Search Results for - Narrowed by: Springer E-Book Collection - Coding theory. - Telecommunication.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Coding$002btheory.$002509Coding$002btheory.$0026qf$003dSUBJECT$002509Konu$002509Telecommunication.$002509Telecommunication.$0026ps$003d300?2024-06-26T21:46:24ZInternet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220232024-06-26T21:46:24Z2024-06-26T21:46:24ZYazar Galinina, Olga. editor. (orcid)0000-0002-5386-1061<br/><a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format: Electronic Resources<br/>Information Theory for Electrical Engineersent://SD_ILS/0/SD_ILS:2266802024-06-26T21:46:24Z2024-06-26T21:46:24ZYazar Gazi, Orhan. author.<br/><a href="https://doi.org/10.1007/978-981-10-8432-4">https://doi.org/10.1007/978-981-10-8432-4</a><br/>Format: Electronic Resources<br/>Reconfigurable Cryptographic Processorent://SD_ILS/0/SD_ILS:2231012024-06-26T21:46:24Z2024-06-26T21:46:24ZYazar Liu, Leibo. author.<br/><a href="https://doi.org/10.1007/978-981-10-8899-5">https://doi.org/10.1007/978-981-10-8899-5</a><br/>Format: Electronic Resources<br/>Network Coding and Subspace Designsent://SD_ILS/0/SD_ILS:2262902024-06-26T21:46:24Z2024-06-26T21:46:24ZYazar Greferath, Marcus. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70293-3">https://doi.org/10.1007/978-3-319-70293-3</a><br/>Format: Electronic Resources<br/>Computer Systems Digital Design, Fundamentals of Computer Architecture and Assembly Languageent://SD_ILS/0/SD_ILS:2241432024-06-26T21:46:24Z2024-06-26T21:46:24ZYazar Elahi, Ata. author.<br/><a href="https://doi.org/10.1007/978-3-319-66775-1">https://doi.org/10.1007/978-3-319-66775-1</a><br/>Format: Electronic Resources<br/>Secure Networked Inference with Unreliable Data Sourcesent://SD_ILS/0/SD_ILS:2218292024-06-26T21:46:24Z2024-06-26T21:46:24ZYazar Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format: Electronic Resources<br/>Information Theory and Coding - Solved Problemsent://SD_ILS/0/SD_ILS:2253622024-06-26T21:46:24Z2024-06-26T21:46:24ZYazar Ivaniš, Predrag. author.<br/><a href="https://doi.org/10.1007/978-3-319-49370-1">https://doi.org/10.1007/978-3-319-49370-1</a><br/>Format: Electronic Resources<br/>Fading and Shadowing in Wireless Systemsent://SD_ILS/0/SD_ILS:2213092024-06-26T21:46:24Z2024-06-26T21:46:24ZYazar Shankar, P. Mohana. author.<br/><a href="https://doi.org/10.1007/978-3-319-53198-4">https://doi.org/10.1007/978-3-319-53198-4</a><br/>Format: Electronic Resources<br/>High-Speed Decoders for Polar Codesent://SD_ILS/0/SD_ILS:2257182024-06-26T21:46:24Z2024-06-26T21:46:24ZYazar Giard, Pascal. author.<br/><a href="https://doi.org/10.1007/978-3-319-59782-9">https://doi.org/10.1007/978-3-319-59782-9</a><br/>Format: Electronic Resources<br/>