Search Results for Mathematical Applications in Computer Science. - Narrowed by: Telecommunication. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMathematical$002bApplications$002bin$002bComputer$002bScience.$0026qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026ps$003d300? 2026-05-18T05:50:52Z Wavelets and Multi-Resolution Analysis A Signal Processing Approach ent://SD_ILS/0/SD_ILS:609560 2026-05-18T05:50:52Z 2026-05-18T05:50:52Z Author&#160;Sinith, M S. author.&#160;A, Gayathri. author.&#160;K R, Chithra. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-92750-8">https://doi.org/10.1007/978-3-031-92750-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IoT Edge Intelligence ent://SD_ILS/0/SD_ILS:603825 2026-05-18T05:50:52Z 2026-05-18T05:50:52Z Author&#160;Pal, Souvik. editor.&#160;Savaglio, Claudio. editor. (orcid)0000-0001-5092-0823&#160;Minerva, Roberto. editor.&#160;Delicato, Fl&aacute;via C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58388-9">https://doi.org/10.1007/978-3-031-58388-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theory and Coding - Solved Problems ent://SD_ILS/0/SD_ILS:613070 2026-05-18T05:50:52Z 2026-05-18T05:50:52Z Author&#160;Ivani&scaron;, Predrag. author.&#160;Draji&#263;, Du&scaron;an. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49370-1">https://doi.org/10.1007/978-3-319-49370-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Full-Duplex Wireless Communications Systems Self-Interference Cancellation ent://SD_ILS/0/SD_ILS:615538 2026-05-18T05:50:52Z 2026-05-18T05:50:52Z Author&#160;Le-Ngoc, Tho. author.&#160;Masmoudi, Ahmed. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57690-9">https://doi.org/10.1007/978-3-319-57690-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fading and Shadowing in Wireless Systems ent://SD_ILS/0/SD_ILS:610932 2026-05-18T05:50:52Z 2026-05-18T05:50:52Z Author&#160;Shankar, P. Mohana. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-53198-4">https://doi.org/10.1007/978-3-319-53198-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Sensor Networks Security, Coverage, and Localization ent://SD_ILS/0/SD_ILS:611390 2026-05-18T05:50:52Z 2026-05-18T05:50:52Z Author&#160;Selmic, Rastko R. author.&#160;Phoha, Vir V. author.&#160;Serwadda, Abdul. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Vienna LTE-Advanced Simulators Up and Downlink, Link and System Level Simulation ent://SD_ILS/0/SD_ILS:616967 2026-05-18T05:50:52Z 2026-05-18T05:50:52Z Author&#160;Rupp, Markus. author.&#160;Schwarz, Stefan. author.&#160;Taranetz, Martin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-0617-3">https://doi.org/10.1007/978-981-10-0617-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Game-theoretic Interference Coordination Approaches for Dynamic Spectrum Access ent://SD_ILS/0/SD_ILS:615702 2026-05-18T05:50:52Z 2026-05-18T05:50:52Z Author&#160;Xu, Yuhua. author.&#160;Alagan, Anpalagan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-0024-9">https://doi.org/10.1007/978-981-10-0024-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:614378 2026-05-18T05:50:52Z 2026-05-18T05:50:52Z Author&#160;Oreku, George S. author.&#160;Pazynyuk, Tamara. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21269-2">https://doi.org/10.1007/978-3-319-21269-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:529557 2026-05-18T05:50:52Z 2026-05-18T05:50:52Z Author&#160;Kr&auml;mer, Juliane. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>