0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (332)
  • R250 - R500 (1,002)
  • R500+ (3,891)
  • -
Status
Format
Author / Contributor
Publisher

Books > Science & Mathematics > Mathematics > Mathematical foundations

Invariant Descriptive Set Theory (Paperback): Su Gao Invariant Descriptive Set Theory (Paperback)
Su Gao
R2,054 Discovery Miles 20 540 Ships in 10 - 15 working days

Presents Results from a Very Active Area of Research Exploring an active area of mathematics that studies the complexity of equivalence relations and classification problems, Invariant Descriptive Set Theory presents an introduction to the basic concepts, methods, and results of this theory. It brings together techniques from various areas of mathematics, such as algebra, topology, and logic, which have diverse applications to other fields. After reviewing classical and effective descriptive set theory, the text studies Polish groups and their actions. It then covers Borel reducibility results on Borel, orbit, and general definable equivalence relations. The author also provides proofs for numerous fundamental results, such as the Glimm-Effros dichotomy, the Burgess trichotomy theorem, and the Hjorth turbulence theorem. The next part describes connections with the countable model theory of infinitary logic, along with Scott analysis and the isomorphism relation on natural classes of countable models, such as graphs, trees, and groups. The book concludes with applications to classification problems and many benchmark equivalence relations. By illustrating the relevance of invariant descriptive set theory to other fields of mathematics, this self-contained book encourages readers to further explore this very active area of research.

Authentication Codes and Combinatorial Designs (Paperback): Dingyi Pei Authentication Codes and Combinatorial Designs (Paperback)
Dingyi Pei
R2,034 Discovery Miles 20 340 Ships in 10 - 15 working days

Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems. Authentication Codes and Combinatorial Designs presents new findings and original work on perfect authentication codes characterized in terms of combinatorial designs, namely strong partially balanced designs (SPBD). Beginning with examples illustrating the concepts of authentication schemes and combinatorial designs, the book considers the probability of successful deceptions followed by schemes involving three and four participants, respectively. From this point, the author constructs the perfect authentication schemes and explores encoding rules for such schemes in some special cases. Using rational normal curves in projective spaces over finite fields, the author constructs a new family of SPBD. He then presents some established combinatorial designs that can be used to construct perfect schemes, such as t-designs, orthogonal arrays of index unity, and designs constructed by finite geometry. The book concludes by studying definitions of perfect secrecy, properties of perfectly secure schemes, and constructions of perfect secrecy schemes with and without authentication. Supplying an appendix of construction schemes for authentication and secrecy schemes, Authentication Codes and Combinatorial Designs points to new applications of combinatorial designs in cryptography.

Fuzzy Automata and Languages - Theory and Applications (Paperback): John N. Mordeson, Davender S. Malik Fuzzy Automata and Languages - Theory and Applications (Paperback)
John N. Mordeson, Davender S. Malik
R2,078 Discovery Miles 20 780 Ships in 10 - 15 working days

The huge number and broad range of the existing and potential applications of fuzzy logic have precipitated a veritable avalanche of books published on the subject. Most, however, focus on particular areas of application. Many do no more than scratch the surface of the theory that holds the power and promise of fuzzy logic. Fuzzy Automata and Languages: Theory and Applications offers the first in-depth treatment of the theory and mathematics of fuzzy automata and fuzzy languages. After introducing background material, the authors study max-min machines and max-product machines, developing their respective algebras and exploring properties such as equivalences, homomorphisms, irreducibility, and minimality. The focus then turns to fuzzy context-free grammars and languages, with special attention to trees, fuzzy dendrolanguage generating systems, and normal forms. A treatment of algebraic fuzzy automata theory follows, along with additional results on fuzzy languages, minimization of fuzzy automata, and recognition of fuzzy languages. Although the book is theoretical in nature, the authors also discuss applications in a variety of fields, including databases, medicine, learning systems, and pattern recognition. Much of the information on fuzzy languages is new and never before presented in book form. Fuzzy Automata and Languages incorporates virtually all of the important material published thus far. It stands alone as a complete reference on the subject and belongs on the shelves of anyone interested in fuzzy mathematics or its applications.

