0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (5)
  • R250 - R500 (66)
  • R500+ (5,398)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Contemporary Evolution Strategies (Paperback, Softcover reprint of the original 1st ed. 2013): Thomas Back, Christophe... Contemporary Evolution Strategies (Paperback, Softcover reprint of the original 1st ed. 2013)
Thomas Back, Christophe Foussette, Peter Krause
R1,522 Discovery Miles 15 220 Ships in 10 - 15 working days

This book surveys key algorithm developments between 1990 and 2012, with brief descriptions, a unified pseudocode for each algorithm and downloadable program code. Provides a taxonomy to clarify similarities and differences as well as historical relationships.

Logical Foundations of Mathematics and Computational Complexity - A Gentle Introduction (Paperback, Softcover reprint of the... Logical Foundations of Mathematics and Computational Complexity - A Gentle Introduction (Paperback, Softcover reprint of the original 1st ed. 2013)
Pavel Pudlak
R5,280 Discovery Miles 52 800 Ships in 10 - 15 working days

The two main themes of this book, logic and complexity, are both essential for understanding the main problems about the foundations of mathematics. Logical Foundations of Mathematics and Computational Complexity covers a broad spectrum of results in logic and set theory that are relevant to the foundations, as well as the results in computational complexity and the interdisciplinary area of proof complexity. The author presents his ideas on how these areas are connected, what are the most fundamental problems and how they should be approached. In particular, he argues that complexity is as important for foundations as are the more traditional concepts of computability and provability. Emphasis is on explaining the essence of concepts and the ideas of proofs, rather than presenting precise formal statements and full proofs. Each section starts with concepts and results easily explained, and gradually proceeds to more difficult ones. The notes after each section present some formal definitions, theorems and proofs. Logical Foundations of Mathematics and Computational Complexity is aimed at graduate students of all fields of mathematics who are interested in logic, complexity and foundations. It will also be of interest for both physicists and philosophers who are curious to learn the basics of logic and complexity theory.

Fuzzy Logic for Image Processing - A Gentle Introduction Using Java (Paperback, 1st ed. 2017): Laura Caponetti, Giovanna... Fuzzy Logic for Image Processing - A Gentle Introduction Using Java (Paperback, 1st ed. 2017)
Laura Caponetti, Giovanna Castellano
R2,029 Discovery Miles 20 290 Ships in 10 - 15 working days

This book provides an introduction to fuzzy logic approaches useful in image processing. The authors start by introducing image processing tasks of low and medium level such as thresholding, enhancement, edge detection, morphological filters, and segmentation and shows how fuzzy logic approaches apply. The book is divided into two parts. The first includes vagueness and ambiguity in digital images, fuzzy image processing, fuzzy rule based systems, and fuzzy clustering. The second part includes applications to image processing, image thresholding, color contrast enhancement, edge detection, morphological analysis, and image segmentation. Throughout, they describe image processing algorithms based on fuzzy logic under methodological aspects in addition to applicative aspects. Implementations in java are provided for the various applications.

Cryptography Made Simple (Paperback, Softcover reprint of the original 1st ed. 2016): Nigel Smart Cryptography Made Simple (Paperback, Softcover reprint of the original 1st ed. 2016)
Nigel Smart
R3,246 Discovery Miles 32 460 Ships in 10 - 15 working days

In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The author balances a largely non-rigorous style - many proofs are sketched only - with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.

Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Paperback, Softcover reprint of the original... Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Paperback, Softcover reprint of the original 1st ed. 2013)
Czeslaw Koscielny, Miroslaw Kurkowski, Marian Srebrny
R2,562 Discovery Miles 25 620 Ships in 10 - 15 working days

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience. After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams. The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.

Computing Taste - Algorithms and the Makers of Music Recommendation (Hardcover): Nick Seaver Computing Taste - Algorithms and the Makers of Music Recommendation (Hardcover)
Nick Seaver
R2,690 Discovery Miles 26 900 Ships in 12 - 19 working days

Meet the people who design the algorithms that capture our musical tastes. The people who make music recommender systems have lofty goals: they want to broaden listeners' horizons and help obscure musicians find audiences, taking advantage of the enormous catalogs offered by companies like Spotify, Apple Music, and Pandora. But for their critics, recommender systems seem to embody all the potential harms of algorithms: they flatten culture into numbers, they normalize ever-broadening data collection, and they profile their users for commercial ends. Drawing on years of ethnographic fieldwork, anthropologist Nick Seaver describes how the makers of music recommendation navigate these tensions: how product managers understand their relationship with the users they want to help and to capture; how scientists conceive of listening itself as a kind of data processing; and how engineers imagine the geography of the world of music as a space they care for and control. Computing Taste rehumanizes the algorithmic systems that shape our world, drawing attention to the people who build and maintain them. In this vividly theorized book, Seaver brings the thinking of programmers into conversation with the discipline of anthropology, opening up the cultural world of computation in a wide-ranging exploration that travels from cosmology to calculation, myth to machine learning, and captivation to care.

