![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Systems analysis & design
This book constitutes the refereed proceedings of the international symposium Formal Methods Europe, FME 2002, held in Copenhagen, Denmark, in July 2002.The 31 revised full papers presented together with three invited contributions were carefully reviewed and selected from 95 submissions. All current aspects of formal methods are addressed, from foundational and methodological issues to advanced application in various fields.
Die Autoren beschreiben aus Herstellersicht betriebswirtschaftliche, technische und technologische Aspekte der Prozessintegration in der Print- und Medienindustrie auf Basis des Job Definition Formats. Es ist eine umfassende Darstellung der Thematik, die auf ersten Praxiserfahrungen von Herstellern, Instituten und Anwendern der grafischen Industrie beruht. Entscheidern der Print- und Medienindustrie wird mit diesem Buch ein Rahmen fur Investitionsentscheidungen in Software und deren Implementierung geliefert. Das Buch zeichnet sich durch seine einfache Sprache mit zahlreichen Begriffserlauterungen, Praxisbeispielen, erlauternden Grafiken und Checklisten aus.
Current Issues in Safety-Critical Systems contains the invited papers presented at the eleventh annual Safety-critical Systems Symposium, held in February 2003. The safety-critical systems domain is rapidly expanding and its industrial problems are always candidates for academic research. It embraces almost all industry sectors; current issues in one are commonly appropriate to others. The Safety-critical System Symposium provides an annual forum for discussing such issues. The papers contained within this volume cover a broad range of subjects. They represent a great deal of industrial experience as well as some academic research. All the papers are linked by addressing current issues in safety-critical systems: Dependability Requirements Engineering; Human Error Management; Influences on Risk; Safety Cases; Reforming the Law; Safety Management and Safety Standards.
This book constitutes the refereed proceedings of the 23rd International Conference on Application and Theory of Petri Nets, ICATPN 2002, held in Adelaide, Australia, in June 2002.The 18 regular papers and one tool presentation presented together with six invited paper were carefully reviewed and selected from 45 submissions. All current issues on research and development of Petri nets are addressed, in particular concurrent systems analysis, model validation, business process management, reactive systems, workflow processes, wireless transaction protocols.
User-Centred Requirements Engineering: Theory and Practice reviews requirements engineering research and practice over the past 10 years. In this book, Alistair Sutcliffe introduces the field of Requirements Engineering, and describes a framework for RE research and practice to date. He explains the psychological background behind RE problems - providing some understanding about why RE is difficult and how human understanding can cause the problems we observe in getting requirements right. The book discusses communication and requirements analysis, and gives practical guidance for requirements elicitation, modelling and validation, along with details of a practical RE method for scenario-based requirements analysis and requirements for safety critical systems. Whilst primarily a research text for graduate courses, this book is also intended as a useful reference for practitioners who want an in-depth treatment of the subject to date.
This book presents a coherent introduction to and an overview of state-of-the-art techniques in the design of complex embedded systems. The volume brings together revised papers initially presented at a workshop held at Samos, Greece, in July and reviewed invited articles. The papers are organized in topical sections on system-level design and simulation, compiler and mapping technology, embedded processor and architectures, and applications.
This book is the first comprehensive approach to the construction and the management of cooperative information systems. From a set of input database schemes describing the information content of multiple sources, the techniques presented yield a structured, integrated and consistent description of the information content represented in a suitable data repository. The author builds his work on skilled and controlled use of results and methods from various fields of computer science, such as data mining, algorithmic learning, knowledge representation, database management, etc. The approach presented has been implemented in the prototype system DIKE, Database Intensional Knowledge Extractor, which has been studied in various application contexts.
This book constitutes the thoroughly refereed joint post-proceedings of four international workshops held in conjunction with the 20th International Conference on Conceptual Modeling, ER 2001, held in Yokohama, Japan in November 2001.The 37 revised full papers presented were carefully selected and improved during two rounds of reviewing and revision. In accordance with the respective workshops, the papers are organized in topical sections on conceptual modeling and human, organizational, and social aspects; data semantics in web information systems; conceptual modeling approaches for e-business; and global data modeling.
