This is the first comprehensive collection of problems in set theory. Most of classical set theory is covered, classical ...
Lire la suiteThe book covers topics ranging from elementary number theory (such as the unique factorization of integers or Fermat's little ...
Lire la suiteThis book gives a problem-solving approach to the difficult subject of analytic number theory. It is primarily aimed at graduate ...
Lire la suiteThe major characteristic pathological findings of pulmonary vascular remodelling are increased wall thickening of pulmonary ...
Lire la suiteProvides a comprehensive collection of practical problems on the design, analysis and verification of algorithms Includes ...
Lire la suiteThe book introduces the major activities of ICME-13, namely articles from the four plenary lecturers and two plenary panels, ...
Lire la suiteCovers numerical simulations with industrial civil engineering applications such as bridges and dams, cyclic loading, fluid ...
Lire la suiteBrings together papers presenting results covering areas of applied mathematics and scientific computing. This work offers ...
Lire la suiteThis textbook provides a comprehensive modeling, reformulation and optimization approach for solving production planning ...
Lire la suiteThis textbook provides a comprehensive modeling, reformulation and optimization approach for solving production planning ...
Lire la suiteThis book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
Lire la suiteThis book presents computer programming as a key method for solving mathematical problems. There are two versions of the ...
Lire la suiteThis book presents computer programming as a key method for solving mathematical problems. This second edition of the well-received ...
Lire la suiteThis book presents computer programming as a key method for solving mathematical problems. There are two versions of the ...
Lire la suiteThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lire la suiteThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
Lire la suiteThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Lire la suiteA recent trend in the field of Galois theory is to tie the previous theory of curve coverings (mostly of the Riemann sphere) ...
Lire la suiteMost of the papers included here address methodology and feature practical case studies, so that the book likely has broad ...
Lire la suiteIt focused on Aerospace, Electronic Industry, Chemical Technology, Life Sciences, Materials, Geophysics, Financial Mathematics ...
Lire la suite