This book provides a taster for using symbolic analysis, graph theory, and set-oriented methods in a quest to understand ...
WeiterlesenFor this printing of R. Bowen's book, J.-R. Chazottes has retyped it in TeX for easier reading, thereby correcting typos ...
WeiterlesenConstitutes the refereed proceedings of the 5th International Workshop on Frontiers of Combining Systems, FroCoS 2005, held ...
WeiterlesenThis book constitutes the joint refereed proceedings of the 9th International Conference on Artificial Intelligence and Symbolic ...
WeiterlesenThis book constitutes the refereed proceedings of the Second International Conference on Language and Automata Theory and ...
WeiterlesenIn this book we describe the rule of law as the reign of persuasion rather than the reign of force, and democracy as the ...
WeiterlesenThis book deals with change, a notion little approached in the West. It draws on the Yi Jing, the classic of changes, as ...
WeiterlesenThis book presents the result of research and reflections of more than twenty years on the links that exist between Yi Jing ...
WeiterlesenThe ISAAC Group in Pseudo-diferential Operators (IGPDO) was formed at the Fourth ISAAC Congress held at York University in ...
WeiterlesenThis work brings together two streams in computer algebra: symbolic integration and summation on the one hand, and fast algorithmics ...
WeiterlesenThis book focuses on the efficient performance of mobile robots through the use of multi-hierarchical symbolic representations ...
WeiterlesenThis book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
WeiterlesenThis carefully edited volume contains state-of-the-art contributions in neural-symbolic integration, covering `loose' coupling ...
WeiterlesenProgramming Languages: An Active Learning Approach introduces students to three programming paradigms: object-oriented/imperative ...
WeiterlesenThis book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
WeiterlesenThe book describe the calculus of relations and similar algebraic formalisms as methodological and conceptual tools with ...
WeiterlesenThe book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...
WeiterlesenThe book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
WeiterlesenThis book describes how elite studies theoretically and methodologically construct their object, i.e. how particular conceptualizations ...
WeiterlesenThe book covers current research on all aspects of rewriting including typical areas of interest such as applications, foundational ...
Weiterlesen