All current research issues in propositional and quantified Boolean formula satisfiability testing are covered, including ...
Continue readingTheory of Computation is a unique textbook that serves the dual purposes of covering core material in the foundations of ...
Continue readingTCC 2007, the Fourth Theory of Cryptography Conference, was held in Amsterdam, The Netherlands, from February 21 to 24, 2007, ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Continue readingReports on recent developments in the theory of evolutionary computation, or more generally the domain of randomized search ...
Continue readingThis book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...
Continue readingThe theory of nonlinear, complex systems has become by now a proven problem-solving approach in the natural sciences. In ...
Continue readingIn August 2005, a small but important conference took place at Chuo University in Tokyo, Japan. This international conference, ...
Continue readingTime-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. ...
Continue readingThis is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
Continue readingThe book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
Continue readingTo support application developers in the various tasks involved in this process, several different tools need to be at his ...
Continue readingThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Continue readingThis book presents computational paradigms describing lower- and higher-level cognitive functions, including mechanisms of ...
Continue readingThis book brings together scholars in the fields of management, public policy, regional studies, and organization theory ...
Continue readingThis book begins by providing appropriate background information and then follows with an in-depth study of a few key issues ...
Continue readingThe recent paradigmatic shift in biology towards a system view of biological phenomena requires a corresponding paradigmatic ...
Continue reading