Computational Collective Intelligence - 8th International Conference, ICCCI 2016, Halkidiki, Greece, September 28-30, 2016.... Computational Collective Intelligence - 8th International Conference, ICCCI 2016, Halkidiki, Greece, September 28-30, 2016. Proceedings, Part I (Paperback, 1st ed. 2016)
Ngoc Thanh Nguyen, Lazaros Iliadis, Yannis Manolopoulos, Bogdan Trawinski
R3,284 Discovery Miles 32 840 Ships in 10 - 15 working days

This two-volume set (LNAI 9875 and LNAI 9876) constitutes the refereed proceedings of the 8th International Conference on Collective Intelligence, ICCCI 2016, held in Halkidiki, Greece, in September 2016. The 108 full papers presented were carefully reviewed and selected from 277 submissions. The aim of this conference is to provide an internationally respected forum for scientific research in the computer-based methods of collective intelligence and their applications in (but not limited to) such fields as group decision making, consensus computing, knowledge integration, semantic web, social networks and multi-agent systems.

Logic, Language, Information, and Computation - 23rd International Workshop, WoLLIC 2016, Puebla, Mexico, August 16-19th, 2016.... Logic, Language, Information, and Computation - 23rd International Workshop, WoLLIC 2016, Puebla, Mexico, August 16-19th, 2016. Proceedings (Paperback, 1st ed. 2016)
Jouko Vaananen, Asa Hirvonen, Ruy De Queiroz
R1,573 Discovery Miles 15 730 Ships in 10 - 15 working days

Edited in collaboration with FoLLI, the Association of Logic, Language and Information this book constitutes the refereed proceedings of the 23rd Workshop on Logic, Language, Information and Communication, WoLLIC 2016, held in Puebla, Mexico, in August 2016.The 23 contributed papers, presented together with 9 invited lectures and tutorials, were carefully reviewed and selected from 33 submissions. The focus of the workshop is to provide a forum on inter-disciplinary research involving formal logic, computing and programming theory, and natural language and reasoning.

Knowledge Management and Acquisition for Intelligent Systems - 14th Pacific Rim Knowledge Acquisition Workshop, PKAW 2016,... Knowledge Management and Acquisition for Intelligent Systems - 14th Pacific Rim Knowledge Acquisition Workshop, PKAW 2016, Phuket, Thailand, August 22-23, 2016, Proceedings (Paperback, 1st ed. 2016)
Hayato Ohwada, Kenichi Yoshida
R2,308 Discovery Miles 23 080 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th International Workshop on Knowledge Management and Acquisition for Intelligent Systems, PKAW 2016, held in Phuket, Thailand, in August 2016. The 16 full papers and 5 short papers included in this volume were carefully reviewed and selected from 61 initial submissions. They deal with knowledge acquisition and machine learning; knowledge acquisition and natural language processing; knowledge acquisition from network and big data; and knowledge acquisition and applications.

Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed.... Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed. 2015)
Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
R3,315 Discovery Miles 33 150 Ships in 10 - 15 working days

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVII - Special Issue on Big Data for Complex Urban Systems... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVII - Special Issue on Big Data for Complex Urban Systems (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner, Amin Anjomshoaa, Patrick C K Hung, …
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This, the 27th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains extended and revised versions of 12 papers presented at the Big Data and Technology for Complex Urban Systems symposium, held in Kauai, HI, USA in January 2016. The papers explore the use of big data in complex urban systems in the areas of politics, society, commerce, tax, and emergency management.

Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15,... Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Francois-Xavier Standaert, Elisabeth Oswald
R2,136 Discovery Miles 21 360 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named: security and physical attacks; side-channel analysis (case studies); fault analysis; and side-channel analysis (tools).