Software Design - Cognitive Aspects covers a variety of areas including software analysis, design, coding and maintenance. It details the history of the research that has been conducted since the 1970s in this fast-developing field before defining a computer program from a computing and cognitive psychology viewpoint. Detailed treatment is given to the two essential sides of programming; software production and software understanding and throughout the book parallels are drawn between studies on processing texts written in natural language and processing computer programs.This book will be of particular interest to researchers, practitioners and graduate students in Computer Science, Cognitive Psychology, and Cognitive Ergonomics.
This volume contains the proceedings of CHARME 2001, the Eleventh Advanced Research Working Conference on Correct Hardware Design and Veri?cation Methods. CHARME 2001 is the 11th in a series of working conferences devoted to the development and use of leading-edge formal techniques and tools for the design and veri?cation of hardware and hardware-like systems. Previous events in the 'CHARME' series were held in Bad Herrenalb (1999), Montreal (1997), Frankfurt (1995), Arles (1993), and Torino (1991). This series of meetings has been organized in cooperation with IFIP WG 10.5 and WG 10.2. Prior meetings, stretching backto the earliest days of formal hardware veri?cation, were held under various names in Miami (1990), Leuven (1989), Glasgow (1988), Grenoble (1986), Edinburgh (1985), and Darmstadt (1984). The convention is now well-established whereby the European CHARME conference alternates with its biennial counterpart, the International Conference on Formal Methods in Computer-Aided Design (FMCAD), which is held on even-numbered years in the USA. The conference tookplace during 4-7 September 2001 at the Institute for System Level Integration in Livingston, Scotland. It was co-hosted by the - stitute and the Department of Computing Science of Glasgow University and co-sponsored by the IFIP TC10/WG10.5 Working Group on Design and En- neering of Electronic Systems. CHARME 2001 also included a scienti?c session and social program held jointly with the 14th International Conference on Th- rem Proving in Higher Order Logics (TPHOLs), which was co-located in nearby Edinburgh.
This book constitutes the refereed proceedings of the 13th International Conference on Computer Aided Verification, CAV 2001, held in Paris, France in July 2001.The 33 revised full papers presented were carefully reviewed and selected from 106 regular paper submissions; also included are 13 reviewed tool presentations selected from 27 submissions. The book offers topical sections on model checking and theorem proving, automata techniques, verification core technology, BDD and decision trees, abstraction and refinement, combinations, infinite state systems, temporal logics and verification, microprocessor verification and cache coherence, SAT and applications, and timed automata.
This book constitutes the refereed proceedings of the 9th Annual
European Symposium on Algorithms, ESA 2001, held in Aarhus,
Denmark, in August 2001.
This book constitutes the refereed proceedings of the International Workshop on OpenMP Applications and Tools, WOMPAT 2001, held in West Lafayette, IN, USA in July 2001.The 15 full papers presented were carefully reviewed and revised for inclusion in the volume. The book presents a state-of-the-art overview on OpenMP shared memory parallel programming. The papers are organized in topical sections on benchmarking, compiler implementation and optimization, tools and tool technology, OpenMP experience, NUMA machines and clusters, and OpenMP extensions.
Learn introductory concepts and definitions, accompanied with step-by-step examples you can build in Power Apps for practical business scenarios Key Features * Building your own example app to solve real-world business scenarios * Learn the best practices for creating apps with rich UX * Improve productivity with business process automation using Microsoft Power Automate Book Description Microsoft Power Apps provides a modern approach to building business applications that improve how we work on mobile, tablet, browser, and Microsoft Teams, also providing an enhanced UX for efficient workflow. Learn Microsoft Power Apps, 2nd Edition, starts with an introduction to Power Apps that will help you feel comfortable with the creation experience, before gradually progressing through app development. You will build, set up, and configure your first application by writing formulas that might remind you of Microsoft Excel. You'll learn to use a variety of built-in templates and understand the different types of apps available for a variety of business scenarios. Then, you'll learn how to generate and integrate apps directly with SharePoint, and gain an understanding of Power Apps key components such as connectors and formulas. As you advance, you'll be able to use various controls and data sources, including technologies such as GPS, and combine them to create a powerful and interactive app. Finally, the book will help you understand how Power Apps can use Microsoft Power Automate and Microsoft Azure functionalities to improve your applications. By the end of this Power Apps book, you'll be ready to develop lightweight business applications with little code. What you will learn * Understand Power Apps with an initial overview * Take your first steps building canvas apps * Learn the functionality to make your application rich with features * Experience new features of integration to build a unified platform * Develop your builds complexity with model-driven apps * Discover best practices for Power App builds and development Who This Book Is For This book is perfect for business analysts, IT professionals, non-developers, and developers new to Power Apps. If you want to meet business needs by creating high-productivity apps, this book is for you. This new edition will cover the essential elements for beginners, along with examples that will begin to encompass more advanced and complex topics. To make the most of this book, it is recommended that you have a basic understanding of Microsoft 365 as we will be interacting with it as we develop our apps.
This book constitutes the refereed proceedings of the 5th International Conference on Foundations of Software Science and Computation Structures, FOSSACS 2002, held in Grenoble, France, in April 2002.The 28 revised full papers presented together with an extended abstract of an invited paper were carefully reviewed and selected from a total of 67 submissions. Among the topics addressed are algebraic, categorical, logical, and geometric theories, models and methods which support the specification, synthesis, verification, analysis, and transformation of sequential, concurrent, distributed, and mobile programs and software systems.
This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on DNA-Based Computers, DNA 2000, held in Leiden, The Netherlands, in June 2000.The 16 revised full papers presented together with two invited papers were carefully reviewed and selected from 33 submissions. All current aspects of DNA computing, ranging from theoretical and foundational issues to algorithms, are addressed, from the computer science point of view as well as from the molecular biology point of view.
Books on information theory and coding have proliferated over the last few years, but few succeed in covering the fundamentals without losing students in mathematical abstraction. Even fewer build the essential theoretical framework when presenting algorithms and implementation details of modern coding systems.
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Algorithm Engineering, WAE 2000, held in Saarbrücken, Germany in September 2000. The 19 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 30 submissions. Among the topics addressed are software repositories allowing for the use and experimentation with efficient discrete algorithms; novel uses of discrete algorithms; methodological issues on algorithms and data structures; and methodological issues on converting user requirements into efficient algorithmic and implementation solutions.
Build your expertise in the BPF virtual machine in the Linux kernel with this practical guide for systems engineers. You'll not only dive into the BPF program lifecycle but also learn to write applications that observe and modify the kernel's behavior; inject code to monitor, trace, and securely observe events in the kernel; and more. Authors David Calavera and Lorenzo Fontana help you harness the power of BPF to make any computing system more observable. Familiarize yourself with the essential concepts you'll use on a day-to-day basis and augment your knowledge about performance optimization, networking, and security. Then see how it all comes together with code examples in C, Go, and Python. Write applications that use BPF to observe and modify the Linux kernel's behavior on demand Inject code to monitor, trace, and observe events in the kernel in a secure way-no need to recompile the kernel or reboot the system Explore code examples in C, Go, and Python Gain a more thorough understanding of the BPF program lifecycle
This volume contains the papers presented at the International Workshop on Tools for Working with Guidelines, (TFWWG 2000), held in Biarritz, France, in October 2000. It is the final outcome of the International Special Interest Group on Tools for Working with Guidelines.Human-computer interaction guidelines have been recognized as a uniquely relevant source for improving the usability of user interfaces for interactive systems. The range of interactive techniques exploited by these interactive systems is rapidly expanding to include multimodal user interfaces, virtual reality systems, highly interactive web-based applications, and three-dimensional user interfaces. Therefore, the scope of guidelines' sources is rapidly expanding as well, and so are the tools that should support users who employ guidelines to ensure some form of usability.Tools For Working With Guidelines (TFWWG) covers not only software tools that designers, developers, and human factors experts can use to manage multiple types of guidelines, but also looks at techniques addressing organizational, sociological, and technological issues.
Crypto2000wasthe20thAnnualCryptoconference. Itwassponsoredbythe InternationalAssociationforCryptologicResearch(IACR)incooperationwith theIEEEComputerSocietyTechnicalCommitteeonSecurityandPrivacyand theComputerScienceDepartmentoftheUniversityofCaliforniaatSantaB- bara. Theconferencereceived120submissions,andtheprogramcommittee- lected32oftheseforpresentation. Extendedabstractsofrevisedversionsof thesepapersareintheseproceedings. Theauthorsbearfullresponsibilityfor thecontentsoftheirpapers. Theconferenceprogramincludedtwoinvitedlectures. DonCoppersmith's presentation"ThedevelopmentofDES"recordedhisinvolvementwithoneof themostimportantcryptographicdevelopmentsever,namelytheDataEncr- tionStandard,andwasparticularlyaptgiventheimminentselectionofthe AdvancedEncryptionStandard. Mart'?nAbadi'spresentation"Tamingthe- versary"wasaboutbridgingthegapbetweenusefulbutperhapssimplisticthreat abstractionsandrigorousadversarialmodels,orperhaps,evenmoregenerally, betweenviewpointsofthesecurityandcryptographycommunities. Anabstract correspondingtoMart'?n'stalkisincludedintheseproceedings. Theconferenceprogramalsoincludeditstraditional"rumpsession"ofshort, informalorimpromptupresentations,chairedthistimebyStuartHaber. These presentationsarenotre?ectedintheseproceedings. Anelectronicsubmissionprocesswasavailableandrecommended,butforthe ?rsttimeusedawebinterfaceratherthanemail. (Perhapsasaresult,therewere nohardcopysubmissions. )Thesubmissionreviewprocesshadthreephases. In the?rstphase,programcommitteememberscompiledreports(assistedattheir discretionbysub-refereesoftheirchoice,butwithoutinteractionwithother programcommitteemembers)andenteredthem,viawebforms,intoweb-review softwarerunningatUCSD. Inthesecondphase,committeemembersusedthe softwaretobrowseeachother'sreports,discuss,andupdatetheirownreports. Lastlytherewasaprogramcommitteemeetingtodiscussthedi?cultcases. Iamextremelygratefultotheprogramcommitteemembersfortheiren- mousinvestmentoftime,e?ort,andadrenalineinthedi?cultanddelicate processofreviewandselection. (Alistofprogramcommitteemembersands- refereestheyinvokedcanbefoundonsucceedingpagesofthisvolume. )Ialso thanktheauthorsofsubmittedpapers-inequalmeasureregardlessofwhether theirpaperswereacceptedornot-fortheirsubmissions. Itistheworkofthis bodyofresearchersthatmakesthisconferencepossible. IthankRebeccaWrightforhostingtheprogramcommitteemeetingatthe AT&TbuildinginNewYorkCityandmanagingthelocalarrangements,and RanCanettifororganizingthepost-PC-meetingdinnerwithhischaracteristic gastronomicandoenophilic?air. VI Preface Theweb-reviewsoftwareweusedwaswrittenforEurocrypt2000byWim MoreauandJorisClaessensunderthedirectionofEurocrypt2000programchair BartPreneel,andIthankthemforallowingustodeploytheirusefulandcolorful tool. IammostgratefultoChanathipNamprempre(aka. Meaw)whoprovided systems,logistical,andmoralsupportfortheentireCrypto2000process. She wrotethesoftwarefortheweb-basedsubmissions,adaptedandranthew- reviewsoftwareatUCSD,andcompiledthe?nalabstractsintotheproceedings youseehere. ShetypesfasterthanIspeak. IamgratefultoHugoKrawczykforhisinsightandadvice,providedovera longperiodoftimewithhisusualcombinationofhonestyandcharm,andto himandotherpastprogramcommitteechairs,mostnotablyMichaelWiener andBartPreneel,forrepliestothehostofquestionsIposedduringthep- cess. InadditionIreceivedusefuladvicefrommanymembersofourcommunity includingSilvioMicali,TalRabin,RonRivest,PhilRogaway,andAdiShamir. FinallythankstoMattFranklinwhoasgeneralchairwasinchargeofthelocal organizationand?nances,and,ontheIACRside,toChristianCachin,Kevin McCurley,andPaulVanOorschot. ChairingaCryptoprogramcommitteeisalearningprocess. Ihavecometo appreciateevenmorethanbeforethequalityandvarietyofworkinour?eld, andIhopethepapersinthisvolumecontributefurthertoitsdevelopment. June2000 MihirBellare ProgramChair,Crypto2000 CRYPTO2000 August20-24,2000,SantaBarbara,California,USA Sponsoredbythe InternationalAssociationforCryptologicResearch(IACR) incooperationwith IEEEComputerSocietyTechnicalCommitteeonSecurityandPrivacy, ComputerScienceDepartment,UniversityofCalifornia,SantaBarbara GeneralChair MatthewFranklin,XeroxPaloAltoResearchCenter,USA ProgramChair MihirBellare,UniversityofCalifornia,SanDiego,USA ProgramCommittee AlexBiryukov...WeizmannInstituteofScience,Israel DanBoneh...StanfordUniversity,USA ChristianCachin...IBMResearch,Switzerland RanCanetti...IBMResearch,USA RonaldCramer...ETHZurich,Switzerland YairFrankel...CertCo,USA ShaiHalevi...IBMResearch,USA ArjenLenstra...Citibank,USA MitsuruMatsui...MitsubishiElectricCorporation,Japan PaulVanOorschot...EntrustTechnologies,Canada BartPreneel...KatholiekeUniversiteitLeuven,Belgium PhillipRogaway. ..UniversityofCalifornia,Davis,USA VictorShoup...IBMZurich,Switzerland JessicaStaddon...BellLabsResearch,PaloAlto,USA JacquesStern...EcoleNormaleSup'erieure,France DougStinson...UniversityofWaterloo,Canada SalilVadhan...MassachusettsInstituteofTechnology,USA DavidWagner...UniversityofCalifornia,Berkeley,USA RebeccaWright...AT&TLaboratoriesResearch,USA Advisorymembers MichaelWiener(Crypto1999programchair). . EntrustTechnologies,Canada JoeKilian(Crypto2001programchair)...Intermemory,USA VIII Organization Sub-Referees BillAiello,JeeheaAn,OlivierBaudron,DonBeaver,JoshBenaloh,JohnBlack, SimonBlackburn,AlexandraBoldyreva,NikitaBorisov,VictorBoyko,Jan- menisch,SureshChari,ScottContini,DonCoppersmith,ClaudeCr'epeau,Ivan Damg?ard,AnandDesai,GiovanniDiCrescenzo,YevgeniyDodis,Matthias Fitzi,MattFranklin,RosarioGennaro,GuangGong,LuisGranboulan,Nick Howgrave-Graham,RussellImpagliazzo,YuvalIshai,MarkusJakobsson,Stas Jarecki,ThomasJohansson,CharanjitJutla,JoeKilian,EyalKushilevitz,Moses Liskov,StefanLucks,AnnaLysyanskaya,PhilipMacKenzie,SubhamoyMaitra, TalMalkin,BarbaraMasucci,AlfredMenezes,DanieleMicciancio,SaraMiner, IliaMironov,MoniNaor,PhongNguyen,RafailOstrovsky,ErezPetrank,Birgit P?tzmann,BennyPinkas,DavidPointcheval,GuillaumePoupard,TalRabin, CharlieRacko? ,Zul?karRamzan,OmerReingold,LeoReyzin,PankajRohatgi, AmitSahai,LouisSalvail,ClausSchnorr,MikeSemanko,BobSilverman,Joe Silverman,DanSimon,NigelSmart,BenSmeets,AdamSmith,MartinStrauss, GaneshSundaram,SergeVaudenay,FrederikVercauteren,BernhardvonSt- gel,RuizhongWei,SusanneGudrunWetzel,ColinWilliams,StefanWolf,Felix Wu,YiqunLisaYin,AmirYoussef,RobertZuccherato TableofContents XTRandNTRU TheXTRPublicKeySystem...1 ArjenK. Lenstra,EricR. Verheul AChosen-CiphertextAttackagainstNTRU...20 ' ElianeJaulmes,AntoineJoux PrivacyforDatabases PrivacyPreservingDataMining ...36 YehudaLindell,BennyPinkas ReducingtheServersComputationinPrivateInformationRetrieval: PIRwithPreprocessing...55 AmosBeimel,YuvalIshai,TalMalkin SecureDistributedComputationandApplications ParallelReducibilityforInformation-TheoreticallySecureComputation...74 YevgeniyDodis,SilvioMicali OptimisticFairSecureComputation...93 ChristianCachin,JanCamenisch ACryptographicSolutiontoaGameTheoreticProblem...112 YevgeniyDodis,ShaiHalevi,TalRabin AlgebraicCryptosystems Di?erentialFaultAttacksonEllipticCurveCryptosystems...131 IngridBiehl,BerndMeyer,VolkerMul ..ler QuantumPublic-KeyCryptosystems ...1 47 TatsuakiOkamoto,KeisukeTanaka,ShigenoriUchiyama NewPublic-KeyCryptosystemUsingBraidGroups ...166 KiHyoungKo,SangJinLee,JungHeeCheon,JaeWooHan, Ju-sungKang,ChoonsikPark MessageAuthentication KeyRecoveryandForgeryAttacksontheMacDESMACAlgorithm ...184 DonCoppersmith,LarsR. Knudsen,ChrisJ. Mitchell X TableofContents CBCMACsforArbitrary-LengthMessages:TheThree-KeyConstructions 197 JohnBlack,PhillipRogaway L-collisionAttacksagainstRandomizedMACs...216 MichaelSemanko DigitalSignatures OntheExactSecurityofFullDomainHash...229 Jean-S' ebastienCoron TimedCommitments...236 DanBoneh,MoniNaor APracticalandProvably SecureCoalition-ResistantGroupSignatureScheme...255 GiuseppeAteniese,JanCamenisch,MarcJoye,GeneTsudik ProvablySecurePartiallyBlindSignatures...271 MasayukiAbe,TatsuakiOkamoto Cryptanalysis n WeaknessesintheSL (IF )HashingScheme...287 2 2 RainerSteinwandt,MarkusGrassl,WilliGeiselmann,ThomasBeth FastCorrelationAttacksthroughReconstructionofLinearPolynomials . . 300 ThomasJohansson,FredrikJ.. onsson TraitorTracingandBroadcastEncryption SequentialTraitorTracing...
