This book provides a taster for using symbolic analysis, graph theory, and set-oriented methods in a quest to understand ...
Weiterlesen
For this printing of R. Bowen's book, J.-R. Chazottes has retyped it in TeX for easier reading, thereby correcting typos ...
Weiterlesen
Constitutes the refereed proceedings of the 5th International Workshop on Frontiers of Combining Systems, FroCoS 2005, held ...
Weiterlesen
This book constitutes the joint refereed proceedings of the 9th International Conference on Artificial Intelligence and Symbolic ...
Weiterlesen
This book constitutes the refereed proceedings of the Second International Conference on Language and Automata Theory and ...
Weiterlesen
In this book we describe the rule of law as the reign of persuasion rather than the reign of force, and democracy as the ...
Weiterlesen
This book deals with change, a notion little approached in the West. It draws on the Yi Jing, the classic of changes, as ...
Weiterlesen
This book presents the result of research and reflections of more than twenty years on the links that exist between Yi Jing ...
Weiterlesen
The ISAAC Group in Pseudo-diferential Operators (IGPDO) was formed at the Fourth ISAAC Congress held at York University in ...
Weiterlesen
This work brings together two streams in computer algebra: symbolic integration and summation on the one hand, and fast algorithmics ...
WeiterlesenThis book focuses on the efficient performance of mobile robots through the use of multi-hierarchical symbolic representations ...
Weiterlesen
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
WeiterlesenThis carefully edited volume contains state-of-the-art contributions in neural-symbolic integration, covering `loose' coupling ...
Weiterlesen
Programming Languages: An Active Learning Approach introduces students to three programming paradigms: object-oriented/imperative ...
Weiterlesen
This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
Weiterlesen
The book describe the calculus of relations and similar algebraic formalisms as methodological and conceptual tools with ...
Weiterlesen
The book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...
Weiterlesen
The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Weiterlesen
This book describes how elite studies theoretically and methodologically construct their object, i.e. how particular conceptualizations ...
Weiterlesen
The book covers current research on all aspects of rewriting including typical areas of interest such as applications, foundational ...
Weiterlesen