![]() |
![]() |
Your cart is empty |
||
Books > Science & Mathematics > Mathematics > Combinatorics & graph theory
This is a supplementary volume to the major three-volume Handbook of Combinatorial Optimization set. It can also be regarded as a stand-alone volume presenting chapters dealing with various aspects of the subject in a self-contained way.
The goal of the research out of which this monograph grew, was to make annealing as much as possible a general purpose optimization routine. At first glance this may seem a straight-forward task, for the formulation of its concept suggests applicability to any combinatorial optimization problem. All that is needed to run annealing on such a problem is a unique representation for each configuration, a procedure for measuring its quality, and a neighbor relation. Much more is needed however for obtaining acceptable results consistently in a reasonably short time. It is even doubtful whether the problem can be formulated such that annealing becomes an adequate approach for all instances of an optimization problem. Questions such as what is the best formulation for a given instance, and how should the process be controlled, have to be answered. Although much progress has been made in the years after the introduction of the concept into the field of combinatorial optimization in 1981, some important questions still do not have a definitive answer. In this book the reader will find the foundations of annealing in a self-contained and consistent presentation. Although the physical analogue from which the con cept emanated is mentioned in the first chapter, all theory is developed within the framework of markov chains. To achieve a high degree of instance independence adaptive strategies are introduced."
This is not a traditional work on topological graph theory. No current graph or voltage graph adorns its pages. Its readers will not compute the genus (orientable or non-orientable) of a single non-planar graph. Their muscles will not flex under the strain of lifting walks from base graphs to derived graphs. What is it, then? It is an attempt to place topological graph theory on a purely combinatorial yet rigorous footing. The vehicle chosen for this purpose is the con cept of a 3-graph, which is a combinatorial generalisation of an imbedding. These properly edge-coloured cubic graphs are used to classify surfaces, to generalise the Jordan curve theorem, and to prove Mac Lane's characterisation of planar graphs. Thus they playa central role in this book, but it is not being suggested that they are necessarily the most effective tool in areas of topological graph theory not dealt with in this volume. Fruitful though 3-graphs have been for our investigations, other jewels must be examined with a different lens. The sole requirement for understanding the logical development in this book is some elementary knowledge of vector spaces over the field Z2 of residue classes modulo 2. Groups are occasionally mentioned, but no expertise in group theory is required. The treatment will be appreciated best, however, by readers acquainted with topology. A modicum of topology is required in order to comprehend much of the motivation we supply for some of the concepts introduced."
The starting point of this book is Sperner's theorem, which answers the question: What is the maximum possible size of a family of pairwise (with respect to inclusion) subsets of a finite set? This theorem stimulated the development of a fast growing theory dealing with external problems on finite sets and, more generally, on finite partially ordered sets. This book presents Sperner theory from a unified point of view, bringing combinatorial techniques together with methods from programming, linear algebra, Lie-algebra representations and eigenvalue methods, probability theory, and enumerative combinatorics. Researchers and graduate students in discrete mathematics, optimisation, algebra, probability theory, number theory, and geometry will find many powerful new methods arising from Sperner theory.
"Graphs and Matrices" provides a welcome addition to the rapidly expanding selection of literature in this field. As the title suggests, the book 's primary focus is graph theory, with an emphasis on topics relating to linear algebra and matrix theory. Information is presented at a relatively elementary level with the view of leading the student into further research. In the first part of the book matrix preliminaries are discussed and the basic properties of graph-associated matrices highlighted. Further topics include those of graph theory such as regular graphs and algebraic connectivity, Laplacian eigenvalues of threshold graphs, positive definite completion problem and graph-based matrix games. Whilst this book will be invaluable to researchers in graph theory, it may also be of benefit to a wider, cross-disciplinary readership.
From the reviews: "Do you know M.Padberg's Linear Optimization and Extensions? ...] Now here is the continuation of it, discussing the solutions of all its exercises and with detailed analysis of the applications mentioned. Tell your students about it. ...] For those who strive for good exercises and case studies for LP this is an excellent volume." Acta Scientiarum Mathematicarum
Here is an accessible, algorithmically oriented guide to some of the most interesting techniques of complexity theory. The book shows that simple algorithms are at the heart of complexity theory. The book is organized by technique rather than by topic. Each chapter focuses on one technique: what it is, and what results and applications it yields.