Unmanned Rotorcraft Systems (Paperback, Softcover reprint of the original 1st ed. 2011): Guowei Cai, Ben M. Chen, Tong Heng Lee Unmanned Rotorcraft Systems (Paperback, Softcover reprint of the original 1st ed. 2011)
Guowei Cai, Ben M. Chen, Tong Heng Lee
R4,132 Discovery Miles 41 320 Ships in 10 - 15 working days

Unmanned Rotorcraft Systems explores the research and development of fully-functional miniature UAV (unmanned aerial vehicle) rotorcraft, and provides a complete treatment of the design of autonomous miniature rotorcraft UAVs. The unmanned system is an integration of advanced technologies developed in communications, computing, and control areas, and is an excellent testing ground for trialing and implementing modern control techniques. Included are detailed expositions of systematic hardware construction, software systems integration, aerodynamic modeling; and automatic flight control system design. Emphasis is placed on the cooperative control and flight formation of multiple UAVs, vision-based ground target tracking, and landing on moving platforms. Other issues such as the development of GPS-less indoor micro aerial vehicles and vision-based navigation are also discussed in depth: utilizing the vision-based system for accomplishing ground target tracking, attacking and landing, cooperative control and flight formation of multiple unmanned rotorcraft; and future research directions on the related areas.

Static Analysis - 23rd International Symposium, SAS 2016, Edinburgh, UK, September 8-10, 2016, Proceedings (Paperback, 1st ed.... Static Analysis - 23rd International Symposium, SAS 2016, Edinburgh, UK, September 8-10, 2016, Proceedings (Paperback, 1st ed. 2016)
Xavier Rival
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 23rd International Static Analysis Symposium, SAS 2016, held in Edinburgh, UK, in September 2016. The 21 papers presented in this volume were carefully reviewed and selected from 55 submissions. The contributions cover a variety of multi-disciplinary topics in abstract domains; abstract interpretation; abstract testing; bug detection; data flow analysis; model checking; new applications; program transformation; program verification; security analysis; theoretical frameworks; and type checking.

Distributed and Sequential Algorithms for Bioinformatics (Paperback, Softcover reprint of the original 1st ed. 2015): Kayhan... Distributed and Sequential Algorithms for Bioinformatics (Paperback, Softcover reprint of the original 1st ed. 2015)
Kayhan Erciyes
R2,583 Discovery Miles 25 830 Ships in 10 - 15 working days

This unique textbook/reference presents unified coverage of bioinformatics topics relating to both biological sequences and biological networks, providing an in-depth analysis of cutting-edge distributed algorithms, as well as of relevant sequential algorithms. In addition to introducing the latest algorithms in this area, more than fifteen new distributed algorithms are also proposed. Topics and features: reviews a range of open challenges in biological sequences and networks; describes in detail both sequential and parallel/distributed algorithms for each problem; suggests approaches for distributed algorithms as possible extensions to sequential algorithms, when the distributed algorithms for the topic are scarce; proposes a number of new distributed algorithms in each chapter, to serve as potential starting points for further research; concludes each chapter with self-test exercises, a summary of the key points, a comparison of the algorithms described, and a literature review.

Physically Unclonable Functions - Constructions, Properties and Applications (Paperback, Softcover reprint of the original 1st... Physically Unclonable Functions - Constructions, Properties and Applications (Paperback, Softcover reprint of the original 1st ed. 2013)
Roel Maes
R2,078 Discovery Miles 20 780 Ships in 10 - 15 working days

Physically unclonable functions (PUFs) are innovative physical security primitives that produce unclonable and inherent instance-specific measurements of physical objects; in many ways they are the inanimate equivalent of biometrics for human beings. Since they are able to securely generate and store secrets, they allow us to bootstrap the physical implementation of an information security system. In this book the author discusses PUFs in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to deploy them in security applications. The author first presents an extensive overview and classification of PUF constructions, with a focus on so-called intrinsic PUFs. He identifies subclasses, implementation properties, and design techniques used to amplify submicroscopic physical distinctions into observable digital response vectors. He lists the useful qualities attributed to PUFs and captures them in descriptive definitions, identifying the truly PUF-defining properties in the process, and he also presents the details of a formal framework for deploying PUFs and similar physical primitives in cryptographic reductions. The author then describes a silicon test platform carrying different intrinsic PUF structures which was used to objectively compare their reliability, uniqueness, and unpredictability based on experimental data. In the final chapters, the author explains techniques for PUF-based entity identification, entity authentication, and secure key generation. He proposes practical schemes that implement these techniques, and derives and calculates measures for assessing different PUF constructions in these applications based on the quality of their response statistics. Finally, he presents a fully functional prototype implementation of a PUF-based cryptographic key generator, demonstrating the full benefit of using PUFs and the efficiency of the processing techniques described. This is a suitable introduction and reference for security researchers and engineers, and graduate students in information security and cryptography.

