0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (5)
  • R250 - R500 (51)
  • R500+ (5,309)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Algorithms & procedures

Pattern Recognition on Oriented Matroids (Hardcover): Andrey O Matveev Pattern Recognition on Oriented Matroids (Hardcover)
Andrey O Matveev
R3,635 Discovery Miles 36 350 Ships in 10 - 15 working days

Pattern Recognition on Oriented Matroids covers a range of innovative problems in combinatorics, poset and graph theories, optimization, and number theory that constitute a far-reaching extension of the arsenal of committee methods in pattern recognition. The groundwork for the modern committee theory was laid in the mid-1960s, when it was shown that the familiar notion of solution to a feasible system of linear inequalities has ingenious analogues which can serve as collective solutions to infeasible systems. A hierarchy of dialects in the language of mathematics, for instance, open cones in the context of linear inequality systems, regions of hyperplane arrangements, and maximal covectors (or topes) of oriented matroids, provides an excellent opportunity to take a fresh look at the infeasible system of homogeneous strict linear inequalities - the standard working model for the contradictory two-class pattern recognition problem in its geometric setting. The universal language of oriented matroid theory considerably simplifies a structural and enumerative analysis of applied aspects of the infeasibility phenomenon. The present book is devoted to several selected topics in the emerging theory of pattern recognition on oriented matroids: the questions of existence and applicability of matroidal generalizations of committee decision rules and related graph-theoretic constructions to oriented matroids with very weak restrictions on their structural properties; a study (in which, in particular, interesting subsequences of the Farey sequence appear naturally) of the hierarchy of the corresponding tope committees; a description of the three-tope committees that are the most attractive approximation to the notion of solution to an infeasible system of linear constraints; an application of convexity in oriented matroids as well as blocker constructions in combinatorial optimization and in poset theory to enumerative problems on tope committees; an attempt to clarify how elementary changes (one-element reorientations) in an oriented matroid affect the family of its tope committees; a discrete Fourier analysis of the important family of critical tope committees through rank and distance relations in the tope poset and the tope graph; the characterization of a key combinatorial role played by the symmetric cycles in hypercube graphs. Contents Oriented Matroids, the Pattern Recognition Problem, and Tope Committees Boolean Intervals Dehn-Sommerville Type Relations Farey Subsequences Blocking Sets of Set Families, and Absolute Blocking Constructions in Posets Committees of Set Families, and Relative Blocking Constructions in Posets Layers of Tope Committees Three-Tope Committees Halfspaces, Convex Sets, and Tope Committees Tope Committees and Reorientations of Oriented Matroids Topes and Critical Committees Critical Committees and Distance Signals Symmetric Cycles in the Hypercube Graphs

Applications of Sliding Mode Control (Hardcover, 1st ed. 2017): Nabil Derbel, Jawhar Ghommam, Quanmin Zhu Applications of Sliding Mode Control (Hardcover, 1st ed. 2017)
Nabil Derbel, Jawhar Ghommam, Quanmin Zhu
R4,769 Discovery Miles 47 690 Ships in 10 - 15 working days

This book presents essential studies and applications in the context of sliding mode control, highlighting the latest findings from interdisciplinary theoretical studies, ranging from computational algorithm development to representative applications. Readers will learn how to easily tailor the techniques to accommodate their ad hoc applications. To make the content as accessible as possible, the book employs a clear route in each paper, moving from background to motivation, to quantitative development (equations), and lastly to case studies/illustrations/tutorials (simulations, experiences, curves, tables, etc.). Though primarily intended for graduate students, professors and researchers from related fields, the book will also benefit engineers and scientists from industry.

Evolutionary Algorithms, Swarm Dynamics and Complex Networks - Methodology, Perspectives and Implementation (Hardcover, 1st ed.... Evolutionary Algorithms, Swarm Dynamics and Complex Networks - Methodology, Perspectives and Implementation (Hardcover, 1st ed. 2018)
Ivan Zelinka, Guanrong Chen
R4,511 R3,441 Discovery Miles 34 410 Save R1,070 (24%) Ships in 10 - 15 working days