Many years of practical experience in teaching discrete mathematics form the basis of this text book. Part I contains problems on such topics as Boolean algebra, k-valued logics, graphs and networks, elements of coding theory, automata theory, algorithms theory, combinatorics, Boolean minimization and logical design. The exercises are preceded by ample theoretical background material. For further study the reader is referred to the extensive bibliography. Part II follows the same structure as Part I, and gives helpful hints and solutions. Audience: This book will be of great value to undergraduate students of discrete mathematics, whereas the more difficult exercises, which comprise about one-third of the material, will also appeal to postgraduates and researchers.
Written by one of the top experts in the fields of combinatorics and representation theory, this book distinguishes itself from the existing literature by its applications-oriented point of view. The second edition is extended, placing more emphasis on applications to the constructive theory of finite structures. Recent progress in this field, in particular in design and coding theory, is described.
An in-depth look at soft computing methods and their applications in the human sciences, such as the social and the behavioral sciences. Soft computing methods - including fuzzy systems, neural networks, evolutionary computing and probabilistic reasoning - are state-of-the-art methods in theory formation and model construction. The powerful application areas of these methods in the human sciences are demonstrated, including the replacement of statistical models by simpler numerical or linguistic soft computing models and the use of computer simulations with approximate and linguistic constituents. "Dr. Niskanen's work opens new vistas in application of soft
computing, fuzzy logic and fuzzy set theory to the human sciences.
This book is likely to be viewed in retrospect as a landmark in its
field"
The primary objective of this essential text is to emphasize the deep relations existing between the semiring and dio d structures with graphs and their combinatorial properties. It does so at the same time as demonstrating the modeling and problem-solving flexibility of these structures. In addition the book provides an extensive overview of the mathematical properties employed by "nonclassical" algebraic structures which either extend usual algebra or form a new branch of it.
Cryptography is one of the most active areas in current mathematics research and applications. This book focuses on cryptography along with two related areas: the study of probabilistic proof systems, and the theory of computational pseudorandomness. Following a common theme that explores the interplay between randomness and computation, the important notions in each field are covered, as well as novel ideas and insights.
Natural duality theory is one of the major growth areas within general algebra. This text provides a short path to the forefront of research in duality theory. It presents a coherent approach to new results in the area, as well as exposing open problems. Unary algebras play a special role throughout the text. Individual unary algebras are relatively simple and easy to work with. But as a class they have a rich and complex entanglement with dualisability. This combination of local simplicity and global complexity ensures that, for the study of natural duality theory, unary algebras are an excellent source of examples and counterexamples. A number of results appear here for the first time. In particular, the text ends with an appendix that provides a new and definitive approach to the concept of the rank of a finite algebra and its relationship with strong dualisability.
The need for a comprehensive survey-type exposition on formal languages and related mainstream areas of computer science has been evident for some years. In the early 1970s, when the book Formal Languages by the second mentioned editor appeared, it was still quite feasible to write a comprehensive book with that title and include also topics of current research interest. This would not be possible anymore. A standard-sized book on formal languages would either have to stay on a fairly low level or else be specialized and restricted to some narrow sector of the field. The setup becomes drastically different in a collection of contributions, where the best authorities in the world join forces, each of them concentrat ing on their own areas of specialization. The present three-volume Handbook constitutes such a unique collection. In these three volumes we present the current state of the art in formallanguage theory. We were most satisfied with the enthusiastic response given to our request for contributions by specialists representing various subfields. The need for a Handbook of Formal Languages was in many answers expressed in different ways: as an easily accessible his torical reference, a general source of information, an overall course-aid, and a compact collection of material for self-study. We are convinced that the final result will satisfy such various needs."
Computers have stretched the limits of what is possible in mathematics. More: they have given rise to new fields of mathematical study; the analysis of new and traditional algorithms, the creation of new paradigms for implementing computational methods, the viewing of old techniques from a concrete algorithmic vantage point, to name but a few. Computational Algebra and Number Theory lies at the lively intersection of computer science and mathematics. It highlights the surprising width and depth of the field through examples drawn from current activity, ranging from category theory, graph theory and combinatorics, to more classical computational areas, such as group theory and number theory. Many of the papers in the book provide a survey of their topic, as well as a description of present research. Throughout the variety of mathematical and computational fields represented, the emphasis is placed on the common principles and the methods employed. Audience: Students, experts, and those performing current research in any of the topics mentioned above.
