The basic principles of Fuzzy Logic are discussed in detail with various solved examples. The different approaches and solutions to …
(Reprint of the 1967 edition)
This collection of selected contributions gives an account of recent developments in dynamic game theory and its applications, covering both …
Praise for the Second Edition:"This is quite a well-done book: very tightly organized, better-than-average exposition, and numerous examples, illustrations, and …
Understanding Molecular Simulation: From Algorithms to Applications explains the physics behind the "recipes" of molecular simulation for materials science. Computer …
Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and …
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what …
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical …
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction …
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer …
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction …
The Joy of Cryptography is an undergraduate textbook in cryptography. This book grew out of lecture notes I developed for …
The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible …
This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It …
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key …
The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) …
Electronic and algorithmic trading has become part of a mainstream response to buy-side traders' need to move large blocks of …
Will your organization be protected the day a quantum computer breaks encryption on the internet?Computer encryption is vital for protecting …
A bottom-up approach that enables readers to master and apply the latest techniques in state estimationThis book offers the best …
Learning and reasoning in large, structured, probabilistic worlds is at the heart of artificial intelligence. Markov decision processes have become …
The study of graph structure has advanced with great strides. This book unifies and synthesizes research over the last 25 …
Computability Theory: An Introduction to Recursion Theory, provides a concise, comprehensive, and authoritative introduction to contemporary computability theory, techniques, and …
In this volume one finds basic techniques from algebra and number theory (e.g. congruences, unique factorization domains, finite fields, quadratic …
Number theory is one of the oldest and most appealing areas of mathematics. Computation has always played a role in …
This book contains detailed lecture notes on four topics at the forefront of current research in computational mathematics. Each set …
This text is targeted at high school seniors who plan to enter business, science, and technology related fields, and working …
This title provides a comprehensive survey over the subject of probabilistic combinatorial optimization, discussing probabilistic versions of some of the …
This book provides a good opportunity for computer science practitioners and researchers to get in sync with the current state-of-the-art …
This book constitutes the refereed proceedings of the 6th European Conference on Evolutionary Computation in Combinatorial Optimization, EvoCOP 2006, held …
The editors and authors dedicate this book to Bernhard Korte on the occasion of his seventieth birthday. We, the editors, …