This book provides a taster for using symbolic analysis, graph theory, and set-oriented methods in a quest to understand ...
Continue readingFor this printing of R. Bowen's book, J.-R. Chazottes has retyped it in TeX for easier reading, thereby correcting typos ...
Continue readingConstitutes the refereed proceedings of the 5th International Workshop on Frontiers of Combining Systems, FroCoS 2005, held ...
Continue readingThis book constitutes the joint refereed proceedings of the 9th International Conference on Artificial Intelligence and Symbolic ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference on Language and Automata Theory and ...
Continue readingIn this book we describe the rule of law as the reign of persuasion rather than the reign of force, and democracy as the ...
Continue readingThis book deals with change, a notion little approached in the West. It draws on the Yi Jing, the classic of changes, as ...
Continue readingThis book presents the result of research and reflections of more than twenty years on the links that exist between Yi Jing ...
Continue readingThe ISAAC Group in Pseudo-diferential Operators (IGPDO) was formed at the Fourth ISAAC Congress held at York University in ...
Continue readingThis work brings together two streams in computer algebra: symbolic integration and summation on the one hand, and fast algorithmics ...
Continue readingThis book focuses on the efficient performance of mobile robots through the use of multi-hierarchical symbolic representations ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
Continue readingThis carefully edited volume contains state-of-the-art contributions in neural-symbolic integration, covering `loose' coupling ...
Continue readingProgramming Languages: An Active Learning Approach introduces students to three programming paradigms: object-oriented/imperative ...
Continue readingThis book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
Continue readingThe book describe the calculus of relations and similar algebraic formalisms as methodological and conceptual tools with ...
Continue readingThe book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...
Continue readingThe book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Continue readingThis book describes how elite studies theoretically and methodologically construct their object, i.e. how particular conceptualizations ...
Continue readingThe book covers current research on all aspects of rewriting including typical areas of interest such as applications, foundational ...
Continue reading