Genetic Programming Theory and Practice XI (Paperback, Softcover reprint of the original 1st ed. 2014): Rick Riolo, Jason H.... Genetic Programming Theory and Practice XI (Paperback, Softcover reprint of the original 1st ed. 2014)
Rick Riolo, Jason H. Moore, Mark Kotanchek
R2,170 Discovery Miles 21 700 Ships in 10 - 15 working days

These contributions, written by the foremost international researchers and practitioners of Genetic Programming (GP), explore the synergy between theoretical and empirical results on real-world problems, producing a comprehensive view of the state of the art in GP. Topics in this volume include: evolutionary constraints, relaxation of selection mechanisms, diversity preservation strategies, flexing fitness evaluation, evolution in dynamic environments, multi-objective and multi-modal selection, foundations of evolvability, evolvable and adaptive evolutionary operators, foundation of injecting expert knowledge in evolutionary search, analysis of problem difficulty and required GP algorithm complexity, foundations in running GP on the cloud - communication, cooperation, flexible implementation, and ensemble methods. Additional focal points for GP symbolic regression are: (1) The need to guarantee convergence to solutions in the function discovery mode; (2) Issues on model validation; (3) The need for model analysis workflows for insight generation based on generated GP solutions - model exploration, visualization, variable selection, dimensionality analysis; (4) Issues in combining different types of data. Readers will discover large-scale, real-world applications of GP to a variety of problem domains via in-depth presentations of the latest and most significant results.

Lipid-mediated Protein Signaling (Paperback, Softcover reprint of the original 1st ed. 2013): Daniel G S Capelluto Lipid-mediated Protein Signaling (Paperback, Softcover reprint of the original 1st ed. 2013)
Daniel G S Capelluto
R5,146 Discovery Miles 51 460 Ships in 10 - 15 working days

This book provides the most updated information of how membrane lipids mediate protein signaling from studies carried out in animal and plant cells. Also, there are some chapters that go beyond and expand these studies of protein-lipid interactions at the structural level. The book begins with a literature review from investigations associated to sphingolipids, followed by studies that describe the role of phosphoinositides in signaling and closing with the function of other key lipids in signaling at the plasma membrane and intracellular organelles.

Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013): Johannes A. Buchmann,... Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013)
Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier
R2,324 Discovery Miles 23 240 Ships in 10 - 15 working days

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Support Vector Machines and Perceptrons - Learning, Optimization, Classification, and Application to Social Networks... Support Vector Machines and Perceptrons - Learning, Optimization, Classification, and Application to Social Networks (Paperback, 1st ed. 2016)
M.N. Murty, Rashmi Raghava
R1,791 Discovery Miles 17 910 Ships in 10 - 15 working days

This work reviews the state of the art in SVM and perceptron classifiers. A Support Vector Machine (SVM) is easily the most popular tool for dealing with a variety of machine-learning tasks, including classification. SVMs are associated with maximizing the margin between two classes. The concerned optimization problem is a convex optimization guaranteeing a globally optimal solution. The weight vector associated with SVM is obtained by a linear combination of some of the boundary and noisy vectors. Further, when the data are not linearly separable, tuning the coefficient of the regularization term becomes crucial. Even though SVMs have popularized the kernel trick, in most of the practical applications that are high-dimensional, linear SVMs are popularly used. The text examines applications to social and information networks. The work also discusses another popular linear classifier, the perceptron, and compares its performance with that of the SVM in different application areas.>

Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006): John R Vacca Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006)
John R Vacca
R4,580 Discovery Miles 45 800 Ships in 10 - 15 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Economics and Computation - An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division... Economics and Computation - An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division (Paperback, Softcover reprint of the original 1st ed. 2016)
Joerg Rothe; Illustrated by Irene Rothe
R4,378 Discovery Miles 43 780 Ships in 10 - 15 working days

This textbook connects three vibrant areas at the interface between economics and computer science: algorithmic game theory, computational social choice, and fair division. It thus offers an interdisciplinary treatment of collective decision making from an economic and computational perspective. Part I introduces to algorithmic game theory, focusing on both noncooperative and cooperative game theory. Part II introduces to computational social choice, focusing on both preference aggregation (voting) and judgment aggregation. Part III introduces to fair division, focusing on the division of both a single divisible resource ("cake-cutting") and multiple indivisible and unshareable resources ("multiagent resource allocation"). In all these parts, much weight is given to the algorithmic and complexity-theoretic aspects of problems arising in these areas, and the interconnections between the three parts are of central interest.