Evolutionary algorithms constitute a class of well-known algorithms, which are designed based on the Darwinian theory of evolution and Mendelian theory of heritage. They are partly based on random and partly based on deterministic principles. Due to this nature, it is challenging to predict and control its performance in solving complex nonlinear problems. Recently, the study of evolutionary dynamics is focused not only on the traditional investigations but also on the understanding and analyzing new principles, with the intention of controlling and utilizing their properties and performances toward more effective real-world applications. In this book, based on many years of intensive research of the authors, is proposing novel ideas about advancing evolutionary dynamics towards new phenomena including many new topics, even the dynamics of equivalent social networks. In fact, it includes more advanced complex networks and incorporates them with the CMLs (coupled map lattices), which are usually used for spatiotemporal complex systems simulation and analysis, based on the observation that chaos in CML can be controlled, so does evolution dynamics. All the chapter authors are, to the best of our knowledge, originators of the ideas mentioned above and researchers on evolutionary algorithms and chaotic dynamics as well as complex networks, who will provide benefits to the readers regarding modern scientific research on related subjects.

Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016): Yulong Zou, Jia Zhu Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016)
Yulong Zou, Jia Zhu
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.

Logics in Computer Science - A Study on Extensions of Temporal and Strategic Logics (Hardcover, 2013 ed.): Fabio Mogavero Logics in Computer Science - A Study on Extensions of Temporal and Strategic Logics (Hardcover, 2013 ed.)
Fabio Mogavero
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

In this monograph we introduce and examine four new temporal logic formalisms that can be used as specification languages for the automated verification of the reliability of hardware and software designs with respect to a desired behavior. The work is organized in two parts. In the first part two logics for computations, the graded computation tree logic and the computation tree logic with minimal model quantifiers are discussed. These have proved to be useful in describing correct executions of monolithic closed systems. The second part focuses on logics for strategies, strategy logic and memoryful alternating-time temporal logic, which have been successfully applied to formalize several properties of interactive plays in multi-entities systems modeled as multi-agent games.

Symmetric Cryptographic Protocols (Hardcover, 2014 ed.): Mahalingam Ramkumar Symmetric Cryptographic Protocols (Hardcover, 2014 ed.)
Mahalingam Ramkumar
R4,151 R3,350 Discovery Miles 33 500 Save R801 (19%) Ships in 10 - 15 working days

This book focuseson protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees."

Computer Solution of Large Linear Systems, Volume 28 (Hardcover): Gerard Meurant Computer Solution of Large Linear Systems, Volume 28 (Hardcover)
Gerard Meurant
R3,898 Discovery Miles 38 980 Ships in 10 - 15 working days

Hardbound. This book deals with numerical methods for solving large sparse linear systems of equations, particularly those arising from the discretization of partial differential equations. It covers both direct and iterative methods. Direct methods which are considered are variants of Gaussian elimination and fast solvers for separable partial differential equations in rectangular domains. The book reviews the classical iterative methods like Jacobi, Gauss-Seidel and alternating directions algorithms. A particular emphasis is put on the conjugate gradient as well as conjugate gradient -like methods for non symmetric problems. Most efficient preconditioners used to speed up convergence are studied. A chapter is devoted to the multigrid method and the book ends with domain decomposition algorithms that are well suited for solving linear systems on parallel computers.

Genetic Algorithms in Elixir (Paperback): Sean Moriarity Genetic Algorithms in Elixir (Paperback)
Sean Moriarity
R797 Discovery Miles 7 970 Ships in 10 - 15 working days

From finance to artificial intelligence, genetic algorithms are a powerful tool with a wide array of applications. But you don't need an exotic new language or framework to get started; you can learn about genetic algorithms in a language you're already familiar with. Join us for an in-depth look at the algorithms, techniques, and methods that go into writing a genetic algorithm. From introductory problems to real-world applications, you'll learn the underlying principles of problem solving using genetic algorithms. Evolutionary algorithms are a unique and often overlooked subset of machine learning and artificial intelligence. Because of this, most of the available resources are outdated or too academic in nature, and none of them are made with Elixir programmers in mind. Start from the ground up with genetic algorithms in a language you are familiar with. Discover the power of genetic algorithms through simple solutions to challenging problems. Use Elixir features to write genetic algorithms that are concise and idiomatic. Learn the complete life cycle of solving a problem using genetic algorithms. Understand the different techniques and fine-tuning required to solve a wide array of problems. Plan, test, analyze, and visualize your genetic algorithms with real-world applications. Open your eyes to a unique and powerful field - without having to learn a new language or framework. What You Need: You'll need a macOS, Windows, or Linux distribution with an up-to-date Elixir installation.