SFCA/FPSAC (Series Formelles et Combinatoire Algebrique/Formal Power Se- ries and Algebraic Combinatorics) is a series of international conferences that are held annually since 1988, alternating between Europe and North America. They usually take place at the end of the academic year, between June and July depending on the local organizing constraints. SFCA/FPSAC has now become one of the most important annual inter- national meetings for the algebraic and bijective combinatorics community. The conference is indeed one of the key international exchange place of ideas between all researchers involved in this emerging exciting area. SFCA/FPSAC'OO is the 12th in the series. It will take place in Moscow (Russia) from June 26 to June 30, 2000. Previous SFCA/FPSAC conferences were organized in Lille (88), Paris (90), Bordeaux (91), Montreal (92), Florence (93), Rutgers (94), Marne-la-Vallee (95), Minneapolis (96), Vienna (97), Toronto (98) and Barcelona (99). SFCA/FPSAC'OO is co-organized by the Center of New Information Tech- nologies (CNIT) of Moscow State University, the Laboratoire d'Informatique AI- gorithmique : Fondements et Applications (LIAFA) of University Paris 7 and the Maison de l'Informatique et des Mathematiques Discretes (MIMD). The SFCA/FPSAC'OO conference covers all main areas of algebraic combi- natorics and bijective combinatorics (including asymptotic analysis, all sorts of enumeration, representation theory of classical groups and classical Lie algebras, symmetric functions, etc). A special stress was also put this year on combinato- rial and computer algebra.
The role of Hilbert polynomials in commutative and homological algebra as well as in algebraic geometry and combinatorics is well known. A similar role in differential algebra is played by the differential dimension polynomials. The notion of differential dimension polynomial was introduced by E. Kolchin in 1964 [KoI64]' but the problems and ideas that had led to this notion (and that are reflected in this book) have essentially more long history. Actually, one can say that the differential dimension polynomial describes in exact terms the freedom degree of a dynamic system as well as the number of arbitrary constants in the general solution of a system of algebraic differential equations. The first attempts of such description were made at the end of 19th century by Jacobi [Ja890] who estimated the number of algebraically independent constants in the general solution of a system of linear ordinary differential equations. Later on, Jacobi's results were extended to some cases of nonlinear systems, but in general case the problem of such estimation (that is known as the problem of Jacobi's bound) remains open. There are some generalization of the problem of Jacobi's bound to the partial differential equations, but the results in this area are just appearing. At the beginning of the 20th century algebraic methods in the theory of differen tial equations were actively developed by F. Riquier [RiqlO] and M.
This volume contains both invited lectures and contributed talks presented at the meeting on Total Positivity and its Applications held at the guest house of the University of Zaragoza in Jaca, Spain, during the week of September 26-30, 1994. There were present at the meeting almost fifty researchers from fourteen countries. Their interest in thesubject of Total Positivity made for a stimulating and fruitful exchange of scientific information. Interest to participate in the meeting exceeded our expectations. Regrettably, budgetary constraints forced us to restriet the number of attendees. Professor S. Karlin, of Stanford University, who planned to attend the meeting had to cancel his participation at the last moment. Nonetheless, his almost universal spiritual presence energized and inspired all of us in Jaca. More than anyone, he influenced the content, style and quality of the presentations given at the meeting. Every article in these Proceedings (except some by Karlin hirnself) references his influential treatise Total Positivity, Volume I, Stanford University Press, 1968. Since its appearance, this book has intrigued and inspired the minds of many researchers (one of us, in his formative years, read the galley proofs and the other of us first doubted its value but then later became its totally committed disciple). All of us present at the meeting encourage Professor Karlin to return to the task of completing the anxiously awaited Volume 11 of Total Positivity.
The last decade has seen two parallel developments, one in computer science, the other in mathematics, both dealing with the same kind of combinatorial structures: networks with strong symmetry properties or, in graph-theoretical language, vertex-transitive graphs, in particular their prototypical examples, Cayley graphs. In the design of large interconnection networks it was realised that many of the most fre quently used models for such networks are Cayley graphs of various well-known groups. This has spawned a considerable amount of activity in the study of the combinatorial properties of such graphs. A number of symposia and congresses (such as the bi-annual IWIN, starting in 1991) bear witness to the interest of the computer science community in this subject. On the mathematical side, and independently of any interest in applications, progress in group theory has made it possible to make a realistic attempt at a complete description of vertex-transitive graphs. The classification of the finite simple groups has played an important role in this respect."
