You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This text is a semester course in the basic mathematical and theoretical foundations of computer science. Students who make heavy use of computing should learn these foundations well, setting a base for a follow-on course in algorithms. A solid theoretical and algorithmic foundation in computer science sets the stage for developing good programs, programs that work, always and efficiently.Each chapter is a lecture that has been taught as such. Part I starts with basic logic, proofs and discrete mathematics, including: induction, recursion, summation, asymptotics and number theory. We then continue with graphs, counting and combinatorics, and wrap up the coverage of discrete mathematics with ...
None
This work constitutes the proceedings of the Second International Workshop on Advances in Social Network and Analysis, held in Las Vegas, NV, USA in August 2008.
The challenge of dividing an asset fairly, from cakes to more important properties, is of great practical importance in many situations. Since the famous Polish school of mathematicians (Steinhaus, Banach, and Knaster) introduced and described algorithms for the fair division problem in the 1940s, the concept has been widely popularized. This book
The annual conference on Neural Information Processing Systems (NIPS) is the flagship conference on neural computation. These proceedings contain all of the papers that were presented.
Complex Social Networks is a newly emerging (hot) topic with applications in a variety of domains, such as communication networks, engineering networks, social networks, and biological networks. In the last decade, there has been an explosive growth of research on complex real-world networks, a theme that is becoming pervasive in many disciplines, ranging from mathematics and computer science to the social and biological sciences. Optimization of complex communication networks requires a deep understanding of the interplay between the dynamics of the physical network and the information dynamics within the network. Although there are a few books addressing social networks or complex networks, none of them has specially focused on the optimization perspective of studying these networks. This book provides the basic theory of complex networks with several new mathematical approaches and optimization techniques to design and analyze dynamic complex networks. A wide range of applications and optimization problems derived from research areas such as cellular and molecular chemistry, operations research, brain physiology, epidemiology, and ecology.
A pragmatic approach to Big Data by taking the reader on a journey between Big Data (what it is) and the Smart Data (what it is for). Today’s decision making can be reached via information (related to the data), knowledge (related to people and processes), and timing (the capacity to decide, act and react at the right time). The huge increase in volume of data traffic, and its format (unstructured data such as blogs, logs, and video) generated by the “digitalization” of our world modifies radically our relationship to the space (in motion) and time, dimension and by capillarity, the enterprise vision of performance monitoring and optimization.
This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, held in Atlanta, GA, USA in May 2005. The 28 revised full papers, 34 revised short papers, and 32 poster abstracts presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on data and text mining, infrastructure protection and emergency response, information management and security education, deception detection and authorship analysis, monitoring and surveillance, and terrorism informatics.
This text presents different models of limit order books and introduces a flexible open-source library, useful to those studying trading strategies.
Intended to be of interest to counter-terrorism experts and professionals, to academic researchers in information systems, computer science, political science, and public policy, and to graduate students in these areas, this book highlights several aspects of patrolling the Web that were raised and discussed by experts from different disciplines.