Statistical Applications from Clinical Trials and Personalized Medicine to Finance and Business Analytics - Selected Papers... Statistical Applications from Clinical Trials and Personalized Medicine to Finance and Business Analytics - Selected Papers from the 2015 ICSA/Graybill Applied Statistics Symposium, Colorado State University, Fort Collins (Hardcover, 1st ed. 2016)
Jianchang Lin, Bushi Wang, Xiaowen Hu, Kun Chen, Ray Liu
R5,901 Discovery Miles 59 010 Ships in 18 - 22 working days

The papers in this volume represent a broad, applied swath of advanced contributions to the 2015 ICSA/Graybill Applied Statistics Symposium of the International Chinese Statistical Association, held at Colorado State University in Fort Collins. The contributions cover topics that range from statistical applications in business and finance to applications in clinical trials and biomarker analysis. Each papers was peer-reviewed by at least two referees and also by an editor. The conference was attended by over 400 participants from academia, industry, and government agencies around the world, including from North America, Asia, and Europe.

New Data Structures and Algorithms for Logic Synthesis and Verification (Hardcover, 1st ed. 2017): Luca Gaetano Amaru New Data Structures and Algorithms for Logic Synthesis and Verification (Hardcover, 1st ed. 2017)
Luca Gaetano Amaru
R3,565 R1,812 Discovery Miles 18 120 Save R1,753 (49%) Ships in 10 - 15 working days

This book introduces new logic primitives for electronic design automation tools. The author approaches fundamental EDA problems from a different, unconventional perspective, in order to demonstrate the key role of rethinking EDA solutions in overcoming technological limitations of present and future technologies. The author discusses techniques that improve the efficiency of logic representation, manipulation and optimization tasks by taking advantage of majority and biconditional logic primitives. Readers will be enabled to accelerate formal methods by studying core properties of logic circuits and developing new frameworks for logic reasoning engines.

Reduced Order Methods for Modeling and Computational Reduction (Hardcover, 2014 ed.): Alfio Quarteroni, Gianluigi Rozza Reduced Order Methods for Modeling and Computational Reduction (Hardcover, 2014 ed.)
Alfio Quarteroni, Gianluigi Rozza
R3,453 Discovery Miles 34 530 Ships in 10 - 15 working days

This monograph addresses the state of the art of reduced order methods for modeling and computational reduction of complex parametrized systems, governed by ordinary and/or partial differential equations, with a special emphasis on real time computing techniques and applications in computational mechanics, bioengineering and computer graphics.

Several topics are covered, including: design, optimization, and control theory in real-time with applications in engineering; data assimilation, geometry registration, and parameter estimation with special attention to real-time computing in biomedical engineering and computational physics; real-time visualization of physics-based simulations in computer science; the treatment of high-dimensional problems in state space, physical space, or parameter space; the interactions between different model reduction and dimensionality reduction approaches; the development of general error estimation frameworks which take into account both model and discretization effects.

This book is primarily addressed to computational scientists interested in computational reduction techniques for large scale differential problems.

Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover): Gulshan Shrivastava, Deepak... Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover)
Gulshan Shrivastava, Deepak Gupta, Kavita Sharma
R4,522 Discovery Miles 45 220 Ships in 10 - 15 working days

This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.

A Survey on Coordinated Power Management in Multi-Tenant Data Centers (Hardcover, 1st ed. 2018): Thant Zin Oo, Nguyen H. Tran,... A Survey on Coordinated Power Management in Multi-Tenant Data Centers (Hardcover, 1st ed. 2018)
Thant Zin Oo, Nguyen H. Tran, Shaolei Ren, Choong Seon Hong
R3,281 Discovery Miles 32 810 Ships in 10 - 15 working days

This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution.

