![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Science & Mathematics > Mathematics > Mathematical foundations > Mathematical logic
This book covers blockchain from the underlying principles to how it enables applications to survive and surf on its shoulder. Having covered the fundamentals of blockchain, the book turns to cryptocurrency. It thoroughly examines Bitcoin before presenting six other major currencies in a rounded discussion. The book then bridges between technology and finance, concentrating on how blockchain-based applications, including cryptocurrencies, have pushed hard against mainstream industries in a bid to cement their positions permanent. It discusses blockchain as underlying banking technology, crypto mining and offering, cryptocurrency as investment instruments, crypto regulations, and markets.
This books presents the refereed proceedings of the Fifth
International Workshop on Analytic Tableaux and Related Methods,
TABLEAUX '96, held in Terrasini near Palermo, Italy, in May
1996.
This book constitutes the refereed proceedings of the 5th Kurt G
del Colloquium on Computational Logic and Proof Theory, KGC '97,
held in Vienna, Austria, in August 1997.
This book constitutes the refereed proceedings of the First
International Joint Conference on Qualitative and Quantitative
Practical Reasoning, ECSQARU-FAPR'97, held in Bad Honnef, Germany,
in June 1997.
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
In this 1987 text Professor Jech gives a unified treatment of the various forcing methods used in set theory, and presents their important applications. Product forcing, iterated forcing and proper forcing have proved powerful tools when studying the foundations of mathematics, for instance in consistency proofs. The book is based on graduate courses though some results are also included, making the book attractive to set theorists and logicians.
This book constitutes the refereed proceedings of the 13th
International Conference on Automated Deduction, CADE-13, held in
July/August 1996 in New Brunswick, NJ, USA, as part of FLoC
'96.
This book constitutes the refereed proceedings of the 17th
International Conference on Application and Theory of Petri Nets,
held in Osaka, Japan, in June 1996.
This book constitutes the proceedings of the 16th International
Conference on Application and Theory of Petri Nets, held in Torino,
Italy in June 1995
Logic is one of the most popular approaches to artificial
intelligence. A potential obstacle to the use of logic is its high
computational complexity, as logical inference is an
extraordinarily powerful computational device.
This volume constitutes the proceedings of the 4th International
Workshop on Theorem Proving with Analytic Tableaux and Related
Methods, TABLEAU '95, held at Schloss Rheinfels, St. Goar, Germany
in May 1995.
This volume presents the proceedings of the Second International
Conference on Typed Lambda Calculi and Applications, held in
Edinburgh, UK in April 1995.
This volume presents the thoroughly revised proceedings of the
IJCAI '93 Workshop on Executable Modal and Temporal Logics held in
Chambery, France in August 1993.
The book is a fairly complete and up-to-date survey of projectivity
and its generalizations in the class of Boolean algebras. Although
algebra adds its own methods and questions, many of the results
presented were first proved by topologists in the more general
setting of (not necessarily zero-dimensional) compact spaces.
This important book provides a new unifying methodology for logic. It replaces the traditional view of logic as manipulating sets of formulas by the notion of structured families of labelled formulas, the labels having algebraic structure. This simple device has far reaching consequences for the methodology of logics and their semantics. The book studies the main features of such systems as well as many applications. The framework of Labelled Deductive Systems is of interest to a large variety of readers. At one extreme there is the pure mathematical logician who likes exact formal definitions and dry theorems, who probably specializes in one logic and methodology. At the other extreme there is the practical consumer of logic, who likes to absorb the intutions and use labelling as needed to advance the cause of applications. The book begins with an intuitive presentation of LDS in the context of traditional current views of monotonic and nonmonotonic logics. It is less orientated towards the pure logician and more towards the practical consumer of logic. The main part of the book presents the formal theory of LDS for the formal logician. The author has tried to avoid the style of definition-lemma-theorem and has put in some explanation.
