Title: Information Theory and Reliable Communication, Author: Robert G. Gallager
Title: Security for Wireless Implantable Medical Devices, Author: Xiali Hei
Title: Dynamics of Information Systems: Theory and Applications, Author: Michael Hirsch
Title: Quantum Communication and Cryptography, Author: Walter O. Krawec Pre-Order Now
Title: Droit des données 3.0: Perspective législative, Author: Laboratoire clé de la stratégie des mégadonnées
Title: Coding Theory and Applications: 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Proceedings, Author: Angela Barbero
Title: Point Cloud Compression: Technologies and Standardization, Author: Ge Li
Title: Basic Concepts in Information Theory and Coding: The Adventures of Secret Agent 00111, Author: Solomon W. Golomb
Title: Information Theory and Artificial Intelligence to Manage Uncertainty in Hydrodynamic and Hydrological Models, Author: Abebe Andualem Jemberie
Title: Information and Communications Security: 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II, Author: Debin Gao
Title: Formal Concept Analysis: Foundations and Applications, Author: Bernhard Ganter
Title: A Student's Guide to Coding and Information Theory, Author: Stefan M. Moser
Title: Information and Communications Security: 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings, Author: Cristina Alcaraz
Title: Nanoscale Communication Networks, Author: Stephen F. Bush
Title: The Theory of Information and Coding: Student Edition, Author: R. J. McEliece
Title: Lattice-Based Cryptosystems: A Design Perspective, Author: Jiang Zhang
Title: The Evolutionary Trajectory: The Growth of Information in the History and Future of Earth, Author: Richard L Coren
Title: Eurocode '92: International Symposium on Coding Theory and Applications, Author: P. Camion
Title: Quantum Random Number Generation: Theory and Practice, Author: Christian Kollmitzer
Title: Disease Control Through Social Network Surveillance, Author: Thirimachos Bourlai

Pagination Links