Search Results for Coding theory. SirsiDynix Enterprise https://tarama.pau.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dCoding$002btheory.$0026ps$003d300? 2026-04-01T12:47:28Z Handbook of coding theory ent://SD_ILS/0/SD_ILS:119883 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Pless, Vera.<br/>Format:&#160;Books<br/> Coding Theory and Applications 4th International Castle Meeting, Palmela Castle, Portugal, September 15-18, 2014 ent://SD_ILS/0/SD_ILS:79628 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Pinto, Raquel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17296-5">http://dx.doi.org/10.1007/978-3-319-17296-5</a><br/>Format:&#160;Electronic Resources<br/> Coding approaches to fault tolerance in combinational and dynamic systems ent://SD_ILS/0/SD_ILS:2773 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Hadjicostis, Christoforos N.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/fy031/2001053971.html">http://www.loc.gov/catdir/toc/fy031/2001053971.html</a><br/>Format:&#160;Books<br/> Kriptografiye giriş : şifreleme teorisi ent://SD_ILS/0/SD_ILS:105097 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Afacan, Erkan, yazar.<br/>Format:&#160;Books<br/> Scalable Information Systems 5th International Conference, INFOSCALE 2014, Seoul, South Korea, September 25-26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79508 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Jung, Jason J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16868-5">http://dx.doi.org/10.1007/978-3-319-16868-5</a><br/>Format:&#160;Electronic Resources<br/> Dijital elektronik ent://SD_ILS/0/SD_ILS:65347 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;G&uuml;ven, İlker.<br/>Format:&#160;Books<br/> Directed Information Measures in Neuroscience ent://SD_ILS/0/SD_ILS:84321 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Wibral, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54474-3">http://dx.doi.org/10.1007/978-3-642-54474-3</a><br/>Format:&#160;Electronic Resources<br/> Linear Network Error Correction Coding ent://SD_ILS/0/SD_ILS:73515 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Guang, Xuan. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0588-1">http://dx.doi.org/10.1007/978-1-4939-0588-1</a><br/>Format:&#160;Electronic Resources<br/> Error-control coding for data networks ent://SD_ILS/0/SD_ILS:122978 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Reed, Irving S.<br/>Format:&#160;Books<br/> Storing and Transmitting Data Rudolf Ahlswede&rsquo;s Lectures on Information Theory 1 ent://SD_ILS/0/SD_ILS:75998 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Ahlswede, Rudolf. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05479-7">http://dx.doi.org/10.1007/978-3-319-05479-7</a><br/>Format:&#160;Electronic Resources<br/> High Efficiency Video Coding Coding Tools and Specification ent://SD_ILS/0/SD_ILS:85081 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Wien, Mathias. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44276-0">http://dx.doi.org/10.1007/978-3-662-44276-0</a><br/>Format:&#160;Electronic Resources<br/> Introduction to the Theory of Quantum Information Processing ent://SD_ILS/0/SD_ILS:72270 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Bergou, J&aacute;nos A. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7092-2">http://dx.doi.org/10.1007/978-1-4614-7092-2</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Signal Coding and Transmission ent://SD_ILS/0/SD_ILS:85528 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Ohm, Jens-Rainer. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46691-9">http://dx.doi.org/10.1007/978-3-662-46691-9</a><br/>Format:&#160;Electronic Resources<br/> Code Biology A New Science of Life ent://SD_ILS/0/SD_ILS:78833 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Barbieri, Marcello. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14535-8">http://dx.doi.org/10.1007/978-3-319-14535-8</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:72289 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Hei, Xiali. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83131 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Electronic Resources<br/> Forward Error Correction Based On Algebraic-Geometric Theory ent://SD_ILS/0/SD_ILS:76892 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;A. Alzubi, Jafar. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08293-6">http://dx.doi.org/10.1007/978-3-319-08293-6</a><br/>Format:&#160;Electronic Resources<br/> Cooperative Networking in a Heterogeneous Wireless Medium ent://SD_ILS/0/SD_ILS:72266 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Ismail, Muhammad. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7079-3">http://dx.doi.org/10.1007/978-1-4614-7079-3</a><br/>Format:&#160;Electronic Resources<br/> QC-LDPC Code-Based Cryptography ent://SD_ILS/0/SD_ILS:75138 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Baldi, Marco. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02556-8">http://dx.doi.org/10.1007/978-3-319-02556-8</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79556 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17040-4">http://dx.doi.org/10.1007/978-3-319-17040-4</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings ent://SD_ILS/0/SD_ILS:79678 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Lehmann, Anja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17470-9">http://dx.doi.org/10.1007/978-3-319-17470-9</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2014 The Cryptographer&rsquo;s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:75799 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Benaloh, Josh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04852-9">http://dx.doi.org/10.1007/978-3-319-04852-9</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75944 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Danger, Jean Luc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05302-8">http://dx.doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/> The Local Information Dynamics of Distributed Computation in Complex Systems ent://SD_ILS/0/SD_ILS:81995 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Lizier, Joseph T. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-32952-4">http://dx.doi.org/10.1007/978-3-642-32952-4</a><br/>Format:&#160;Electronic Resources<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:80866 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23473-1">http://dx.doi.org/10.1007/978-3-319-23473-1</a><br/>Format:&#160;Electronic Resources<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:77317 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Liu, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09644-5">http://dx.doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/> Video coding standards AVS China, H.264/MPEG-4 PART 10, HEVC, VP6, DIRAC and VC-1 ent://SD_ILS/0/SD_ILS:87646 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Rao, K.R. author.<br/><a href="http://dx.doi.org/10.1007/978-94-007-6742-3">http://dx.doi.org/10.1007/978-94-007-6742-3</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Computing Application and Wireless Sensor UCAWSN-14 ent://SD_ILS/0/SD_ILS:88435 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9618-7">http://dx.doi.org/10.1007/978-94-017-9618-7</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:80171 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format:&#160;Electronic Resources<br/> Theory of Quantum Computation, Communication, and Cryptography 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84310 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Bacon, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54429-3">http://dx.doi.org/10.1007/978-3-642-54429-3</a><br/>Format:&#160;Electronic Resources<br/> Construction and Analysis of Cryptographic Functions ent://SD_ILS/0/SD_ILS:78374 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Budaghyan, Lilya. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12991-4">http://dx.doi.org/10.1007/978-3-319-12991-4</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75806 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Video Coding Systems ent://SD_ILS/0/SD_ILS:78750 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Gao, Wen. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14243-2">http://dx.doi.org/10.1007/978-3-319-14243-2</a><br/>Format:&#160;Electronic Resources<br/> Zhang Functions and Various Models ent://SD_ILS/0/SD_ILS:85614 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Zhang, Yunong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47334-4">http://dx.doi.org/10.1007/978-3-662-47334-4</a><br/>Format:&#160;Electronic Resources<br/> Quantum Computational Number Theory ent://SD_ILS/0/SD_ILS:81122 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82589 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:75249 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Electronic Resources<br/> Information Theory, Combinatorics, and Search Theory In Memory of Rudolf Ahlswede ent://SD_ILS/0/SD_ILS:82753 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Aydinian, Harout. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36899-8">http://dx.doi.org/10.1007/978-3-642-36899-8</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84350 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Krawczyk, Hugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54631-0">http://dx.doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78100 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12087-4">http://dx.doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/> Evolution of Semantic Systems ent://SD_ILS/0/SD_ILS:82295 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;K&uuml;ppers, Bernd-Olaf. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-34997-3">http://dx.doi.org/10.1007/978-3-642-34997-3</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security X ent://SD_ILS/0/SD_ILS:85536 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46739-8">http://dx.doi.org/10.1007/978-3-662-46739-8</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85532 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:84449 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55046-1">http://dx.doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83140 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Youssef, Amr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85670 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85014 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Moriai, Shiho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43933-3">http://dx.doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash;- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:79469 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Nyberg, Kaisa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16715-2">http://dx.doi.org/10.1007/978-3-319-16715-2</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84915 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Lange, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43414-7">http://dx.doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/> Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:89158 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Kr&auml;mer, Juliane. author.