Monte Carlo and  Quasi-Monte Carlo Methods 2010 (Paperback, Softcover reprint of the original 1st ed. 2012): Leszek Plaskota,... Monte Carlo and Quasi-Monte Carlo Methods 2010 (Paperback, Softcover reprint of the original 1st ed. 2012)
Leszek Plaskota, Henryk Wozniakowski
R4,555 Discovery Miles 45 550 Ships in 10 - 15 working days

This book represents the refereed proceedings of the Ninth International Conference on Monte Carlo and Quasi-Monte Carlo Methods in Scientific Computing that was held at the University of Warsaw (Poland) in August 2010. These biennial conferences are major events for Monte Carlo and the premiere event for quasi-Monte Carlo research. The proceedings include articles based on invited lectures as well as carefully selected contributed papers on all theoretical aspects and applications of Monte Carlo and quasi-Monte Carlo methods. The reader will be provided with information on latest developments in these very active areas. The book is an excellent reference for theoreticians and practitioners interested in solving high-dimensional computational problems arising, in particular, in finance and statistics.

Descriptive Set Theoretic Methods in Automata Theory - Decidability and Topological Complexity (Paperback, 1st ed. 2016):... Descriptive Set Theoretic Methods in Automata Theory - Decidability and Topological Complexity (Paperback, 1st ed. 2016)
Michal Skrzypczak
R2,124 Discovery Miles 21 240 Ships in 10 - 15 working days

The book is based on the PhD thesis "Descriptive Set Theoretic Methods in Automata Theory," awarded the E.W. Beth Prize in 2015 for outstanding dissertations in the fields of logic, language, and information. The thesis reveals unexpected connections between advanced concepts in logic, descriptive set theory, topology, and automata theory and provides many deep insights into the interplay between these fields. It opens new perspectives on central problems in the theory of automata on infinite words and trees and offers very impressive advances in this theory from the point of view of topology. "...the thesis of Michal Skrzypczak offers certainly what we expect from excellent mathematics: new unexpected connections between a priori distinct concepts, and proofs involving enlightening ideas." Thomas Colcombet.

Physical Unclonable Functions in Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 2013): Christoph... Physical Unclonable Functions in Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 2013)
Christoph Boehm, Maximilian Hofer
R3,648 Discovery Miles 36 480 Ships in 10 - 15 working days

In Physical Unclonable Functions in Theory and Practice, the authors present an in-depth overview of various topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits. Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit's perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement results Different error rate reducing pre-selection techniques This monograph gives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Linear Algebra and Its Applications…
David Lay, Steven Lay, … Paperback R2,492 Discovery Miles 24 920
The Canonical Operator in Many-Particle…
Victor P. Maslov, Oleg Yu Shvedov Hardcover R5,367 Discovery Miles 53 670
Algebras, Lattices, Varieties - Volume…
Ralph S Freese, Ralph N. McKenzie, … Paperback R3,238 Discovery Miles 32 380
Sets, Groups, and Mappings - An…
Andrew D. Hwang Hardcover R2,424 Discovery Miles 24 240
Groups, Invariants, Integrals, and…
Maria Ulan, Stanislav Hronek Hardcover R3,607 Discovery Miles 36 070
Essentials of Fuzzy Soft Multisets…
Anjan Mukherjee, Ajoy Kanti Das Hardcover R3,574 Discovery Miles 35 740
Separation in Point-Free Topology
Jorge Picado, Ales Pultr Hardcover R3,644 Discovery Miles 36 440
Quadratic Forms, Linear Algebraic…
Jean-Louis Colliot-Thelene, Skip Garibaldi, … Hardcover R3,079 Discovery Miles 30 790
Algebras, Quivers and Representations…
Aslak Bakke Buan, Idun Reiten, … Hardcover R3,636 Discovery Miles 36 360
Noncommutative Geometry - A Functorial…
Igor V Nikolaev Hardcover R4,259 Discovery Miles 42 590

 

Partners