This volume presents the proceedings of the 7th International
Workshop on Higher Order Logic Theorem Proving and Its Applications
held in Valetta, Malta in September 1994.
This volume constitutes the proceedings of the First International Conference on Constraints in Computational Logics, CCL '94, held in Munich, Germany in September 1994. Besides abstracts or full papers of the 5 invited talks by senior researchers, the book contains revised versions of the 21 accepted research papers selected from a total of 52 submissions. The volume assembles high quality original papers covering major theoretical and practical issues of combining and extending programming paradigms, preferably by using constraints. The topics covered include symbolic constraints, set constraints, numerical constraints, multi-paradigm programming, combined calculi, constraints in rewriting, deduction, symbolic computations, and working systems.
This volume contains the thoroughly refereed and revised papers accepted for presentation at the IJCAI '91 Workshops on Fuzzy Logic and Fuzzy Control, held during the International Joint Conference on AI at Sydney, Australia in August 1991. The 14 technical contributions are devoted to several theoretical and applicational aspects of fuzzy logic and fuzzy control; they are presented in sections on theoretical aspects of fuzzy reasoning and fuzzy control, fuzzy neural networks, fuzzy control applications, fuzzy logic planning, and fuzzy circuits. In addition, there is a substantial introduction by the volume editors on the latest developments in the field that brings the papers presented into line.
This volume presents the refereed papers accepted for the
international symposium Logical Foundations of Computer Science
'94, Logic at St. Petersburg, held in St. Petersburg, Russia in
July 1994. The symposium was the third in a series of joint efforts
of logicians from both the former Soviet Union and the West.
This book constitutes the proceedings of the 8th International
Conference on Higher Order Logic Theorem Proving and Its
Applications, held in Aspen Grove, Utah, USA in September
1995.
The subject of the book is an approach to the modeling of and the reasoning under uncertainty. It develops the Dempster-Shafer Theory as a theory of the reliability of reasoning with uncertain arguments. A particular interest of this approach is that it yields a new synthesis and integration of logic and probability theory. The reader will benefit from a new view at uncertainty modeling which extends classical probability theory.
This volume contains revised refereed versions of the best papers
presented during the CSL '94 conference, held in Kazimierz, Poland
in September 1994; CSL '94 is the eighth event in the series of
workshops held for the third time as the Annual Conference of the
European Association for Computer Science Logic.
Formal specifications were first used in the description of program ming languages because of the central role that languages and their compilers play in causing a machine to perform the computations required by a programmer. In a relatively short time, specification notations have found their place in industry and are used for the description of a wide variety of software and hardware systems. A formal method - like VDM - must offer a mathematically-based specification language. On this language rests the other key element of the formal method: the ability to reason about a specification. Proofs can be empioyed in reasoning about the potential behaviour of a system and in the process of showing that the design satisfies the specification. The existence of a formal specification is a prerequisite for the use of proofs; but this prerequisite is not in itself sufficient. Both proofs and programs are large formal texts. Would-be proofs may therefore contain errors in the same way as code. During the difficult but inevitable process of revising specifications and devel opments, ensuring consistency is a major challenge. It is therefore evident that another requirement - for the successful use of proof techniques in the development of systems from formal descriptions - is the availability of software tools which support the manipu lation of large bodies of formulae and help the user in the design of the proofs themselves."
This volume contains the proceedings of the 15th International
Conference on Application and Theory of Petri Nets, held at
Zaragoza, Spain in June 1994. The annual Petri net conferences are
usually visited by some 150 - 200 Petri net experts coming from
academia and industry all over the world. |
You may like...
Theory and Applications of…
Florentin Smarandache, Madeline Al-Tahan
Hardcover
R6,648
Discovery Miles 66 480
Elementary Lessons in Logic - Deductive…
William Stanley Jevons
Paperback
R569
Discovery Miles 5 690
Logic from Russell to Church, Volume 5
Dov M. Gabbay, John Woods
Hardcover
R5,271
Discovery Miles 52 710
|