This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial ...
اقرأ المزيد
Teachers are in difficulty with regard to the space and emphasis to be given to set theory topics, in their preparation and ...
اقرأ المزيد
This volume collects three series of lectures on applications of the theory of Hamiltonian systems, contributed by some of ...
اقرأ المزيد
Hungarian mathematics has always been known for discrete mathematics, including combinatorial number theory, set theory and ...
اقرأ المزيد
This volume contains papers that were presented at HYP2006, the eleventh international Conference on Hyperbolic Problems: ...
اقرأ المزيد
Hypercomputation is a relatively new theory of computation which treats computing methods and devices that transcend the ...
اقرأ المزيد
Computational Mechanics in Solid, Structures and Coupled Problems in Engineering is today a mature science with applications ...
اقرأ المزيد
The general assembly of IUTAM approved in August, 2002 at Cambridge University, UK, a proposal to hold an IUTAM symposium ...
اقرأ المزيد
This book contains the refereed and edited versions of papers presented at the IUTAM Symposium on Topological Design Optimization ...
اقرأ المزيد
The book gives a comprehensive introduction to basic commutative algebra, together with the related methods from homological ...
اقرأ المزيد
The 12th International Conference on Implementation and Application of - tomata CIAA 2007 washeld at the Czech Technical ...
اقرأ المزيد
This volume of Lecture Notes in Computer Science contains the revised versions of the papers presented at the 9th International ...
اقرأ المزيد
This volume of the Lecture Notes in Computer Science series contains the notes of the two invited lectures, the 26 papers ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 11th International Conference on Implementation and Application of ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the 13th International Conference on Implementation and ...
اقرأ المزيد
This book presents computational procedures for the stress integration of inelastic constitutive relations within the incremental-iterative ...
اقرأ المزيد
his volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference ...
اقرأ المزيد
The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
اقرأ المزيد
Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
اقرأ المزيد
The physical world is studied by means of mathematical models, which consist of differential, integral, and integro-differential ...
اقرأ المزيد