You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Written by prominent experts in the field, this monograph provides the first comprehensive, unified presentation of the structural, algorithmic and applied aspects of the theory of Boolean functions. The book focuses on algebraic representations of Boolean functions, especially disjunctive and conjunctive normal form representations. This framework looks at the fundamental elements of the theory (Boolean equations and satisfiability problems, prime implicants and associated short representations, dualization), an in-depth study of special classes of Boolean functions (quadratic, Horn, shellable, regular, threshold, read-once functions and their characterization by functional equations) and two fruitful generalizations of the concept of Boolean functions (partially defined functions and pseudo-Boolean functions). Several topics are presented here in book form for the first time. Because of the depth and breadth and its emphasis on algorithms and applications, this monograph will have special appeal for researchers and graduate students in discrete mathematics, operations research, computer science, engineering and economics.
In this book quantitative approaches are proposed for production planning problems in automated manufacturing. In particular, techniques from operations research provide ways to tackle these problems. Special attention is given to the efficient use of tools in automated manufacturing systems. The book presents models and tests solution strategies for different kinds of production decision problems. A case study in the manufacturing of printed circuit boards highlights the methodology. The book will help to understand the nature of production planning problems in automated manufacturing and show how techniques from operations research may contribute to their solution.
A collection of papers written by prominent experts that examine a variety of advanced topics related to Boolean functions and expressions.
Data Correcting Approaches in Combinatorial Optimization focuses on algorithmic applications of the well known polynomially solvable special cases of computationally intractable problems. The purpose of this text is to design practically efficient algorithms for solving wide classes of combinatorial optimization problems. Researches, students and engineers will benefit from new bounds and branching rules in development efficient branch-and-bound type computational algorithms. This book examines applications for solving the Traveling Salesman Problem and its variations, Maximum Weight Independent Set Problem, Different Classes of Allocation a...
The Fifth International Conference on Multiple Criteria Decision Making, not suprisingly, had several objectives. First, it aimed at beinq a forum for exchange and intensive discussion of recent ideas on theory and practice of MCDM, following the now well-established tradition of the previous meetings in the series, organized by H. Thiriez and S. Zionts in Jouy-en-Josas (1975), S. Zionts in Buffalo (1977), G. Fandel and T. Gal in Hagen/Konigswinter (1979) and J. Morse in Newark (1980). Second, closer contacts Nere desired between participants in these meetings and other active groups in the field, prominent among which is the European Working Group on Multiple Criteria Decision Aid. Third, p...
Up-to-Date Research Sheds New Light on This Area Taking into account the ongoing worldwide financial crisis, Stock Market Volatility provides insight to better understand volatility in various stock markets. This timely volume is one of the first to draw on a range of international authorities who offer their expertise on market volatility in devel
This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects: cryptography—--the art of making secure building blocks—--and cryptanalysis—--the art of breaking them. The text describes some of the most important systems in detail, including AES, RSA, group-based and lattice-based cryptography, signatures, hash functions, random generation, and more, providing detailed underpinnings for most of them. With regard to cryptanalysis, it presents a number of basic tools such as the differential and linear methods and lattice attacks. This text, based on lecture notes from the author’s many courses on the ...
This textbook provides an introduction to the mathematics on which modern cryptology is based. It covers not only public key cryptography, the glamorous component of modern cryptology, but also pays considerable attention to secret key cryptography, its workhorse in practice. Modern cryptology has been described as the science of the integrity of information, covering all aspects like confidentiality, authenticity and non-repudiation and also including the protocols required for achieving these aims. In both theory and practice it requires notions and constructions from three major disciplines: computer science, electronic engineering and mathematics. Within mathematics, group theory, the th...