Theoretical Numerical Analysis - A Functional Analysis Framework (Hardcover, 3rd ed. 2009): Kendall Atkinson, Weimin Han Theoretical Numerical Analysis - A Functional Analysis Framework (Hardcover, 3rd ed. 2009)
Kendall Atkinson, Weimin Han
R2,759 Discovery Miles 27 590 Ships in 18 - 22 working days

This textbook prepares graduate students for research in numerical analysis/computational mathematics by giving to them a mathematical framework embedded in functional analysis and focused on numerical analysis. This helps the student to move rapidly into a research program. The text covers basic results of functional analysis, approximation theory, Fourier analysis and wavelets, iteration methods for nonlinear equations, finite difference methods, Sobolev spaces and weak formulations of boundary value problems, finite element methods, elliptic variational inequalities and their numerical solution, numerical methods for solving integral equations of the second kind, and boundary integral equations for planar regions. The presentation of each topic is meant to be an introduction with certain degree of depth. Comprehensive references on a particular topic are listed at the end of each chapter for further reading and study.

Because of the relevance in solving real world problems, multivariable polynomials are playing an ever more important role in research and applications. In this third editon, a new chapter on this topic has been included and some major changes are made on two chapters from the previous edition. In addition, there are numerous minor changes throughout the entire text and new exercises are added.

Review of earlier edition:

..".the book is clearly written, quite pleasant to read, and contains a lot of important material; and the authors have done an excellent job at balancing theoretical developments, interesting examples and exercises, numerical experiments, and bibliographical references."

R. Glowinski, SIAM Review, 2003

Multilevel Modeling of Secure Systems in QoP-ML (Paperback): Bogdan Księżopolski Multilevel Modeling of Secure Systems in QoP-ML (Paperback)
Bogdan Księżopolski
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Introduces quality of protection evaluation of IT Systems Covers the financial, economic, and CO2 emission analysis phase Supplies a multilevel analysis of Cloud-based data centers Details the structures for advanced communication modeling and energy analysis Considers security and energy efficiency trade-offs for the protocols of wireless sensor network architectures Includes case studies that illustrate the QoP analysis process using the QoP-ML Examines the robust security metrics of cryptographic primitives Compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework The book explains the formal logic for representing the relationships between security mechanisms in a manner that offers the possibility to evaluate security attributes. It presents the architecture and API of tools that ensure automatic analysis, including the automatic quality of protection analysis tool (AQoPA), crypto metrics tool (CMTool), and security mechanisms evaluation tool (SMETool). The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML. Every operation defined by QoP-ML is described within parameters of security metrics to help you better evaluate the impact of each operation on your system's security.

Problems With A Point: Exploring Math And Computer Science (Hardcover): William Gasarch, Clyde Kruskal Problems With A Point: Exploring Math And Computer Science (Hardcover)
William Gasarch, Clyde Kruskal
R1,699 Discovery Miles 16 990 Ships in 18 - 22 working days

'Points, questions, stories, and occasional rants introduce the 24 chapters of this engaging volume. With a focus on mathematics and peppered with a scattering of computer science settings, the entries range from lightly humorous to curiously thought-provoking. Each chapter includes sections and sub-sections that illustrate and supplement the point at hand. Most topics are self-contained within each chapter, and a solid high school mathematics background is all that is needed to enjoy the discussions. There certainly is much to enjoy here.'CHOICEEver notice how people sometimes use math words inaccurately? Or how sometimes you instinctively know a math statement is false (or not known)?Each chapter of this book makes a point like those above and then illustrates the point by doing some real mathematics through step-by-step mathematical techniques.This book gives readers valuable information about how mathematics and theoretical computer science work, while teaching them some actual mathematics and computer science through examples and exercises. Much of the mathematics could be understood by a bright high school student. The points made can be understood by anyone with an interest in math, from the bright high school student to a Field's medal winner.

Fine Structure and Class Forcing (Hardcover, Reprint 2011): Sy D. Friedman Fine Structure and Class Forcing (Hardcover, Reprint 2011)
Sy D. Friedman
R4,520 Discovery Miles 45 200 Ships in 10 - 15 working days

The series is devoted to the publication of high-level monographs on all areas of mathematical logic and its applications. It is addressed to advanced students and research mathematicians, and may also serve as a guide for lectures and for seminars at the graduate level.

