format: Electronic Resources<br/>