You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The papers in this volume were selected for presentation at the Eleventh Annual International Symposium on Algorithms and Computation (ISAAC 2000), held on 18{20 December, 2000 at the Institute of Information Science, Academia Sinica, Taipei, Taiwan. Previous meetings were held in Tokyo (1990), Taipei (1991), Nagoya (1992), Hong Kong (1993), Beijing (1994), Cairns (1995), Osaka (1996), Singapore (1997), Taejon (1998), and Chennai (1999). Submissions to the conference this year were conducted entirely electro- cally. Thanks to the excellent software developed by the Institute of Information Science, Academia Sinica, we were able to carry out virtually all communication via the World Wide Web....
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equivalence relations for these functions and develops several new methods for construction of their infinite families. In addition, the book offers solutions to two longstanding open problems, including the problem on characterization of APN and AB functions via Boolean, and the problem on the relation between two classes of bent functions.
In this monograph, we combine operator techniques with state space methods to solve factorization, spectral estimation, and interpolation problems arising in control and signal processing. We present both the theory and algorithms with some Matlab code to solve these problems. A classical approach to spectral factorization problems in control theory is based on Riccati equations arising in linear quadratic control theory and Kalman ?ltering. One advantage of this approach is that it readily leads to algorithms in the non-degenerate case. On the other hand, this approach does not easily generalize to the nonrational case, and it is not always transparent where the Riccati equations are coming...
A state-of-the-art survey of both classical and quantum lattice gas models, this two-volume work will cover the rigorous mathematical studies of such models as the Ising and Heisenberg, an area in which scientists have made enormous strides during the past twenty-five years. This first volume addresses, among many topics, the mathematical background on convexity and Choquet theory, and presents an exhaustive study of the pressure including the Onsager solution of the two-dimensional Ising model, a study of the general theory of states in classical and quantum spin systems, and a study of high and low temperature expansions. The second volume will deal with the Peierls construction, infrared ...
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011. The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches.
Envisioning Machine Translation in the Information Future When the organizing committee of AMTA-2000 began planning, it was in that brief moment in history when we were absorbed in contemplation of the passing of the century and the millennium. Nearly everyone was comparing lists of the most important accomplishments and people of the last 10, 100, or 1000 years, imagining the radical changes likely over just the next few years, and at least mildly anxious about the potential Y2K apocalypse. The millennial theme for the conference, “Envisioning MT in the Information Future,” arose from this period. The year 2000 has now come, and nothing terrible has happened (yet) to our electronic infrastructure. Our musings about great people and events probably did not ennoble us much, and whatever sense of jubilee we held has since dissipated. So it may seem a bit obsolete or anachronistic to cast this AMTA conference into visionary themes.
This textbook offers a thorough, modern introduction into commutative algebra. It is intented mainly to serve as a guide for a course of one or two semesters, or for self-study. The carefully selected subject matter concentrates on the concepts and results at the center of the field. The book maintains a constant view on the natural geometric context, enabling the reader to gain a deeper understanding of the material. Although it emphasizes theory, three chapters are devoted to computational aspects. Many illustrative examples and exercises enrich the text.