Turing Computability - Theory and Applications (Hardcover, 1st ed. 2016): Robert I. Soare Turing Computability - Theory and Applications (Hardcover, 1st ed. 2016)
Robert I. Soare
R2,756 Discovery Miles 27 560 Ships in 10 - 15 working days

Turing's famous 1936 paper introduced a formal definition of a computing machine, a Turing machine. This model led to both the development of actual computers and to computability theory, the study of what machines can and cannot compute. This book presents classical computability theory from Turing and Post to current results and methods, and their use in studying the information content of algebraic structures, models, and their relation to Peano arithmetic. The author presents the subject as an art to be practiced, and an art in the aesthetic sense of inherent beauty which all mathematicians recognize in their subject. Part I gives a thorough development of the foundations of computability, from the definition of Turing machines up to finite injury priority arguments. Key topics include relative computability, and computably enumerable sets, those which can be effectively listed but not necessarily effectively decided, such as the theorems of Peano arithmetic. Part II includes the study of computably open and closed sets of reals and basis and nonbasis theorems for effectively closed sets. Part III covers minimal Turing degrees. Part IV is an introduction to games and their use in proving theorems. Finally, Part V offers a short history of computability theory. The author has honed the content over decades according to feedback from students, lecturers, and researchers around the world. Most chapters include exercises, and the material is carefully structured according to importance and difficulty. The book is suitable for advanced undergraduate and graduate students in computer science and mathematics and researchers engaged with computability and mathematical logic.

Stable Domination and Independence in Algebraically Closed Valued Fields (Hardcover): Deirdre Haskell, Ehud Hrushovski, Dugald... Stable Domination and Independence in Algebraically Closed Valued Fields (Hardcover)
Deirdre Haskell, Ehud Hrushovski, Dugald Macpherson
R3,192 Discovery Miles 31 920 Ships in 10 - 15 working days

This book addresses a gap in the model-theoretic understanding of valued fields that has, until now, limited the interactions of model theory with geometry. It contains significant developments in both pure and applied model theory. Part I of the book is a study of stably dominated types. These form a subset of the type space of a theory that behaves in many ways like the space of types in a stable theory. This part begins with an introduction to the key ideas of stability theory for stably dominated types. Part II continues with an outline of some classical results in the model theory of valued fields and explores the application of stable domination to algebraically closed valued fields. The research presented here is made accessible to the general model theorist by the inclusion of the introductory sections of each part.

Proceedings Of The 14th And 15th Asian Logic Conferences (Hardcover): Byunghan Kim, Jorg Brendle, Gyesik Lee, Fenrong Liu, R.... Proceedings Of The 14th And 15th Asian Logic Conferences (Hardcover)
Byunghan Kim, Jorg Brendle, Gyesik Lee, Fenrong Liu, R. Ramanujam, …
R2,861 Discovery Miles 28 610 Ships in 18 - 22 working days

The Asian Logic Conference (ALC) is a major international event in mathematical logic. It features the latest scientific developments in the fields of mathematical logic and its applications, logic in computer science, and philosophical logic. The ALC series also aims to promote mathematical logic in the Asia-Pacific region and to bring logicians together both from within Asia and elsewhere for an exchange of information and ideas. This combined proceedings volume represents works presented or arising from the 14th and 15th ALCs.

Deflating Existential Commitment - A Case for Nominalism (Hardcover, New): Jody Azzouni Deflating Existential Commitment - A Case for Nominalism (Hardcover, New)
Jody Azzouni
R1,970 Discovery Miles 19 700 Ships in 10 - 15 working days

If we take mathematical statements to be true, then must we also believe in the existence of invisible mathematical objects, accessible only by the power of thought? Jody Azzouni says we do not, and claims that the way to escape such a commitment is to accept - as an essential part of scientific doctrine - true statesments which are 'about' objects which don't exist in any real sense.

Maths on the Back of an Envelope - Clever Ways to (Roughly) Calculate Anything (Paperback): Rob Eastaway Maths on the Back of an Envelope - Clever Ways to (Roughly) Calculate Anything (Paperback)
Rob Eastaway
R309 R278 Discovery Miles 2 780 Save R31 (10%) Ships in 9 - 17 working days

‘Another terrific book by Rob Eastaway’ SIMON SINGH ‘A delightfully accessible guide to how to play with numbers’ HANNAH FRY How many cats are there in the world? What's the chance of winning the lottery twice? And just how long does it take to count to a million? Learn how to tackle tricky maths problems with nothing but the back of an envelope, a pencil and some good old-fashioned brain power. Join Rob Eastaway as he takes an entertaining look at how to figure without a calculator. Packed with amusing anecdotes, quizzes, and handy calculation tips for every situation, Maths on the Back of an Envelope is an invaluable introduction to the art of estimation, and a welcome reminder that sometimes our own brain is the best tool we have to deal with numbers.

