This book will serve as a foundation for a variety of useful applications of graph theory to computer vision, pattern …
Scanned From HardCover Version From University of Tehran Library<\h2> Designed as the bridge to cross the widening gap between mathematics …
Recent advances in computing and algorithms make it easier to do many classical problems in algebra. Suitable for graduate students, …
This book constitutes the refereed proceedings of the 14th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2007, held …
This book constitutes the refereed proceedings of the 12th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2005, held …
This compact textbook consists of lecture notes given as a fourth-year undergraduate course of the mathematics degree at the Universitat …
This comprehensive textbook on combinatorial optimization puts special emphasis on theoretical results and algorithms with provably good performance, in contrast …
Popular computer algebra systems such as Maple, Macsyma, Mathematica, and REDUCE are now basic tools on most computers. Efficient algorithms …
Cryptography plays a crucial role in many aspects of today's world, from internet banking and e-commerce to e-mail and web-based …
Mathematics plays a key role in computer science, some researchers would consider computers as nothing but the physical embodiment of …
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario …
Discrete mathematics is quickly becoming one of the most important areas of mathematical research, with applications to cryptography, linear programming, …
The book `Fundamental Approach to Discrete Mathematics` is a required part of pursuing a computer science degree at most universities. …
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic …
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what …
Developers tasked with security problems are often not cryptographers themselves. They are bright people who, with careful guidance, can implement …
Foundations of Cryptography surveys the main paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic …
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters …
For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security …
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key …
This book does not contain any useful information. It contains a lot of bar charts and brochure-like market descriptions that …
Scientific Computing presents a broad overview of numerical methods and software for students and professionals in computational-oriented disciplines who need …
In a probabilistic model, a rare event is an event with a very small probability of occurrence. The forecasting of …
A unified view of metaheuristicsThis book provides a complete background on metaheuristics and shows readers how to design and implement …
The mathematics employed by genetic algorithms (GAs)are among the most exciting discoveries of the last few decades. But what exactly …
This book gathers together a set of chapters covering recent development in optimization methods that are inspired by nature. The …
Computational Intelligence: An Introduction, Second Edition offers an in-depth exploration into the adaptive mechanisms that enable intelligent behaviour in complex …