<br/><a href="http://dx.doi.org/10.1007/978-981-287-787-1">http://dx.doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Electronic Resources<br/> Channel Estimation for Physical Layer Network Coding Systems ent://SD_ILS/0/SD_ILS:77966 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Gao, Feifei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11668-6">http://dx.doi.org/10.1007/978-3-319-11668-6</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology - LATINCRYPT 2014 Third International Conference on Cryptology and Information Security in Latin America Florian&oacute;polis, Brazil, September 17&ndash;19, 2014 Revised Selected Papers ent://SD_ILS/0/SD_ILS:79348 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Aranha, Diego F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16295-9">http://dx.doi.org/10.1007/978-3-319-16295-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81220 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Groth, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27239-9">http://dx.doi.org/10.1007/978-3-319-27239-9</a><br/>Format:&#160;Electronic Resources<br/> Interference Cancellation Using Space-Time Processing and Precoding Design ent://SD_ILS/0/SD_ILS:81688 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Li, Feng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-30712-6">http://dx.doi.org/10.1007/978-3-642-30712-6</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78393 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Joux, Antoine. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13051-4">http://dx.doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/> Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger ent://SD_ILS/0/SD_ILS:80001 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;El Hajji, Said. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18681-8">http://dx.doi.org/10.1007/978-3-319-18681-8</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78158 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85002 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Shi, Yun Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43886-2">http://dx.doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/> The International Workshop on Digital Forensics and Watermarking 2012 11th International Workshop, IWDW 2012, Shanghai, China, October 31 &ndash; November 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83576 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Image and Graphics Technologies Chinese Conference, IGTA 2014, Beijing, China, June 19-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85326 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Tan, Tieniu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45498-5">http://dx.doi.org/10.1007/978-3-662-45498-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79479 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Lin, Dongdai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16745-9">http://dx.doi.org/10.1007/978-3-319-16745-9</a><br/>Format:&#160;Electronic Resources<br/> Digital Communication Communication, Multimedia, Security ent://SD_ILS/0/SD_ILS:84284 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Meinel, Christoph. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54331-9">http://dx.doi.org/10.1007/978-3-642-54331-9</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82597 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Kurosawa, Kaoru. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85707 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85708 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format:&#160;Electronic Resources<br/> Reachability Problems 8th International Workshop, RP 2014, Oxford, UK, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77894 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Ouaknine, Jo&euml;l. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11439-2">http://dx.doi.org/10.1007/978-3-319-11439-2</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83853 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Palamidessi, Catuscia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format:&#160;Electronic Resources<br/> Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82414 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Iwama, Kazuo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:85482 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/> Compressed Sensing and its Applications MATHEON Workshop 2013 ent://SD_ILS/0/SD_ILS:79271 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Boche, Holger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16042-9">http://dx.doi.org/10.1007/978-3-319-16042-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85345 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:85346 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic of Finite Fields 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79343 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16277-5">http://dx.doi.org/10.1007/978-3-319-16277-5</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology &ndash; CT-RSA 2013 The Cryptographers&rsquo; Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82528 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Dawson, Ed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Concepts for Intelligent Vision Systems 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81131 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Battiato, Sebastiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25903-1">http://dx.doi.org/10.1007/978-3-319-25903-1</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83268 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Jacobson, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76393 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:75615 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Padr&oacute;, Carles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04268-8">http://dx.doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology -- LATINCRYPT 2015 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80697 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Lauter, Kristin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22174-8">http://dx.doi.org/10.1007/978-3-319-22174-8</a><br/>Format:&#160;Electronic Resources<br/> Channel Coding Techniques for Wireless Communications ent://SD_ILS/0/SD_ILS:86583 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Deergha Rao, K. author.