The Combinatory Programme (Hardcover, 1995 ed.): Erwin Engeler The Combinatory Programme (Hardcover, 1995 ed.)
Erwin Engeler; Assisted by K. Aberer, B. Amrhein, O. Gloor, M. V. Mohrenschildt, …
R2,730 Discovery Miles 27 300 Ships in 18 - 22 working days

Combinatory logic started as a programme in the foundation of mathematics and in an historical context at a time when such endeavours attracted the most gifted among the mathematicians. This small volume arose under quite differ ent circumstances, namely within the context of reworking the mathematical foundations of computer science. I have been very lucky in finding gifted students who agreed to work with me and chose, for their Ph. D. theses, subjects that arose from my own attempts 1 to create a coherent mathematical view of these foundations. The result of this collaborative work is presented here in the hope that it does justice to the individual contributor and that the reader has a chance of judging the work as a whole. E. Engeler ETH Zurich, April 1994 lCollected in Chapter III, An Algebraization of Algorithmics, in Algorithmic Properties of Structures, Selected Papers of Erwin Engeler, World Scientific PubJ. Co., Singapore, 1993, pp. 183-257. I Historical and Philosophical Background Erwin Engeler In the fall of 1928 a young American turned up at the Mathematical Institute of Gottingen, a mecca of mathematicians at the time; he was a young man with a dream and his name was H. B. Curry. He felt that he had the tools in hand with which to solve the problem of foundations of mathematics mice and for all. His was an approach that came to be called "formalist" and embodied that later became known as Combinatory Logic."

Large Deviations For Performance Analysis - Queues, Communication and Computing (Hardcover): Alan Weiss, Adam Shwartz Large Deviations For Performance Analysis - Queues, Communication and Computing (Hardcover)
Alan Weiss, Adam Shwartz
R4,684 Discovery Miles 46 840 Ships in 10 - 15 working days

Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.

Knowledge, Proof and Dynamics - The Fourth Asian Workshop on Philosophical Logic (Hardcover, 1st ed. 2020): Fenrong Liu,... Knowledge, Proof and Dynamics - The Fourth Asian Workshop on Philosophical Logic (Hardcover, 1st ed. 2020)
Fenrong Liu, Hiroakira Ono, Junhua Yu
R4,022 Discovery Miles 40 220 Ships in 18 - 22 working days

This volume gathers selected papers presented at the Fourth Asian Workshop on Philosophical Logic, held in Beijing in October 2018. The contributions cover a wide variety of topics in modal logic (epistemic logic, temporal logic and dynamic logic), proof theory, algebraic logic, game logics, and philosophical foundations of logic. They also reflect the interdisciplinary nature of logic - a subject that has been studied in fields as diverse as philosophy, linguistics, mathematics, computer science and artificial intelligence. More specifically. The book also presents the latest developments in logic both in Asia and beyond.

Managing Trust in Cyberspace (Paperback): Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey Managing Trust in Cyberspace (Paperback)
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
R1,898 Discovery Miles 18 980 Ships in 10 - 15 working days

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.

Design Considerations of Time in Fuzzy Systems (Hardcover, 2000 ed.): J. Virant Design Considerations of Time in Fuzzy Systems (Hardcover, 2000 ed.)
J. Virant
R5,420 Discovery Miles 54 200 Ships in 18 - 22 working days

Fuzzy theory is an interesting name for a method that has been highly effective in a wide variety of significant, real-world applications. A few examples make this readily apparent. As the result of a faulty design the method of computer-programmed trading, the biggest stock market crash in history was triggered by a small fraction of a percent change in the interest rate in a Western European country. A fuzzy theory ap proach would have weighed a number of relevant variables and the ranges of values for each of these variables. Another example, which is rather simple but pervasive, is that of an electronic thermostat that turns on heat or air conditioning at a specific temperature setting. In fact, actual comfort level involves other variables such as humidity and the location of the sun with respect to windows in a home, among others. Because of its great applied significance, fuzzy theory has generated widespread activity internationally. In fact, institutions devoted to research in this area have come into being. As the above examples suggest, Fuzzy Systems Theory is of fundamen tal importance for the analysis and design of a wide variety of dynamic systems. This clearly manifests the fundamental importance of time con siderations in the Fuzzy Systems design approach in dynamic systems. This textbook by Prof. Dr. Jernej Virant provides what is evidently a uniquely significant and comprehensive treatment of this subject on the international scene."

