The discrete mathematics and theoretical computer science communities have recently witnessed explosive growth in the area of algorithmic combinatorics on words.
An update of the most accessible introductory number theory text available, Fundamental Number Theory with Applications, Second Edition presents a mathematically rigorous yet easy-to-follow treatment of the fundamentals and applications of the subject.
Emphasizing the search for patterns within and between biological sequences, trees, and graphs, Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R shows how combinatorial pattern matching algorithms can solve computational biology problems that arise in the analysis of genomic, transcriptomic, proteomic, metabolomic
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography.
Sums of Squares of Integers covers topics in combinatorial number theory as they relate to counting representations of integers as sums of a certain number of squares.
Introduction to Fuzzy Systems provides students with a self-contained introduction that requires no preliminary knowledge of fuzzy mathematics and fuzzy control systems theory.
Hilbert functions and resolutions are both central objects in commutative algebra and fruitful tools in the fields of algebraic geometry, combinatorics, commutative algebra, and computational algebra.
Sharkovsky's Theorem, Li and Yorke's "e;period three implies chaos"e; result, and the (3x+1) conjecture are beautiful and deep results that demonstrate the rich periodic character of first-order, nonlinear difference equations.
An effective blend of carefully explained theory and practical applications, this text imparts the fundamentals of both information theory and data compression.
Although much literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an accessible level.
Understanding the causes and effects of explosions is important to experts in a broad range of disciplines, including the military, industrial and environmental research, aeronautic engineering, and applied mathematics.
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems.
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field.
The Handbook of Finite Translation Planes provides a comprehensive listing of all translation planes derived from a fundamental construction technique, an explanation of the classes of translation planes using both descriptions and construction methods, and thorough sketches of the major relevant theorems.
While maintaining the lucidity of the first edition, Discrete Chaos, Second Edition: With Applications in Science and Engineering now includes many recent results on global stability, bifurcation, chaos, and fractals.
Unlike data communications of the past, today's networks consist of numerous devices that handle the data as it passes from the sender to the receiver.
Collecting results scattered throughout the literature into one source, An Introduction to Quasigroups and Their Representations shows how representation theories for groups are capable of extending to general quasigroups and illustrates the added depth and richness that result from this extension.
The study of random sets is a large and rapidly growing area with connections to many areas of mathematics and applications in widely varying disciplines, from economics and decision theory to biostatistics and image analysis.
Continuing in the bestselling, informative tradition of the first edition, the Handbook of Combinatorial Designs, Second Edition remains the only resource to contain all of the most important results and tables in the field of combinatorial design.
Get an In-Depth Understanding of Graph Drawing Techniques, Algorithms, Software, and ApplicationsThe Handbook of Graph Drawing and Visualization provides a broad, up-to-date survey of the field of graph drawing.
From its origins in algebraic number theory, the theory of non-unique factorizations has emerged as an independent branch of algebra and number theory.
Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems.
Introduction to Modern Cryptography, the most relied-upon textbook in the field, provides a mathematically rigorous yet accessible treatment of this fascinating subject.
Tsutomu Sasao - Kyushu Institute of Technology, Japan The material covered in this book is quite unique especially for p- ple who are reading English, since such material is quite hard to ?
The problem of counting the number of self-avoiding polygons on a square grid, - therbytheirperimeterortheirenclosedarea,is aproblemthatis soeasytostate that, at ?
'A Geometry of Approximation' addresses Rough Set Theory, a field of interdisciplinary research first proposed by Zdzislaw Pawlak in 1982, and focuses mainly on its logic-algebraic interpretation.
Stochastic geometry, based on current developments in geometry, probability and measure theory, makes possible modeling of two- and three-dimensional random objects with interactions as they appear in the microstructure of materials, biological tissues, macroscopically in soil, geological sediments etc.
Optimization Theory is becoming a more and more important mathematical as well as interdisciplinary area, especially in the interplay between mathematics and many other sciences like computer science, physics, engineering, operations research, etc.
This is a comprehensive overview of the basics of fuzzy control, which also brings together some recent research results in soft computing, in particular fuzzy logic using genetic algorithms and neural networks.
Real-Time Applications with Stochastic Task Execution Times presents three approaches to the analysis of the deadline miss ratio of applications with stochastic task execution times.
Logic functions and equations are (some of) the most important concepts of Computer Science with many applications such as Binary Arithmetics, Coding, Complexity, Logic Design, Programming, Computer Architecture and Artificial Intelligence.