You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Historically, the theory of stability is based on linear differential systems, which are simple and important systems in ordinary differential equations. The research on differential equations and on the theory of stability will, to a certain extent, be influenced by the research on linear differential systems. For differential linear equation systems, there are still many historical open questions attracting mathematicians. This book deals with the theory of linear differential systems developed around the notion of exponential dichotomies. The authors advance the theory of stability through their research in this field. Several new important results on linear differential systems are prese...
Mathematical and computational modeling approaches in biological and medical research are experiencing rapid growth globally. This Special Issue Book intends to scratch the surface of this exciting phenomenon. The subject areas covered involve general mathematical methods and their applications in biology and medicine, with an emphasis on work related to mathematical and computational modeling of the complex dynamics observed in biological and medical research. Fourteen rigorously reviewed papers were included in this Special Issue. These papers cover several timely topics relating to classical population biology, fundamental biology, and modern medicine. While the authors of these papers dealt with very different modeling questions, they were all motivated by specific applications in biology and medicine and employed innovative mathematical and computational methods to study the complex dynamics of their models. We hope that these papers detail case studies that will inspire many additional mathematical modeling efforts in biology and medicine
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2018, held in Valencia, Spain, in September 2018 under the sponsorship of the UNESCO Chair in Data Privacy. The 23 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized into the following topics: tabular data protection; synthetic data; microdata and big data masking; record linkage; and spatial and mobility data. Chapter "SwapMob: Swapping Trajectories for Mobility Anonymization" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book is a collection of selected refereed papers presented at the International Conference on Statistics, Combinatorics and Related Areas, and the Eighth International Conference of the Forum for Interdisciplinary Mathematics. It includes contributions from eminent statisticians such as Joe Gani, Clive Granger, Chris Heyde, R Nishii, C R Rao, P K Sen and Sue Wilson. By exploring and investigating deeper, these papers enlarge the reservoir in the represented areas of research, such as bioinformatics, estimating functions, financial statistics, generalized linear models, goodness of fit, image analysis, industrial data analysis, multivariate statistics, neural networks, quasi-likelihood, sample surveys, statistical inference, stochastic models, and time series.
Computational Intelligence (CI) has emerged as a rapidly growing field over the past decade. This volume reports the exploration of CI frontiers with an emphasis on a broad spectrum of real-world applications. Such a collection of chapters has presented the state-of-the-art of CI applications in industry and will be an essential resource for professionals and researchers who wish to learn and spot the opportunities in applying CI techniques to their particular problems.
This book constitutes the refereed proceedings of the 9th Australasian Conference on Information Security and Privacy, ACISP 2004, held in Sydney, Australia in July 2004. The 41 revised full papers presented were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on broadcast encryption and traitor tracing, private information retrieval and oblivious transfer, trust and secret sharing, cryptanalysis, digital signatures, cryptosystems, fast computation, mobile agents security, protocols, security management, and access control and authorization.
This book constitutes the refereed proceedings of the 19th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2006, held in Annecy, France, June 2006. The book presents 134 revised full papers together with 3 invited contributions, organized in topical sections on multi-agent systems, decision-support, genetic algorithms, data-mining and knowledge discovery, fuzzy logic, knowledge engineering, machine learning, speech recognition, systems for real life applications, and more.
This book constitutes the refereed proceedings of the 9th Asian Computing Science Conference, ASIAN 2004, dedicated to Jean-Louis Lassez on the occasion of his 60th birthday and held in Chiang Mai, Thailand in December 2004. The 17 revised full papers presented together with 3 keynote papers and 16 invited papers honouring Jean-Louis Lassez were carefully reviewed and selected from 75 submissions. The contributed papers are focusing on higher-level decision making, whereas the invited papers address a broader variety of topics in theoretical computer science.
In 1945, very early in the history of the development of a rigorous analytical theory of probability, Feller (1945) wrote a paper called “The fundamental limit theorems in probability” in which he set out what he considered to be “the two most important limit theorems in the modern theory of probability: the central limit theorem and the recently discovered ... ‘Kolmogoroff’s cel ebrated law of the iterated logarithm’ ”. A little later in the article he added to these, via a charming description, the “little brother (of the central limit theo rem), the weak law of large numbers”, and also the strong law of large num bers, which he considers as a close relative of the law of...