How to Expect the Unexpected - The Science of Making Predictions and the Art of Knowing When Not To (Paperback): Kit Yates How to Expect the Unexpected - The Science of Making Predictions and the Art of Knowing When Not To (Paperback)
Kit Yates
R470 R419 Discovery Miles 4 190 Save R51 (11%) Ships in 5 - 14 working days

· Are you more likely to become a professional footballer if your surname is Ball? · How can you be one hundred per cent sure you will win a bet? · Why did so many Pompeiians stay put while Mount Vesuvius was erupting? · How do you prevent a nuclear war? Ever since the dawn of human civilisation, we have been trying to make predictions about what's in store for us. We do this on a personal level, so that we can get on with our lives efficiently (should I hang my laundry out to dry, or will it rain?). But we also have to predict on a much larger scale, often for the good of our broader society (how can we spot economic downturns or prevent terrorist attacks?). For just as long, we have been getting it wrong. From religious oracles to weather forecasters, and from politicians to economists, we are subjected to poor predictions all the time. Our job is to separate the good from the bad. Unfortunately, the foibles of our own biology - the biases that ultimately make us human - can let us down when it comes to making rational inferences about the world around us. And that can have disastrous consequences. How to Expect the Unexpected will teach you how and why predictions go wrong, help you to spot phony forecasts and give you a better chance of getting your own predictions correct.

Book of Proof (Paperback, 3rd ed.): Richard H Hammack Book of Proof (Paperback, 3rd ed.)
Richard H Hammack
R733 Discovery Miles 7 330 Ships in 18 - 22 working days
Security without Obscurity - A Guide to Cryptographic Architectures (Hardcover): Jeff Stapleton Security without Obscurity - A Guide to Cryptographic Architectures (Hardcover)
Jeff Stapleton
R2,152 Discovery Miles 21 520 Ships in 10 - 15 working days

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Polish Logic 1920-1939 (Hardcover): Storrs McCall Polish Logic 1920-1939 (Hardcover)
Storrs McCall
R3,938 Discovery Miles 39 380 Ships in 10 - 15 working days
Lecture Notes on O-Minimal Structures and Real Analytic Geometry (Hardcover, 2012 ed.): Chris Miller, Jean-Philippe Rolin,... Lecture Notes on O-Minimal Structures and Real Analytic Geometry (Hardcover, 2012 ed.)
Chris Miller, Jean-Philippe Rolin, Patrick Speissegger
R3,123 Discovery Miles 31 230 Ships in 18 - 22 working days

This volume was produced in conjunction with the Thematic Program in o-Minimal Structures and Real Analytic Geometry, held from January to June of 2009 at the Fields Institute. Five of the six contributions consist of notes from graduate courses associated with the program: Felipe Cano on a new proof of resolution of singularities for planar analytic vector fields; Chris Miller on o-minimality and Hardy fields; Jean-Philippe Rolin on the construction of o-minimal structures from quasianalytic classes; Fernando Sanz on non-oscillatory trajectories of vector fields; and Patrick Speissegger on pfaffian sets. The sixth contribution, by Antongiulio Fornasiero and Tamara Servi, is an adaptation to the nonstandard setting of A.J. Wilkie's construction of o-minimal structures from infinitely differentiable functions. Most of this material is either unavailable elsewhere or spread across many different sources such as research papers, conference proceedings and PhD theses. This book will be a useful tool for graduate students or researchers from related fields who want to learn about expansions of o-minimal structures by solutions, or images thereof, of definable systems of differential equations.

