Search Results for Coding and Information Theory. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCoding$002band$002bInformation$002bTheory.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-06-24T06:24:29Z Information theory and coding ent://SD_ILS/0/SD_ILS:45924 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Abramson, Norman<br/>Preferred Shelf Number&#160;Q 360 A2 1963<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Information and coding theory ent://SD_ILS/0/SD_ILS:33651 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Ingels, Franklin M.<br/>Preferred Shelf Number&#160;QA 268 I53 1971<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information theory, coding and cryptography ent://SD_ILS/0/SD_ILS:386137 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Bose, Ranjan.<br/>Preferred Shelf Number&#160;QA268 B743 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Fundamentals in Information Theory and Coding ent://SD_ILS/0/SD_ILS:194339 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Borda, Monica. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20347-3">http://dx.doi.org/10.1007/978-3-642-20347-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theory and Network Coding ent://SD_ILS/0/SD_ILS:167661 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Yeung, Raymond W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-79234-7">http://dx.doi.org/10.1007/978-0-387-79234-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of coding theory and applications of error-correcting codes, with an introduction to cryptography and information theory ent://SD_ILS/0/SD_ILS:300313 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Ad&aacute;mek, Ji&#345;&iacute;, ing.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118033265">An electronic book accessible through the World Wide Web; click for information</a> HathiTrust Digital Library, Limited view (search only) <a href="http://catalog.hathitrust.org/api/volumes/oclc/22660845.html">http://catalog.hathitrust.org/api/volumes/oclc/22660845.html</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of finite fields ent://SD_ILS/0/SD_ILS:291673 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Mullen, Gary L.&#160;Panario, Daniel, 1959-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439873823">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cooperative Networking in a Heterogeneous Wireless Medium ent://SD_ILS/0/SD_ILS:332201 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Ismail, Muhammad. author.&#160;Zhuang, Weihua. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332201.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7079-3">http://dx.doi.org/10.1007/978-1-4614-7079-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to the Theory of Quantum Information Processing ent://SD_ILS/0/SD_ILS:332204 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Bergou, J&aacute;nos A. author.&#160;Hillery, Mark. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332204.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7092-2">http://dx.doi.org/10.1007/978-1-4614-7092-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:332220 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Hei, Xiali. author.&#160;Du, Xiaojiang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332220.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematics in Computing An Accessible Guide to Historical, Foundational and Application Contexts ent://SD_ILS/0/SD_ILS:331002 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;O&rsquo;Regan, Gerard. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331002.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-4534-9">http://dx.doi.org/10.1007/978-1-4471-4534-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:332957 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Abdalla, Michel. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332957.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Evolution of Semantic Systems ent://SD_ILS/0/SD_ILS:333917 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;K&uuml;ppers, Bernd-Olaf. editor.&#160;Hahn, Udo. editor.&#160;Artmann, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333917.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34997-3">http://dx.doi.org/10.1007/978-3-642-34997-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theory, Combinatorics, and Search Theory In Memory of Rudolf Ahlswede ent://SD_ILS/0/SD_ILS:334319 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Aydinian, Harout. editor.&#160;Cicalese, Ferdinando. editor.&#160;Deppe, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334319.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36899-8">http://dx.doi.org/10.1007/978-3-642-36899-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334720 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Boyd, Colin. editor.&#160;Simpson, Leonie. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334720.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Interference Cancellation Using Space-Time Processing and Precoding Design ent://SD_ILS/0/SD_ILS:333352 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Li, Feng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333352.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30712-6">http://dx.doi.org/10.1007/978-3-642-30712-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Local Information Dynamics of Distributed Computation in Complex Systems ent://SD_ILS/0/SD_ILS:333637 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Lizier, Joseph T. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333637.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32952-4">http://dx.doi.org/10.1007/978-3-642-32952-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334022 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Iwama, Kazuo. editor.&#160;Kawano, Yasuhito. editor.&#160;Murao, Mio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2013 The Cryptographers&rsquo; Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334122 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334122.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334179 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Abdalla, Michel. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334179.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334613 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Kuty&#322;owski, Miros&#322;aw. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334613.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334620 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Youssef, Amr. editor.&#160;Nitaj, Abderrahmane. editor.&#160;Hassanien, Aboul Ella. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334620.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Watermaking 11th International Workshop, IWDW 2012, Shanghai, China, October 31 &ndash; November 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334892 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Shi, Yun Q. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334892.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40099-5">http://dx.doi.org/10.1007/978-3-642-40099-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335066 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Palamidessi, Catuscia. editor.&#160;Ryan, Mark D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335066.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer vision from surfaces to 3D objects ent://SD_ILS/0/SD_ILS:285111 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Tyler, Christopher W.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439817131">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The theory that would not die : how Bayes' rule cracked the enigma code, hunted down Russian submarines, &amp; emerged triumphant from two centuries of controversy ent://SD_ILS/0/SD_ILS:375386 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;McGrayne, Sharon Bertsch.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.2307/j.ctt1np76s">http://www.jstor.org/stable/10.2307/j.ctt1np76s</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of discrete and combinatorial mathematics ent://SD_ILS/0/SD_ILS:289796 2024-06-24T06:24:29Z 2024-06-24T06:24:29Z Author&#160;Rosen, Kenneth H.&#160;Michaels, John G.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439832905">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>