Proceedings of ELM-2015 Volume 2 - Theory, Algorithms and Applications (II) (Hardcover, 1st ed. 2016): Jiuwen Cao, Kezhi Mao,... Proceedings of ELM-2015 Volume 2 - Theory, Algorithms and Applications (II) (Hardcover, 1st ed. 2016)
Jiuwen Cao, Kezhi Mao, Jonathan Wu, Amaury Lendasse
R6,550 Discovery Miles 65 500 Ships in 10 - 15 working days

This book contains some selected papers from the International Conference on Extreme Learning Machine 2015, which was held in Hangzhou, China, December 15-17, 2015. This conference brought together researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the Extreme Learning Machine (ELM) technique and brain learning. This book covers theories, algorithms ad applications of ELM. It gives readers a glance of the most recent advances of ELM.

Design and Analysis of Algorithms (Hardcover, St ed.): Venugopal Temberveni, Sammulal Porika Design and Analysis of Algorithms (Hardcover, St ed.)
Venugopal Temberveni, Sammulal Porika
R1,716 R1,474 Discovery Miles 14 740 Save R242 (14%) Ships in 18 - 22 working days
Concurrency Control in Distributed System Using Mutual Exclusion (Hardcover, 1st ed. 2018): Sukhendu Kanrar, Nabendu Chaki,... Concurrency Control in Distributed System Using Mutual Exclusion (Hardcover, 1st ed. 2018)
Sukhendu Kanrar, Nabendu Chaki, Samiran Chattopadhyay
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

The book presents various state-of-the-art approaches for process synchronization in a distributed environment. The range of algorithms discussed in the book starts from token based mutual exclusion algorithms that work on tree based topology. Then there are interesting solutions for more flexible logical topology like a directed graph, with or without cycle. In a completely different approach, one of the chapters presents two recent voting-based DME algorithms. All DME algorithms presented in the book aim to ensure fairness in terms of first come first serve (FCFS) order among equal priority processes. At the same time, the solutions consider the priority of the requesting processes and allocate resource for the earliest request when no such request from a higher priority process is pending.

Iterative Learning Control - An Optimization Paradigm (Hardcover, 1st ed. 2016): David H. Owens Iterative Learning Control - An Optimization Paradigm (Hardcover, 1st ed. 2016)
David H. Owens
R4,567 Discovery Miles 45 670 Ships in 10 - 15 working days

This book develops a coherent and quite general theoretical approach to algorithm design for iterative learning control based on the use of operator representations and quadratic optimization concepts including the related ideas of inverse model control and gradient-based design. Using detailed examples taken from linear, discrete and continuous-time systems, the author gives the reader access to theories based on either signal or parameter optimization. Although the two approaches are shown to be related in a formal mathematical sense, the text presents them separately as their relevant algorithm design issues are distinct and give rise to different performance capabilities. Together with algorithm design, the text demonstrates the underlying robustness of the paradigm and also includes new control laws that are capable of incorporating input and output constraints, enable the algorithm to reconfigure systematically in order to meet the requirements of different reference and auxiliary signals and also to support new properties such as spectral annihilation. Iterative Learning Control will interest academics and graduate students working in control who will find it a useful reference to the current status of a powerful and increasingly popular method of control. The depth of background theory and links to practical systems will be of use to engineers responsible for precision repetitive processes.

Parallel Architectures and Bioinspired Algorithms (Hardcover, 2012 ed.): Francisco Fernandez De Vega, Jose Ignacio Hidalgo... Parallel Architectures and Bioinspired Algorithms (Hardcover, 2012 ed.)
Francisco Fernandez De Vega, Jose Ignacio Hidalgo Perez, Juan Lanchares
R4,040 Discovery Miles 40 400 Ships in 18 - 22 working days

This monograph presents examples of best practices when combining bioinspired algorithms with parallel architectures. The book includes recent work by leading researchers in the field and offers a map with the main paths already explored and new ways towards the future. Parallel Architectures and Bioinspired Algorithms will be of value to both specialists in Bioinspired Algorithms, Parallel and Distributed Computing, as well as computer science students trying to understand the present and the future of Parallel Architectures and Bioinspired Algorithms.

