This collection of contributions is offered to Jack van Lint on the occasion of his sixtieth birthday and appears simultaneously in the series Topics in Discrete Mathematics and as a special double volume of Discrete Mathematics (Volumes 106/107).
This book collects papers presented at the International Conference on Mathematical Modelling and Computational Intelligence Techniques (ICMMCIT) 2021, held at the Department of Mathematics, The Gandhigram Rural Institute (Deemed to be University), Gandhigram, Tamil Nadu, India, from 10-12 February 2021.
The history, formulas, and most famous puzzles of graph theoryGraph theory goes back several centuries and revolves around the study of graphs-mathematical structures showing relations between objects.
This book describes a complete revolution in software engineering based on complexity science through the establishment of NSE - Nonlinear Software Engineering paradigm which complies with the essential principles of complexity science, including the Nonlinearity principle, the Holism principle, the Complexity Arises From Simple Rules principle, the Initial Condition Sensitivity principle, the Sensitivity to Change principle, the Dynamics principle, the Openness principle, the Self-organization principle, and the Self-adaptation principle.
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems.
This award-winning textbook targets the gap between introductory texts in discrete mathematics and advanced graduate texts in enumerative combinatorics.
This book describes new theories and applications of artificial neural networks, with a special focus on addressing problems in neuroscience, biology and biophysics and cognitive research.
This book presents interdisciplinary, cutting-edge and creative applications of graph theory and modeling in science, technology, architecture and art.
An effective blend of carefully explained theory and practical applications, this text imparts the fundamentals of both information theory and data compression.
Hochfrequenztechnische Grundlagen und praxisrelevante Zusammenhänge werden vor dem Hintergrund einer schlankeren mathematischen Grundausbildung vermittelt.
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second Edition develops the theory of elliptic curves to provide a basis for both number theoretic and cryptographic applications.
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students, and practitioners a unique update on the latest advances in theory and a multitude of applications.
Focused on the mathematical foundations of social media analysis, Graph-Based Social Media Analysis provides a comprehensive introduction to the use of graph analysis in the study of social and digital media.
Covering Walks in Graphs is aimed at researchers and graduate students in the graph theory community and provides a comprehensive treatment on measures of two well studied graphical properties, namely Hamiltonicity and traversability in graphs.
This title provides a comprehensive survey over the subject of probabilistic combinatorial optimization, discussing probabilistic versions of some of the most paradigmatic combinatorial problems on graphs, such as the maximum independent set, the minimum vertex covering, the longest path and the minimum coloring.
This book treats the elements of discrete mathematics that have important applications in computer science, thus providing the necessary tools for the reader to come to a competent mathematical judgement of modern developments in the age of information.
Discover the properties and real-world applications of the Fibonacci and the Catalan numbers With clear explanations and easy-to-follow examples, Fibonacci and Catalan Numbers: An Introduction offers a fascinating overview of these topics that is accessible to a broad range of readers.
Algebraic combinatorics is the study of combinatorial objects as an extension of the study of finite permutation groups, or, in other words, group theory without groups.
This book contains recent contributions to the fields of rigidity and symmetry with two primary focuses: to present the mathematically rigorous treatment of rigidity of structures and to explore the interaction of geometry, algebra and combinatorics.
This book reports on the development and assessment of a novel framework for studying neural interactions (the connectome) and their dynamics (the chronnectome).
The present work investigates global politics and political implications of social science and management with the aid of the latest complexity and chaos theories.
Big Data of Complex Networks presents and explains the methods from the study of big data that can be used in analysing massive structural data sets, including both very large networks and sets of graphs.
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography.
This book discusses the origin of graph theory from its humble beginnings in recreational mathematics to its modern setting or modeling communication networks, as is evidenced by the World Wide Web graph used by many Internet search engines.
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes.