In this era of heterogeneous and distributed data sources, ranging from semistructured documents to knowledge about coordination processes or workflows, logic provides a rich set of tools and techniques with which to address the questions of how to represent, query and reason about complex data.
All over the world sport plays a prominent role in society: as a leisure activity for many, as an ingredient of culture, as a business and as a matter of national prestige in such major events as the World Cup in soccer or the Olympic Games.
The lectures concentrate on highlights in Combinatorial (ChaptersII and III) and Number Theoretical (ChapterIV) Extremal Theory, in particular on the solution of famous problems which were open for many decades.
In wavelet analysis, irregular wavelet frames have recently come to the forefront of current research due to questions concerning the robustness and stability of wavelet algorithms.
This book starts with an overview of the research of Grobner bases which have many applications in various areas of mathematics since they are a general tool for the investigation of polynomial systems.
Domain decomposition methods provide powerful and flexible tools for the numerical approximation of partial differential equations arising in the modeling of many interesting applications in science and engineering.
The SPIN workshop is a forum for researchers interested in the subject of automata-based, explicit-state model checking technologies for the analysis and veri?
These lecture notes by very authoritative scientists survey recent advances of mathematics driven by industrial application showing not only how mathematics is applied to industry but also how mathematics has drawn benefit from interaction with real-word problems.
This book delivers up-to-date reviews of progress in ultrafast intense laser science, an expanding interdisciplinary research field spanning atomic and molecular physics, molecular science, solid state physics, and optical science, which has been stimulated by the recent developments in ultrafast laser technologies.
This book constitutes the proceedings of several workshops which were held in conjunction with the MICAI 2025 International Workshops on Advances in Computational Intelligence, MICAI 2025, held in Guanajuato, Mexico, during November 3–7, 2025.
This book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Design, Specification, and Verification of Interactive Systems, DSV-IS 2003, held in Funchal, Madeira Island, Portugal, in June 2003.
The two volume set LNCS 3102/3103 constitutes the refereed proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2004, held in Seattle, WA, USA, in June 2004.
This volume contains the proceedings of EuroGP 2000, the European Conf- ence on Genetic Programming, held in Edinburgh on the 15th and 16th April 2000.
This book constitutes the refereed proceedings of the Second European Workshop on Genetic Programming, EuroPG '99, held in Goteborg, Sweden in May 1999.
In this volume we present the accepted contributions to the Sixth European Conference on Genetic Programming (EuroGP 2003) which took place at the University of Essex, UK on 14-16 April 2003.
The two volume set LNCS 3102/3103 constitutes the refereed proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2004, held in Seattle, WA, USA, in June 2004.
This book is a collection of selected papers presented at the 28th FAI International Conference on Digitalisation and Artificial Intelligence Revolution in Business Management (28th FAI-DAIRBM 2024), held at UNEC Business School, Azerbaijan State University of Economics, Baku, Azerbaijan, from 18–20 April 2024.
This book is a collection of selected papers presented at the 28th FAI International Conference on Digitalisation and Artificial Intelligence Revolution in Business Management (28th FAI-DAIRBM 2024), held at UNEC Business School, Azerbaijan State University of Economics, Baku, Azerbaijan, from 18–20 April 2024.
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key.
Graph algorithms are easy to visualize and indeed there already exists a variety of packages to animate the dynamics when solving problems from graph theory.