Computational Intelligence and Optimization Methods for Control Engineering (Hardcover, 1st ed. 2019): Maude Josee Blondin,... Computational Intelligence and Optimization Methods for Control Engineering (Hardcover, 1st ed. 2019)
Maude Josee Blondin, Panos M. Pardalos, Javier Sanchis Saez
R2,485 R1,971 Discovery Miles 19 710 Save R514 (21%) Ships in 10 - 15 working days

This volume presents some recent and principal developments related to computational intelligence and optimization methods in control. Theoretical aspects and practical applications of control engineering are covered by 14 self-contained contributions. Additional gems include the discussion of future directions and research perspectives designed to add to the reader's understanding of both the challenges faced in control engineering and the insights into the developing of new techniques. With the knowledge obtained, readers are encouraged to determine the appropriate control method for specific applications.

GPS - Theory, Algorithms and Applications (Hardcover, 3rd ed. 2016): Guochang Xu, Yan Xu GPS - Theory, Algorithms and Applications (Hardcover, 3rd ed. 2016)
Guochang Xu, Yan Xu
R5,251 Discovery Miles 52 510 Ships in 10 - 15 working days

This reference and handbook describes theory, algorithms and applications of the Global Positioning System (GPS/Glonass/Galileo/Compass). It is primarily based on source-code descriptions of the KSGsoft program developed at the GFZ in Potsdam. The theory and algorithms are extended and verified for a new development of a multi-functional GPS/Galileo software. Besides the concepts such as the unified GPS data processing method, the diagonalisation algorithm, the adaptive Kalman filter, the general ambiguity search criteria, and the algebraic solution of variation equation reported in the first edition, the equivalence theorem of the GPS algorithms, the independent parameterisation method, and the alternative solar radiation model reported in the second edition, the modernisation of the GNSS system, the new development of the theory and algorithms, and research in broad applications are supplemented in this new edition. Mathematically rigorous, the book begins with the introduction, the basics of coordinate and time systems and satellite orbits, as well as GPS observables, and deals with topics such as physical influences, observation equations and their parameterisation, adjustment and filtering, ambiguity resolution, software development and data processing and the determination of perturbed orbits.

Computational Methods for Representations of Groups and Algebras - Euroconference in Essen (Germany), April 1-5, 1997... Computational Methods for Representations of Groups and Algebras - Euroconference in Essen (Germany), April 1-5, 1997 (Hardcover)
P. Draexler, Etc
R2,459 Discovery Miles 24 590 Ships in 10 - 15 working days

This book presents material from 3 survey lectures and 14 additional invited lectures given at the Euroconference "Computational Methods for Representations of Groups and Algebras" held at Essen University in April 1997. The purpose of this meeting was to provide a survey of general theoretical and computational methods and recent advances in the representation theory of groups and algebras. The foundations of these research areas were laid in survey articles by P. DrAxler and R. NArenberg on "Classification problems in the representation theory of finite-dimensional algebras," R. A. Wilson on "Construction of finite matrix groups" and E. Green on "Noncommutative GrAbner bases, and projective resolutions." Furthermore, new applications of the computational methods in linear algebra to the revision of the classification of finite simple sporadic groups are presented. Computational tools (including high-performance computations on supercomputers) have become increasingly important for classification problems. They are also inevitable for the construction of projective resolutions of finitely generated modules over finite-dimensional algebras and the study of group cohomology and rings of invariants. A major part of this book is devoted to a survey of algorithms for computing special examples in the study of Grothendieck groups, quadratic forms and derived categories of finite-dimensional algebras. Open questions on Lie algebras, Bruhat orders, Coxeter groups and Kazhdan Lusztig polynomials are investigated with the aid of computer programs. The contents of this book provide an overview on the present state of the art. Therefore it will be very useful for graduate students and researchers in mathematics, computer science and physics.

Random Walks and Diffusions on Graphs and Databases - An Introduction (Hardcover, Edition.): Philipp Blanchard, Dimitri... Random Walks and Diffusions on Graphs and Databases - An Introduction (Hardcover, Edition.)
Philipp Blanchard, Dimitri Volchenkov
R2,676 Discovery Miles 26 760 Ships in 18 - 22 working days

Most networks and databases that humans have to deal with contain large, albeit finite number of units. Their structure, for maintaining functional consistency of the components, is essentially not random and calls for a precise quantitative description of relations between nodes (or data units) and all network components. This book is an introduction, for both graduate students and newcomers to the field, to the theory of graphs and random walks on such graphs. The methods based on random walks and diffusions for exploring the structure of finite connected graphs and databases are reviewed (Markov chain analysis). This provides the necessary basis for consistently discussing a number of applications such diverse as electric resistance networks, estimation of land prices, urban planning, linguistic databases, music, and gene expression regulatory networks.

