You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 7th International Algorithmic Number Theory Symposium, ANTS 2006, held in Berlin, July 2006. The book presents 37 revised full papers together with 4 invited papers selected for inclusion. The papers are organized in topical sections on algebraic number theory, analytic and elementary number theory, lattices, curves and varieties over fields of characteristic zero, curves over finite fields and applications, and discrete logarithms.
ASIACRYPT’98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the Asiacrypt conferences. ASIACRYPT’98 is sponsored by the State Key Laboratory of Information Security (SKLOIS), University of Science and Technology of China (USTC), and the Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptology Research (IACR). The 16-member Program Committee organized the scientific program and considered 118 submissions. Of these, 32 were accepted for presentation. The authors’ affiliations of the 118 sub...
This book constitutes the proceedings of the 17th International Workshop on Computer Algebra in Scientific Computing, CASC 2015, held in Aachen, Germany, in September 2015. The 35 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They deal with the ongoing progress both in theoretical computer algebra and its expanding applications. New and closer interactions are fostered by combining the area of computer algebra methods and systems and the application of the tools of computer algebra for the solution of problems in scientific computing.
This book constitutes the refereed proceedings of the Second International Congress on Mathematical Software, ICMS 2006. The book presents 45 revised full papers, carefully reviewed and selected for presentation. The papers are organized in topical sections on new developments in computer algebra packages, interfacing computer algebra in mathematical visualization, software for algebraic geometry and related topics, number-theoretical software, methods in computational number theory, free software for computer algebra, and general issues.
The last decade has seen two parallel developments, one in computer science, the other in mathematics, both dealing with the same kind of combinatorial structures: networks with strong symmetry properties or, in graph-theoretical language, vertex-transitive graphs, in particular their prototypical examples, Cayley graphs. In the design of large interconnection networks it was realised that many of the most fre quently used models for such networks are Cayley graphs of various well-known groups. This has spawned a considerable amount of activity in the study of the combinatorial properties of such graphs. A number of symposia and congresses (such as the bi-annual IWIN, starting in 1991) bear witness to the interest of the computer science community in this subject. On the mathematical side, and independently of any interest in applications, progress in group theory has made it possible to make a realistic attempt at a complete description of vertex-transitive graphs. The classification of the finite simple groups has played an important role in this respect.
The advent of mathematical software has been one of the most important events in mathematics. Mathematical software systems are used to construct examples, to prove theorems, and to find new mathematical phenomena. On the other hand, mathematical research often motivates developments of new algorithms and new systems.This volume contains the papers presented at the First International Congress of Mathematical Software, which aimed at a coherent study of mathematical software systems from a wide variety of branches of mathematics. The book discusses more than one hundred mathematical software systems. Readers can get an overview of the current status of the arts of mathematical software and algorithms.The proceedings have been selected for coverage in: • Index to Scientific & Technical Proceedings (ISTP CDROM version / ISI Proceedings)
This book constitutes the refereed proceedings of the Third International Conference on Algebraic Biology, AB 2008, held at the Castle of Hagenberg, Austria in July 2008 as part of the RISC Summer 2008, organized by the Research Institute for Symbolic Computation. The 14 revised full papers presented together with 3 tutorial lectures were carefully reviewed and selected from 27 submissions. The conference is the interdisciplinary forum for the presentation of research on all aspects of applications of symbolic computation (computer algebra, computational logic, and related methods) to various issues in biology and life sciences as well as other problems in biology being approached with symbolic methods.
The intricate 3D structure of the CNS lends itself to multimedia presentation, and is depicted here by way of dynamic 3D models that can be freely rotated, and in over 200 illustrations taken from the successful book 'The Human Central Nervous System' by R. Nieuwenhuys et al, allowing the user to explore all aspects of this complex and fascinating subject. All this fully hyperlinked with over 2000 specialist terms. Optimal exam revision is guaranteed with the self-study option. For further information please contact: http://www.brainmedia.de/html/frames/pr/pr 5/pr 5 02.html
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.
The four-volume set LNCS 2657, LNCS 2658, LNCS 2659, and LNCS 2660 constitutes the refereed proceedings of the Third International Conference on Computational Science, ICCS 2003, held concurrently in Melbourne, Australia and in St. Petersburg, Russia in June 2003. The four volumes present more than 460 reviewed contributed and invited papers and span the whole range of computational science, from foundational issues in computer science and algorithmic mathematics to advanced applications in virtually all application fields making use of computational techniques. These proceedings give a unique account of recent results in the field.