You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book contains 22 lectures presented at the final conference of the Ger man research program (Schwerpunktprogramm) Algorithmic Number The ory and Algebra 1991-1997, sponsored by the Deutsche Forschungsgemein schaft. The purpose of this research program and of the meeting was to bring together developers of computer algebra software and researchers using com putational methods to gain insight into experimental problems and theoret ical questions in algebra and number theory. The book gives an overview on algorithmic methods and on results ob tained during this period. This includes survey articles on the main research projects within the program: • algorithmic number theory emphasizing ...
An Invitation to Computational Homotopy is an introduction to elementary algebraic topology for those with an interest in computers and computer programming. It expertly illustrates how the basics of the subject can be implemented on a computer through its focus on fully-worked examples designed to develop problem solving techniques. The transition from basic theory to practical computation raises a range of non-trivial algorithmic issues which will appeal to readers already familiar with basic theory and who are interested in developing computational aspects. The book covers a subset of standard introductory material on fundamental groups, covering spaces, homology, cohomology and classifyi...
This volume contains contributions by the participants of the conference "Groups and Computation", which took place at The Ohio State University in Columbus, Ohio, in June 1999. This conference was the successor of two workshops on "Groups and Computation" held at DIMACS in 1991 and 1995. There are papers on permutation group algorithms, finitely presented groups, polycyclic groups, and parallel computation, providing a representative sample of the breadth of Computational Group Theory. On the other hand, more than one third of the papers deal with computations in matrix groups, giving an in-depth treatment of the currently most active area of the field. The points of view of the papers range from explicit computations to group-theoretic algorithms to group-theoretic theorems needed for algorithm development.
"The power of general purpose computational algebra systems running on personal computers has increased rapidly in recent years. For mathematicians doing research in group theory, this means a growing set of sophisticated computational tools are now available for their use in developing new theoretical results." "This volume consists of contributions by researchers invited to the AMS Special Session on Computational Group Theory held in March 2007. The main focus of the session was on the application of Computational Group Theory (CGT) to a wide range of theoretical aspects of group theory. The articles in this volume provide a variety of examples of how these computer systems helped to solv...
This volume consists of contributions by researchers who were invited to the Harlaxton Conference on Computational Group Theory and Cohomology, held in August of 2008, and to the AMS Special Session on Computational Group Theory, held in October 2008. This volume showcases examples of how Computational Group Theory can be applied to a wide range of theoretical aspects of group theory. Among the problems studied in this book are classification of p-groups, covers of Lie groups, resolutions of Bieberbach groups, and the study of the lower central series of free groups. This volume also includes expository articles on the probabilistic zeta function of a group and on enumerating subgroups of symmetric groups. Researchers and graduate students working in all areas of Group Theory will find many examples of how Computational Group Theory helps at various stages of the research process, from developing conjectures through the verification stage. These examples will suggest to the mathematician ways to incorporate Computational Group Theory into their own research endeavors.
Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior classes in abstract or linear algebra. While the content has been reworked and improved, this edition continues to cover many algorithms that arise in cryptography and error-control codes. New to the Second Edition A CD-ROM containing an interactive version of the book that is powered by Scientific Notebook®, a mathematical word processor and easy-to-use computer algebra system New appendix that re...
While its roots reach back to the third century, diophantine analysis continues to be an extremely active and powerful area of number theory. Many diophantine problems have simple formulations, they can be extremely difficult to attack, and many open problems and conjectures remain. Diophantine Analysis examines the theory of diophantine approximations and the theory of diophantine equations, with emphasis on interactions between these subjects. Beginning with the basic principles, the author develops his treatment around the theory of continued fractions and examines the classic theory, including some of its applications. He also explores modern topics rarely addressed in other texts, inclu...
The ICMS Developer's Meeting is an international congress for which the main theme is mathematical software. The 2010 meeting was the third of a series of meetings of similar theme, the ?rst being held in Beijing, China in 2002,and the second in Castro-Urdiales, Spain in 2006. The ?eld of mathematics has numerous branches, and in each branch we ?nd that algorithms, and also implementations and applications of software s- tems, are studied. Researchers who endeavor to make such studies also have international meetings within their speci'c branches of mathematics, and these meetings have made signi'cant contributions to the ?elds in which they lie. The ICMS (International Congresseson Mathematical Software), on the other hand, is a general (not branch speci'c) meeting on mathematical software, which is held every four years, and is a rare opportunity for developers of mathematical softwarefrom di'erent branchesof mathematics, as well as mathematicians who are interested in mathematical software, to gather together.
Continuing in the bestselling, informative tradition of the first edition, the Handbook of Combinatorial Designs, Second Edition remains the only resource to contain all of the most important results and tables in the field of combinatorial design. This handbook covers the constructions, properties, and applications of designs as well as existence
This combinatorics text provides in-depth coverage of recurrences, generating functions, partitions, and permutations, along with some of the most interesting graph and network topics, design constructions, and finite geometries. It presents the computer and software algorithms in pseudo-code and incorporates definitions, theorems, proofs, examples, and nearly 300 illustrations as pedagogical elements of the exposition. Numerous problems, solutions, and hints reinforce basic skills and assist with creative problem solving. The author also offers a website with extensive graph theory informational resources as well as a computational engine to help with calculations for some of the exercises.