You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
And God said, Let there be light; and there was light. Genesis 1,3 Light is not only the basis of our biological existence, but also an essential source of our knowledge about the physical laws of nature, ranging from the seventeenth century geometrical optics up to the twentieth century theory of general relativity and quantum electrodynamics. Folklore Don’t give us numbers: give us insight! A contemporary natural scientist to a mathematician The present book is the second volume of a comprehensive introduction to themathematicalandphysicalaspectsofmodernquantum?eldtheorywhich comprehends the following six volumes: Volume I: Basics in Mathematics and Physics Volume II: Quantum Electrodyna...
Delineates the roles that individuals and their churches played in confronting Hitler. Written by both Jewish and Christian scholars, these essays focus on the Christian responses to Nazism and delineate the roles that individuals and their churches played in confronting Hitler.
In this second edition, a comprehensive review is given for path integration in two- and three-dimensional (homogeneous) spaces of constant and non-constant curvature, including an enumeration of all the corresponding coordinate systems which allow separation of variables in the Hamiltonian and in the path integral. The corresponding path integral solutions are presented as a tabulation. Proposals concerning interbasis expansions for spheroidal coordinate systems are also given. In particular, the cases of non-constant curvature Darboux spaces are new in this edition. The volume also contains results on the numerical study of the properties of several integrable billiard systems in compact d...
This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2000, held in Bruges, Belgium, in May 2000. The 39 revised full papers presented were carefully selected from a total of 150 submissions during a highly competitive reviewing process. The book is divided in topical sections of factoring and discrete logarithm, digital signatures, private information retrieval, key management protocols, threshold cryptography, public-key encryption, quantum cryptography, multi-party computation and information theory, zero-knowledge, symmetric cryptography, Boolean functions and hardware, voting schemes, and stream ciphers and block ciphers.
Robotic agents, such as autonomous office couriers or robot tourguides, must be both reliable and efficient. Thus, they have to flexibly interleave their tasks, exploit opportunities, quickly plan their course of action, and, if necessary, revise their intended activities. This book makes three major contributions to improving the capabilities of robotic agents: - first, a plan representation method is introduced which allows for specifying flexible and reliable behavior - second, probabilistic hybrid action models are presented as a realistic causal model for predicting the behavior generated by modern concurrent percept-driven robot plans - third, the system XFRMLEARN capable of learning structured symbolic navigation plans is described in detail.
Haptic human-computer interaction is interaction between a human computer user and the computer user interface based on the powerful human sense of touch. Haptic hardware has been discussed and exploited for some time, particularly in the context of computer games. However, so far, little attention has been paid to the general principles of haptic HCI and the systematic use of haptic devices for improving efficiency, effectiveness, and satisfaction in HCI. This book is the first one to focus on haptic human-computer interaction. It is based on a workshop held in Glasgow, UK, in August / September 2000. The 22 revised full papers presented were carefully reviewed and selected from 35 submissions. Besides a brief historic survey, the book offers topical sections on haptic interfaces for blind people, collaborative haptics, psychological issues and measurement, and applications of haptics.
Most people tend to view number theory as the very paradigm of pure mathematics. With the advent of computers, however, number theory has been finding an increasing number of applications in practical settings, such as in cryptography, random number generation, coding theory, and even concert hall acoustics. Yet other applications are still emerging - providing number theorists with some major new areas of opportunity. The 1996 IMA summer program on Emerging Applications of Number Theory was aimed at stimulating further work with some of these newest (and most attractive) applications. Concentration was on number theory's recent links with: (a) wave phenomena in quantum mechanics (more specifically, quantum chaos); and (b) graph theory (especially expander graphs and related spectral theory). This volume contains the contributed papers from that meeting and will be of interest to anyone intrigued by novel applications of modern number-theoretical techniques.
ETAPS 2002 was the ?fth instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual federated conference that was established in 1998by combining a number of existing and new conferences. This year it comprised 5 conferences (FOSSACS, FASE, ESOP, CC, TACAS), 13 satellite workshops (ACL2, AGT, CMCS, COCV, DCC, INT, LDTA, SC, SFEDL, SLAP, SPIN, TPTS, and VISS), 8invited lectures (not including those speci?c to the satellite events), and several tutorials. The events that comprise ETAPS address various aspects of the system - velopment process, including speci?cation, design, implementation, analysis, and improvement. The languages, methodologies, and tools which support these - tivities are all well within its scope. Di?erent blends of theory and practice are represented, with an inclination towards theory with a practical motivation on one hand and soundly-based practice on the other. Many of the issues involved in software design apply to systems in general, including hardware systems, and the emphasis on software is not intended to be exclusive.
Staticanalysisisaresearchareaaimedatdevelopingprinciplesandtoolsforv- i?cation and semantics-based manipulation of programs and high-performance implementations of programming languages. The series of Static Analysis s- posia has served as the primary venue for presentation and discussion of th- retical, practical, and application advances in the area. This volume contains the papers accepted for presentation at the 10th - ternational Static Analysis Symposium (SAS 2003),which was held June 11–13, 2003 in San Diego, California, USA. Firmly established as a leading forum in the static analysis area, SAS 2003 received 82 high-quality submissions. Each paper was carefully reviewed, being judg...
Physicalsystemswhichrightthemselvesafterbeingdisturbedevokeourcuriosity becausewe wantto understand howsuchsystemsareableto reactto unexpected stimuli. Themechanismsareallthe morefascinatingwhensystemsarecomposed of small, simple units, and the ability of the system to self-stabilize emerges out of its components. Faithful computer simulations of such physical systems exhibit the self-stabilizing property, but in the realm of computing, particularly for distributed systems, wehavegreaterambition. We imaginethat all manner of software, ranging from basic communication protocols to high-level applications, could enjoy self-corrective properties. Self-stabilizing software o?ers a unique, non-tr...