Theory of Computation is a unique textbook that serves the dual purposes of covering core material in the foundations of ...
Continue readingTCC 2007, the Fourth Theory of Cryptography Conference, was held in Amsterdam, The Netherlands, from February 21 to 24, 2007, ...
Continue readingThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Continue readingReports on recent developments in the theory of evolutionary computation, or more generally the domain of randomized search ...
Continue readingA new calculation method is presented for heat transfer in coupled convective-conductive fluid-wall systems under periodical ...
Continue readingThis book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...
Continue readingThis book discusses mathematical models that are based on the concepts of classical equilibrium thermodynamics. They are ...
Continue readingIntense global competition in manufacturing has compelled manufacturers to incorporate repetitive processing and automation ...
Continue readingThyroid Cytopathology uses a simple algorithmic approach to the diagnosis of thyroid fine needle aspirations (FNA). This ...
Continue readingTime-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. ...
Continue readingCoverage includes software verification, probabilistic model checking and markov chains, automata-based model checking, security, ...
Continue readingThis is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
Continue readingThis year it comprised ?ve conferences (CC, ESOP, FASE, FOSSACS, TACAS), 17 satellite workshops (AVIS, BYTECODE, CEES, CLASE, ...
Continue readingThis book constitutes the refereed proceedings of the 12th International Conference on Tools and Algorithms for the Construction ...
Continue readingThe book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
Continue readingIn this book, an international team of highly qualified experts treats important topics in acoustic echo and noise control ...
Continue readingThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Continue readingLeading experts have contributed survey and research papers in the areas of Algebraic Combinatorics, Combinatorial Number ...
Continue readingThis is a nicely edited volume on Estimation of Distribution Algorithms (EDAs) by leading researchers on this important topic.
Continue readingThis research monograph proposes a unified, cross-fertilizing approach for knowledge-representation and modeling based on ...
Continue reading