You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume contains papers which are based primarily on talks given at an inter national conference on Algorithmic Problems in Groups and Semigroups held at the University of Nebraska-Lincoln from May ll-May 16, 1998. The conference coincided with the Centennial Celebration of the Department of Mathematics and Statistics at the University of Nebraska-Lincoln on the occasion of the one hun dredth anniversary of the granting of the first Ph.D. by the department. Funding was provided by the US National Science Foundation, the Department of Math ematics and Statistics, and the College of Arts and Sciences at the University of Nebraska-Lincoln, through the College's focus program in Discrete, Ex...
In this unique volume, the expressive capacity of the various types of restarting automata is studied, and the resulting classes of languages are compared to each other and to the classes of an extended Chomsky hierarchy. A restarting automaton consists of a finite-state control, a flexible tape with end-of-tape markers that initially contains the input, and a read-write window of a fixed finite size. The objective here is to collect the many results that have been obtained on the various types of restarting automata in one place and to present them in a uniform and systematic way. Among the book’s topics and features: * Delivers a comprehensive survey of the numerous types of restarting a...
Astronomy is the oldest and most fundamental of the natural sciences. From the early beginnings of civilization astronomers have attempted to explain not only what the Universe is and how it works, but also how it started, how it evolved to the present day, and how it will develop in the future. The author, a well-known astronomer himself, describes the evolution of astronomical ideas, briefly discussing most of the instrumental developments. Using numerous figures to elucidate the mechanisms involved, the book starts with the astronomical ideas of the Egyptian and Mesopotamian philosophers, moves on to the Greek period, and then to the golden age of astronomy, i.e. to Copernicus, Galileo, Kepler, and Newton, and ends with modern theories of cosmology. Written with undergraduate students in mind, this book gives a fascinating survey of astronomical thinking.
The purpose of the Berkeley Workshop on Monoids was to give expository talks by the most qualified experts in the emerging main areas of monoid and semigroup theory including applications to theoretical computer science. This was supplemented with current research papers. The topics covered, in an accessible way for the mathematical and theoretical computer community, were: Kernels and expansions in semigroup theory; Implicit operations; Inverse monoids; Varieties of semigroups and universal algebra; Linear semigroups and monoids of Lie type; Monoids acting on tress; Synthesis theorem, regular semigroups, and applications; Type-II conjecture; Application to theoretical computer science and decision problems.
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents
The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for researchers and practitioners because many applications that require SGC are now widely used, such as teleconfe...
This book consists of short descriptions of 106 mathematical theorems, which belong to the great achievements of 21st century mathematics but require relatively little mathematical background to understand their formulation and appreciate their importance. The selected theorems of this volume, chosen from the famous Annals of Mathematics journal, cover a broad range of topics from across mathematics. Each theorem description is essentially self-contained, can be read independently of the others, and requires as little preliminary knowledge as possible. Although the sections often start with an informal discussion and toy examples, all the necessary definitions are included and each description culminates in the precise formulation of the corresponding theorem. Filling the gap between surveys written for mathematicians and popular mathematics, this book is intended for readers with a keen interest in contemporary mathematics.
Regular languages have a wide area of applications. This makes it an important task to convert between different forms of regular language representations, and to compress the size of such representations. This book studies modern aspects of compressions and conversions of regular language representations. The first main part presents methods for lossy compression of classical finite automata. Lossy compression allows to reduce the size of a language representation below the limits of classical compression methods, by the cost of introducing tolerable errors to the language. The complexity of many problems related to compression with respect to different error profiles is classified. The other main part is devoted to the study of biautomata, which were recently introduced as a new descriptional model for regular languages. Although biautomata are in many ways similar to finite automata, this book carves out some notable differences. While classical methods for finite automata can successfully be applied to biautomata, one observes a drastic increase of the computational complexity when considering lossy compression for biautomata.
Activities like text-editing, watching movies, or managing personal finances are all accomplished with web-based solutions nowadays. The providers need to ensure security and privacy of user data. To that end, passwords are still the most common authentication method on the web. They are inexpensive and easy to implement. Users are largely accustomed to this kind of authentication but passwords represent a considerable nuisance, because they are tedious to create, remember, and maintain. In many cases, usability issues turn into security problems, because users try to work around the challenges and create easily predictable credentials. Often, they reuse their passwords for many purposes, wh...
In this groundbreaking volume, leading philosophers and mathematicians explore Kurt Gödel's work on the foundations and philosophy of mathematics.