This is the first comprehensive collection of problems in set theory. Most of classical set theory is covered, classical ...
اقرأ المزيد
The book covers topics ranging from elementary number theory (such as the unique factorization of integers or Fermat's little ...
اقرأ المزيد
This book gives a problem-solving approach to the difficult subject of analytic number theory. It is primarily aimed at graduate ...
اقرأ المزيد
The major characteristic pathological findings of pulmonary vascular remodelling are increased wall thickening of pulmonary ...
اقرأ المزيد
Provides a comprehensive collection of practical problems on the design, analysis and verification of algorithms Includes ...
اقرأ المزيد
The book introduces the major activities of ICME-13, namely articles from the four plenary lecturers and two plenary panels, ...
اقرأ المزيد
Covers numerical simulations with industrial civil engineering applications such as bridges and dams, cyclic loading, fluid ...
اقرأ المزيد
Brings together papers presenting results covering areas of applied mathematics and scientific computing. This work offers ...
اقرأ المزيد
This textbook provides a comprehensive modeling, reformulation and optimization approach for solving production planning ...
اقرأ المزيد
This textbook provides a comprehensive modeling, reformulation and optimization approach for solving production planning ...
اقرأ المزيد
This book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
اقرأ المزيدThis book presents computer programming as a key method for solving mathematical problems. There are two versions of the ...
اقرأ المزيد
This book presents computer programming as a key method for solving mathematical problems. This second edition of the well-received ...
اقرأ المزيدThis book presents computer programming as a key method for solving mathematical problems. There are two versions of the ...
اقرأ المزيد
The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
اقرأ المزيد
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيد
A recent trend in the field of Galois theory is to tie the previous theory of curve coverings (mostly of the Riemann sphere) ...
اقرأ المزيد
Most of the papers included here address methodology and feature practical case studies, so that the book likely has broad ...
اقرأ المزيد
It focused on Aerospace, Electronic Industry, Chemical Technology, Life Sciences, Materials, Geophysics, Financial Mathematics ...
اقرأ المزيد