Introduction to Security Reduction (Hardcover, 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Hardcover, 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,891 Discovery Miles 48 910 Ships in 18 - 22 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Functional Safety for Road Vehicles - New Challenges and Solutions for E-mobility and Automated Driving (Hardcover, 1st ed.... Functional Safety for Road Vehicles - New Challenges and Solutions for E-mobility and Automated Driving (Hardcover, 1st ed. 2016)
Hans-Leo Ross
R3,711 Discovery Miles 37 110 Ships in 10 - 15 working days

This book highlights the current challenges for engineers involved in product development and the associated changes in procedure they make necessary. Methods for systematically analyzing the requirements for safety and security mechanisms are described using examples of how they are implemented in software and hardware, and how their effectiveness can be demonstrated in terms of functional and design safety are discussed. Given today's new E-mobility and automated driving approaches, new challenges are arising and further issues concerning "Road Vehicle Safety" and "Road Traffic Safety" have to be resolved. To address the growing complexity of vehicle functions, as well as the increasing need to accommodate interdisciplinary project teams, previous development approaches now have to be reconsidered, and system engineering approaches and proven management systems need to be supplemented or wholly redefined. The book presents a continuous system development process, starting with the basic requirements of quality management and continuing until the release of a vehicle and its components for road use. Attention is paid to the necessary definition of the respective development item, the threat-, hazard- and risk analysis, safety concepts and their relation to architecture development, while the book also addresses the aspects of product realization in mechanics, electronics and software as well as for subsequent testing, verification, integration and validation phases. In November 2011, requirements for the Functional Safety (FuSa) of road vehicles were first published in ISO 26262. The processes and methods described here are intended to show developers how vehicle systems can be implemented according to ISO 26262, so that their compliance with the relevant standards can be demonstrated as part of a safety case, including audits, reviews and assessments.

Distributed and Sequential Algorithms for Bioinformatics (Hardcover, 1st ed. 2015): Kayhan Erciyes Distributed and Sequential Algorithms for Bioinformatics (Hardcover, 1st ed. 2015)
Kayhan Erciyes
R2,541 R2,045 Discovery Miles 20 450 Save R496 (20%) Ships in 10 - 15 working days

This unique textbook/reference presents unified coverage of bioinformatics topics relating to both biological sequences and biological networks, providing an in-depth analysis of cutting-edge distributed algorithms, as well as of relevant sequential algorithms. In addition to introducing the latest algorithms in this area, more than fifteen new distributed algorithms are also proposed. Topics and features: reviews a range of open challenges in biological sequences and networks; describes in detail both sequential and parallel/distributed algorithms for each problem; suggests approaches for distributed algorithms as possible extensions to sequential algorithms, when the distributed algorithms for the topic are scarce; proposes a number of new distributed algorithms in each chapter, to serve as potential starting points for further research; concludes each chapter with self-test exercises, a summary of the key points, a comparison of the algorithms described, and a literature review.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Gamma Solution - An Application of…
James R Warren Hardcover R1,232 R1,048 Discovery Miles 10 480
Introduction to Chemical Engineering…
Henry C. Foley Paperback R3,120 Discovery Miles 31 200
Deep Learning - Research and…
Siddhartha Bhattacharyya, Vaclav Snasel, … Hardcover R3,854 Discovery Miles 38 540
Formation Methods, Models, and Hardware…
Stepan Bilan Hardcover R4,437 Discovery Miles 44 370
Algorithms in Bioinformatics - Theory…
PA Gagniuc Hardcover R3,174 Discovery Miles 31 740
Reachable Sets of Dynamic Systems…
Stanislaw Raczynski Paperback R3,927 Discovery Miles 39 270
Genetic Algorithms with Python
Clinton Sheppard Hardcover R856 R812 Discovery Miles 8 120
The Application of Ant Colony…
Ali Soofastaei Hardcover R2,553 Discovery Miles 25 530
The Physics of Computing
Marilyn Wolf Paperback R1,645 Discovery Miles 16 450
MATLAB Applications in Engineering
Constantin Volosencu Hardcover R3,055 Discovery Miles 30 550

 

Partners