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2292-7">http://dx.doi.org/10.1007/978-81-322-2292-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83287 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Boyd, Colin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Electronic Resources<br/> Code Breaking in the Pacific ent://SD_ILS/0/SD_ILS:76888 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format:&#160;Electronic Resources<br/> Mathematics in Computing An Accessible Guide to Historical, Foundational and Application Contexts ent://SD_ILS/0/SD_ILS:70664 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;O&rsquo;Regan, Gerard. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4534-9">http://dx.doi.org/10.1007/978-1-4471-4534-9</a><br/>Format:&#160;Electronic Resources<br/> Computation, Cryptography, and Network Security ent://SD_ILS/0/SD_ILS:79895 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Daras, Nicholas J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18275-9">http://dx.doi.org/10.1007/978-3-319-18275-9</a><br/>Format:&#160;Electronic Resources<br/> Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:78172 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Schmidt, Kai-Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12325-7">http://dx.doi.org/10.1007/978-3-319-12325-7</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:84100 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Stam, Martijn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/> Elements of information theory ent://SD_ILS/0/SD_ILS:99545 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Cover, T. M., 1938-2012.<br/>Format:&#160;Books<br/> Radio Frequency Source Coding Made Easy ent://SD_ILS/0/SD_ILS:79140 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Faruque, Saleh. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15609-5">http://dx.doi.org/10.1007/978-3-319-15609-5</a><br/>Format:&#160;Electronic Resources<br/> Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 20th Iberoamerican Congress, CIARP 2015, Montevideo, Uruguay, November 9-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81110 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Pardo, Alvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25751-8">http://dx.doi.org/10.1007/978-3-319-25751-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cognitive Neurodynamics (III) Proceedings of the Third International Conference on Cognitive Neurodynamics - 2011 ent://SD_ILS/0/SD_ILS:87116 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Yamaguchi, Yoko. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-007-4792-0">http://dx.doi.org/10.1007/978-94-007-4792-0</a><br/>Format:&#160;Electronic Resources<br/> Algebraic Informatics 5th International Conference, CAI 2013, Porquerolles, France, September 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83728 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Muntean, Traian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40663-8">http://dx.doi.org/10.1007/978-3-642-40663-8</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:75383 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Paul, Goutam. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format:&#160;Electronic Resources<br/> Research methods in education ent://SD_ILS/0/SD_ILS:51478 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Cohen, Louis, 1928-<br/>Format:&#160;Books<br/> Low-Rank and Sparse Modeling for Visual Analysis ent://SD_ILS/0/SD_ILS:78073 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Fu, Yun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12000-3">http://dx.doi.org/10.1007/978-3-319-12000-3</a><br/>Format:&#160;Electronic Resources<br/> Lattices and Codes A Course Partially Based on Lectures by Friedrich Hirzebruch ent://SD_ILS/0/SD_ILS:84532 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Ebeling, Wolfgang. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-00360-9">http://dx.doi.org/10.1007/978-3-658-00360-9</a><br/>Format:&#160;Electronic Resources<br/> Analyzing qualitative data with MAXQDA: text, audio, and video ent://SD_ILS/0/SD_ILS:116909 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Kuckartz, Udo, author.<br/>Format:&#160;Books<br/> Foundations of Bilingual Memory ent://SD_ILS/0/SD_ILS:72911 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Heredia, Roberto R. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9218-4">http://dx.doi.org/10.1007/978-1-4614-9218-4</a><br/>Format:&#160;Electronic Resources<br/> Feature Coding for Image Representation and Recognition ent://SD_ILS/0/SD_ILS:85242 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Huang, Yongzhen. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45000-0">http://dx.doi.org/10.1007/978-3-662-45000-0</a><br/>Format:&#160;Electronic Resources<br/> Applied Number Theory ent://SD_ILS/0/SD_ILS:80715 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Niederreiter, Harald. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22321-6">http://dx.doi.org/10.1007/978-3-319-22321-6</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Methods in Biology and Neurobiology ent://SD_ILS/0/SD_ILS:71044 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Jost, J&uuml;rgen. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6353-4">http://dx.doi.org/10.1007/978-1-4471-6353-4</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 9th International Conference, WASA 2014, Harbin, China, June 23-25, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76727 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Cai, Zhipeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07782-6">http://dx.doi.org/10.1007/978-3-319-07782-6</a><br/>Format:&#160;Electronic Resources<br/> Consciousness A Mathematical Treatment of the Global Neuronal Workspace Model ent://SD_ILS/0/SD_ILS:122524 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Wallace, Rodrick. author.