Neural Networks are a new, interdisciplinary tool for information processing. Neurocomputing being successfully introduced to structural problems which are difficult or even impossible to be analysed by standard computers (hard computing). The book is devoted to foundations and applications of NNs in the structural mechanics and design of structures.
Middleware is everywhere. Ever since the advent of sockets and other virtu- circuit abstractions, researchers have been looking for ways to incorporate high- value concepts into distributed systems platforms. Most distributed applications, especially Internet applications, are now programmed using such middleware platforms. Prior to 1998, there were several major conferences and workshops at which research into middleware was reported, including ICODP (International C- ference on Open Distributed Processing), ICDP (International Conference on Distributed Platforms) and SDNE (Services in Distributed and Networked - vironments). Middleware'98was a synthesis of these three conferences. Middleware 2000 continued the excellent tradition of Middleware'98. It p- vided a single venue for reporting state-of-the-art results in the provision of distributed systems platforms. The focus of Middleware 2000 was the design, implementation, deployment, and evaluation of distributed systems platforms and architectures for future networked environments. Among the 70 initial submissions to Middleware 2000, 21 papers were - lected for inclusion in the technical program of the conference. Every paper was reviewed by four members of the program committee. The papers were judged - cording to their originality, presentation quality, and relevance to the conference topics. The accepted papers cover various subjects such as caching, re?ection, quality of service, and transactions.
This book provides a detailed account of real-time systems, including program structures for real-time, phases development analysis, and formal specification and verification methods of reactive systems.Real-Time and Multi-Agent Systems brings together the 3 key fields of current and future data-processing:- Distributed systems and applications;- Parallel scientific computing;- Real-time and manufacturing systems.It covers the basic concepts and theories, methods, techniques and tools currently used in the specification and implementation of applications and contains lots of examples as well as complete case studies.
Human Error and System Design and Management contains a collection
of contributions presented at an international workshop with the
same name held from March 24-26, 1999 at the Technical University
of Clausthal, Germany. The purpose of this workshop was to discuss
the results of a research project investigating the "Influences of
Human-Machine-Interfaces on the Error-proneness of Operator
Interaction with Technical Systems" in a broad context. Therefore
experts from academia and industry were invited to participate so
that practical as well as theoretical aspects of the subject matter
were covered. Topics included recent considerations concerning
multimedia and ecological interfaces as well as situation
awareness. |
![]() ![]() You may like...
The People's Web Meets NLP…
Iryna Gurevych, Jungi Kim
Hardcover
Information Retrieval and Natural…
Sheetal S. Sonawane, Parikshit N. Mahalle, …
Hardcover
R1,798
Discovery Miles 17 980
The Seven - Taking a Closer Look at What…
Lonnie Davis Wesley
Hardcover
Operator Theory and Harmonic Analysis…
Alexey N. Karapetyants, Vladislav V. Kravchenko, …
Hardcover
R6,433
Discovery Miles 64 330
|