A basic problem for the interconnection of communications media is to design interconnection networks for specific needs. For example, to minimize delay and to maximize reliability, networks are required that have minimum diameter and maximum connectivity under certain conditions. The book provides a recent solution to this problem. The subject of all five chapters is the interconnection problem. The first two chapters deal with Cayley digraphs which are candidates for networks of maximum connectivity with given degree and number of nodes. Chapter 3 addresses Bruijn digraphs, Kautz digraphs, and their generalizations, which are candidates for networks of minimum diameter and maximum connectivity with given degree and number of nodes. Chapter 4 studies double loop networks, and Chapter 5 considers broadcasting and the Gossiping problem. All the chapters emphasize the combinatorial aspects of network theory. Audience: A vital reference for graduate students and researchers in applied mathematics and theoretical computer science.
This book presents a comprehensive, encyclopedic approach to the subject of foliations, one of the major concepts of modern geometry and topology. It addresses graduate students and researchers and serves as a reference book for experts in the field.
This book provides an introduction to discrete mathematics. At the end of the book the reader should be able to answer counting questions such as: How many ways are there to stack n poker chips, each of which can be red, white, blue, or green, such that each red chip is adjacent to at least 1 green chip? The book can be used as a textbook for a semester course at the sophomore level. The first five chapters can also serve as a basis for a graduate course for in-service teachers.
X Kochendorffer, L.A. Kalu: lnin and their students in the 50s and 60s. Nowadays the most deeply developed is the theory of binary invariant relations and their combinatorial approximations. These combinatorial approximations arose repeatedly during this century under various names (Hecke algebras, centralizer rings, association schemes, coherent configurations, cellular rings, etc.-see the first paper of the collection for details) andin various branches of mathematics, both pure and applied. One of these approximations, the theory of cellular rings (cellular algebras), was developed at the end of the 60s by B. Yu. Weisfeiler and A.A. Leman in the course of the first serious attempt to study the complexity of the graph isomorphism problem, one of the central problems in the modern theory of combinatorial algorithms. At roughly the same time G.M. Adelson-Velskir, V.L. Arlazarov, I.A. Faradtev and their colleagues had developed a rather efficient tool for the constructive enumeration of combinatorial objects based on the branch and bound method. By means of this tool a number of "sports-like" results were obtained. Some of these results are still unsurpassed."
This volume contains a collection of papers in Analytic and Elementary Number Theory in memory of Professor Paul Erd s, one of the greatest mathematicians of this century. Written by many leading researchers, the papers deal with the most recent advances in a wide variety of topics, including arithmetical functions, prime numbers, the Riemann zeta function, probabilistic number theory, properties of integer sequences, modular forms, partitions, and q-series. Audience: Researchers and students of number theory, analysis, combinatorics and modular forms will find this volume to be stimulating.
It is not an exaggeration to view Professor Lee's book," Software Engineer ing with Computational Intelligence," or SECI for short, as a pioneering contribution to software engineering. Breaking with the tradition of treat ing uncertainty, imprecision, fuzziness and vagueness as issues of peripheral importance, SECI moves them much closer to the center of the stage. It is ob vious, though still not widely accepted, that this is where these issues should be, since the real world is much too complex and much too ill-defined to lend itself to categorical analysis in the Cartesian spirit. As its title suggests, SECI employs the machineries of computational intel ligence (CI) and, more or less equivalently, soft computing (SC), to deal with the foundations and principal issues in software engineering. Basically, CI and SC are consortia of methodologies which collectively provide a body of con cepts and techniques for conception, design, construction and utilization of intelligent systems. The principal constituents of CI and SC are fuzzy logic, neurocomputing, evolutionary computing, probabilistic computing, chaotic computing and machine learning. The leitmotif of CI and SC is that, in general, better performance can be achieved by employing the constituent methodologies of CI and SC in combination rat her than in a stand-alone mode. In what follows, I will take the liberty of focusing my attention on fuzzy logic and fuzzy set theory, and on their roles in software engineering. But first, a couple of points of semantics which are in need of clarification." |
![]() ![]() You may like...
Handbook of Research on Advanced…
Madhumangal Pal, Sovan Samanta, …
Hardcover
R7,398
Discovery Miles 73 980
Code Based Secret Sharing Schemes…
Patrick Sole, Selda Calkavur, …
Hardcover
R2,372
Discovery Miles 23 720
Advances in Mathematical Sciences - AWM…
Bahar Acu, Donatella Danielli, …
Hardcover
R1,597
Discovery Miles 15 970
|