<br/><a href="https://doi.org/10.1007/b106970">https://doi.org/10.1007/b106970</a><br/>Format:&#160;Electronic Resources<br/> Algebraic Informatics 6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80811 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Maletti, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23021-4">http://dx.doi.org/10.1007/978-3-319-23021-4</a><br/>Format:&#160;Electronic Resources<br/> Computational Invariant Theory ent://SD_ILS/0/SD_ILS:85689 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Derksen, Harm. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48422-7">http://dx.doi.org/10.1007/978-3-662-48422-7</a><br/>Format:&#160;Electronic Resources<br/> Interactive Theorem Proving 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80688 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Urban, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22102-1">http://dx.doi.org/10.1007/978-3-319-22102-1</a><br/>Format:&#160;Electronic Resources<br/> Fuzzy Social Choice Models Explaining the Government Formation Process ent://SD_ILS/0/SD_ILS:76879 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;C. Casey, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08248-6">http://dx.doi.org/10.1007/978-3-319-08248-6</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83161 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Gaborit, Philippe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Electronic Resources<br/> Measures of Complexity Festschrift for Alexey Chervonenkis ent://SD_ILS/0/SD_ILS:80647 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Vovk, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21852-6">http://dx.doi.org/10.1007/978-3-319-21852-6</a><br/>Format:&#160;Electronic Resources<br/> Polynomial Theory of Error Correcting Codes ent://SD_ILS/0/SD_ILS:74896 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Cancellieri, Giovanni. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-01727-3">http://dx.doi.org/10.1007/978-3-319-01727-3</a><br/>Format:&#160;Electronic Resources<br/> Lectures on Sphere Arrangements &ndash; the Discrete Geometric Side ent://SD_ILS/0/SD_ILS:72574 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Bezdek, K&aacute;roly. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8118-8">http://dx.doi.org/10.1007/978-1-4614-8118-8</a><br/>Format:&#160;Electronic Resources<br/> Self-Organizing Networks First International Conference, ICSON 2015, Beijing, China, January 13-14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:80263 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Sun, Songlin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19746-3">http://dx.doi.org/10.1007/978-3-319-19746-3</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Quantum Information Science ent://SD_ILS/0/SD_ILS:84926 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Hayashi, Masahito. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43502-1">http://dx.doi.org/10.1007/978-3-662-43502-1</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84263 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Lindell, Yehuda. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54242-8">http://dx.doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/> Environmental Epigenomics in Health and Disease Epigenetics and Complex Diseases ent://SD_ILS/0/SD_ILS:82734 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Jirtle, Randy L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36827-1">http://dx.doi.org/10.1007/978-3-642-36827-1</a><br/>Format:&#160;Electronic Resources<br/> Multiscale Signal Analysis and Modeling ent://SD_ILS/0/SD_ILS:71426 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Shen, Xiaoping. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-4145-8">http://dx.doi.org/10.1007/978-1-4614-4145-8</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Computing Theories and Methodologies 11th International Conference, ICIC 2015, Fuzhou, China, August 20-23, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:80699 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Huang, De-Shuang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22180-9">http://dx.doi.org/10.1007/978-3-319-22180-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in the Theory of Numbers Proceedings of the Thirteenth Conference of the Canadian Number Theory Association ent://SD_ILS/0/SD_ILS:74043 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Alaca, Ayşe. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3201-6">http://dx.doi.org/10.1007/978-1-4939-3201-6</a><br/>Format:&#160;Electronic Resources<br/> Fault-Tolerant Search Algorithms Reliable Computation with Unreliable Information ent://SD_ILS/0/SD_ILS:81365 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Cicalese, Ferdinando. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-17327-1">http://dx.doi.org/10.1007/978-3-642-17327-1</a><br/>Format:&#160;Electronic Resources<br/> Unifying Electrical Engineering and Electronics Engineering Proceedings of the 2012 International Conference on Electrical and Electronics Engineering ent://SD_ILS/0/SD_ILS:71645 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Xing, Song. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-4981-2">http://dx.doi.org/10.1007/978-1-4614-4981-2</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Distances ent://SD_ILS/0/SD_ILS:81712 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Deza, Michel Marie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-30958-8">http://dx.doi.org/10.1007/978-3-642-30958-8</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Distances ent://SD_ILS/0/SD_ILS:85091 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Deza, Michel Marie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44342-2">http://dx.doi.org/10.1007/978-3-662-44342-2</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Parameterized Complexity ent://SD_ILS/0/SD_ILS:70981 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Downey, Rodney G. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-5559-1">http://dx.doi.org/10.1007/978-1-4471-5559-1</a><br/>Format:&#160;Electronic Resources<br/> Wireless and Satellite Systems 7th International Conference, WiSATS 2015, Bradford, UK, July 6-7, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:81080 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Pillai, Prashant. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25479-1">http://dx.doi.org/10.1007/978-3-319-25479-1</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Computing Theories and Methodologies 11th International Conference, ICIC 2015, Fuzhou, China, August 20-23, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:80701 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Huang, De-Shuang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22186-1">http://dx.doi.org/10.1007/978-3-319-22186-1</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes in Software Engineering and Extreme Programming 15th International Conference, XP 2014, Rome, Italy, May 26-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76435 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Cantone, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06862-6">http://dx.doi.org/10.1007/978-3-319-06862-6</a><br/>Format:&#160;Electronic Resources<br/> Stochastic Networked Control Systems Stabilization and Optimization under Information Constraints ent://SD_ILS/0/SD_ILS:72268 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Y&uuml;ksel, Serdar. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7085-4">http://dx.doi.org/10.1007/978-1-4614-7085-4</a><br/>Format:&#160;Electronic Resources<br/> Scale Space and Variational Methods in Computer Vision 4th International Conference, SSVM 2013, Schloss Seggau, Leibnitz, Austria, June 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83066 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Kuijper, Arjan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38267-3">http://dx.doi.org/10.1007/978-3-642-38267-3</a><br/>Format:&#160;Electronic Resources<br/> Information and Life ent://SD_ILS/0/SD_ILS:87740 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Battail, G&eacute;rard. author.<br/><a href="http://dx.doi.org/10.1007/978-94-007-7040-9">http://dx.doi.org/10.1007/978-94-007-7040-9</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic Probability and Friends. Bayesian Prediction and Artificial Intelligence Papers from the Ray Solomonoff 85th Memorial Conference, Melbourne, VIC, Australia, November 30 &ndash; December 2, 2011 ent://SD_ILS/0/SD_ILS:84038 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Dowe, David L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-44958-1">http://dx.doi.org/10.1007/978-3-642-44958-1</a><br/>Format:&#160;Electronic Resources<br/> Acoustics, Information, and Communication Memorial Volume in Honor of Manfred R. Schroeder ent://SD_ILS/0/SD_ILS:76055 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Xiang, Ning. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05660-9">http://dx.doi.org/10.1007/978-3-319-05660-9</a><br/>Format:&#160;Electronic Resources<br/> Advanced Free Space Optics (FSO) A Systems Approach ent://SD_ILS/0/SD_ILS:73602 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Majumdar, Arun K. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0918-6">http://dx.doi.org/10.1007/978-1-4939-0918-6</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 12th International Conference, ICIAR 2015, Niagara Falls, ON, Canada, July 22-24, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80484 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Kamel, Mohamed. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20801-5">http://dx.doi.org/10.1007/978-3-319-20801-5</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Geomathematics ent://SD_ILS/0/SD_ILS:84337 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Freeden, Willi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54551-1">http://dx.doi.org/10.1007/978-3-642-54551-1</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence and Soft Computing 13th International Conference, ICAISC 2014, Zakopane, Poland, June 1-5, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:76535 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Rutkowski, Leszek. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07176-3">http://dx.doi.org/10.1007/978-3-319-07176-3</a><br/>Format:&#160;Electronic Resources<br/> Basic Aspects of Hearing Physiology and Perception ent://SD_ILS/0/SD_ILS:71234 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Moore, Brian C. J. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-1590-9">http://dx.doi.org/10.1007/978-1-4614-1590-9</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83473 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Ren, Kui. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39701-1">http://dx.doi.org/10.1007/978-3-642-39701-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cognitive Neurodynamics (IV) Proceedings of the Fourth International Conference on Cognitive Neurodynamics - 2013 ent://SD_ILS/0/SD_ILS:88415 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Liljenstr&ouml;m, Hans. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9548-7">http://dx.doi.org/10.1007/978-94-017-9548-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Multimedia Modeling 19th International Conference, MMM 2013, Huangshan, China, January 7-9, 2013, Proceedings, Part II ent://SD_ILS/0/SD_ILS:82433 2026-04-01T12:47:28Z 2026-04-01T12:47:28Z by&#160;Li, Shipeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35728-2">http://dx.doi.org/10.1007/978-3-642-35728-2</a><br/>Format:&#160;Electronic Resources<br/>