Goedel's Way - Exploits into an undecidable world (Hardcover): Gregory Chaitin, Francisco Doria, Newton Da Costa Goedel's Way - Exploits into an undecidable world (Hardcover)
Gregory Chaitin, Francisco Doria, Newton Da Costa
R5,759 Discovery Miles 57 590 Ships in 10 - 15 working days

Kurt Godel (1906-1978) was an Austrian-American mathematician, who is best known for his incompleteness theorems. He was the greatest mathematical logician of the 20th century, with his contributions extending to Einstein's general relativity, as he proved that Einstein's theory allows for time machines. The Godel incompleteness theorem - the usual formal mathematical systems cannot prove nor disprove all true mathematical sentences - is frequently presented in textbooks as something that happens in the rarefied realms of mathematical logic, and that has nothing to do with the real world. Practice shows the contrary though; one can demonstrate the validity of the phenomenon in various areas, ranging from chaos theory and physics to economics and even ecology. In this lively treatise, based on Chaitin's groundbreaking work and on the da Costa-Doria results in physics, ecology, economics and computer science, the authors show that the Godel incompleteness phenomenon can directly bear on the practice of science and perhaps on our everyday life.This accessible book gives a new, detailed and elementary explanation of the Godel incompleteness theorems and presents the Chaitin results and their relation to the da Costa-Doria results, which are given in full, but with no technicalities. Besides theory, the historical report and personal stories about the main character and on this book's writing process, make it appealing leisure reading for those interested in mathematics, logic, physics, philosophy and computer sciences. See also: http://www.youtube.com/watch?v=REy9noY5Sg8

Understanding Mathematical Proof (Hardcover): John Taylor, Rowan Garnier Understanding Mathematical Proof (Hardcover)
John Taylor, Rowan Garnier
R5,793 Discovery Miles 57 930 Ships in 10 - 15 working days

The notion of proof is central to mathematics yet it is one of the most difficult aspects of the subject to teach and master. In particular, undergraduate mathematics students often experience difficulties in understanding and constructing proofs. Understanding Mathematical Proof describes the nature of mathematical proof, explores the various techniques that mathematicians adopt to prove their results, and offers advice and strategies for constructing proofs. It will improve students ability to understand proofs and construct correct proofs of their own. The first chapter of the text introduces the kind of reasoning that mathematicians use when writing their proofs and gives some example proofs to set the scene. The book then describes basic logic to enable an understanding of the structure of both individual mathematical statements and whole mathematical proofs. It also explains the notions of sets and functions and dissects several proofs with a view to exposing some of the underlying features common to most mathematical proofs. The remainder of the book delves further into different types of proof, including direct proof, proof using contrapositive, proof by contradiction, and mathematical induction. The authors also discuss existence and uniqueness proofs and the role of counter examples.

Cyclic Homology (Hardcover, 2nd ed. 1998): Jean-Louis Loday Cyclic Homology (Hardcover, 2nd ed. 1998)
Jean-Louis Loday
R3,778 Discovery Miles 37 780 Ships in 10 - 15 working days

From the reviews: "This is a very interesting book containing material for a comprehensive study of the cyclid homological theory of algebras, cyclic sets and S1-spaces. Lie algebras and algebraic K-theory and an introduction to Connes'work and recent results on the Novikov conjecture. The book requires a knowledge of homological algebra and Lie algebra theory as well as basic technics coming from algebraic topology. The bibliographic comments at the end of each chapter offer good suggestions for further reading and research. The book can be strongly recommended to anybody interested in noncommutative geometry, contemporary algebraic topology and related topics." European Mathematical Society Newsletter

In this second edition the authors have added a chapter 13 on MacLane (co)homology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Principia Mathematica
Russell Bertrand Russell Hardcover R1,219 Discovery Miles 12 190
Warning May Spontaneously Start Talking…
Andre Tobisch Paperback R371 Discovery Miles 3 710
1,000 + Mega sudoku killer 8x8 - Logic…
Basford Holmes Paperback R406 Discovery Miles 4 060
Logic from Russell to Church, Volume 5
Dov M. Gabbay, John Woods Hardcover R5,271 Discovery Miles 52 710
Warning May Spontaneously Start Talking…
Andre Tobisch Paperback R371 Discovery Miles 3 710
52! - Fifty-two Facorial
Michael Cottle Hardcover R1,011 Discovery Miles 10 110
6th Grade Math Workbook - Order of…
Baby Professor Paperback R311 Discovery Miles 3 110
Warning May Spontaneously Start Talking…
Andre Tobisch Paperback R367 Discovery Miles 3 670
Logic for Physicists
Nicolas A Pereyra Paperback R750 Discovery Miles 7 500
Principia Mathematica
Russell Bertrand Russell Hardcover R1,257 Discovery Miles 12 570

 

Partners