Threshold Logic by Sze-Tsen Hu offers the first comprehensive treatment of logical elements based on the threshold principle, devices that had attracted growing attention in the wake of McCulloch and Pitts's 1943 neuron models and von Neumann's investigations into reliability.
Blockchain and Digital Twin Applications in Smart Agriculture presents scenarios, solutions, applications to optimize crop management, improve resource allocation, and enhance sustainability in modern farming practices.
The model theory of fields is a fascinating subject stretching from Tarski's work on the decidability of the theories of the real and complex fields to Hrushovksi's recent proof of the Mordell-Lang conjecture for function fields.
A Classroom-Tested, Alternative Approach to Teaching Math for Liberal Arts Puzzles, Paradoxes, and Problem Solving: An Introduction to Mathematical Thinking uses puzzles and paradoxes to introduce basic principles of mathematical thought.
From Zero to Infinity is a combination of number lore, number history, and sparkling descriptions of the simply stated but exceedingly difficult problems posed by the most ordinary numbers that first appeared in 1955 and has been kept in print continuously ever since.
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important.
Irreducible Tensorial Sets discusses mathematical methods originating from the theory of coupling and recoupling of angular momenta in atomic physics that constitute an extension of vector and tensor algebra.
A compilation of papers presented at the 1999 European Summer Meeting of the Association for Symbolic Logic, Logic Colloquium '99 includes surveys and research articles from some of the world's preeminent logicians.
Wearing Gauss's Jersey focuses on "e;Gauss problems,"e; problems that can be very tedious and time consuming when tackled in a traditional, straightforward way but if approached in a more insightful fashion, can yield the solution much more easily and elegantly.
Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems.
Origami5 continues in the excellent tradition of its four previous incarnations, documenting work presented at an extraordinary series of meetings that explored the connections between origami, mathematics, science, technology, education, and other academic fields.
Logicism, as put forward by Bertrand Russell, was predicated on a belief that all of mathematics can be deduced from a very small number of fundamental logical principles.
Discrete Mathematics: An Open Introduction, Fourth Edition aims to provide an introduction to select topics in discrete mathematics at a level appropriate for first or second year undergraduate math and computer science majors, especially those who intend to teach middle and high school mathematics.
Bridging the gap between procedural mathematics that emphasizes calculations and conceptual mathematics that focuses on ideas, Mathematics: A Minimal Introduction presents an undergraduate-level introduction to pure mathematics and basic concepts of logic.
Applicable to any problem that requires a finite number of solutions, finite state-based models (also called finite state machines or finite state automata) have found wide use in various areas of computer science and engineering.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field.
Exploring the intersection of ethics and statistics, this comprehensive guide illustrates the proper use of probabilistic and statistical reasoning in the behavioral, social, and biomedical sciences.
The Most Progressive and Complete Guide to DDO-Based CiphersDevelopers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs).
Unexpected Expectations: The Curiosities of a Mathematical Crystal Ball explores how paradoxical challenges involving mathematical expectation often necessitate a reexamination of basic premises.
The tradition of a publication based on the Gathering for Gardner continues with this new carefully selected and edited collection in which Martin Gardner and friends inspire and entertain.
An exploration of the construction and analysis of translation planes to spreads, partial spreads, co-ordinate structures, automorphisms, autotopisms, and collineation groups.
Reverse Mathematics is a program of research in the foundations of mathematics, motivated by the foundational questions of what are appropriate axioms for mathematics, and what are the logical strengths of particular axioms and particular theorems.
Designed for crafters, puzzle lovers, and pattern designers alike, Crafting Conundrums: Puzzles and Patterns for the Bead Crochet Artist provides methods, challenges, and patterns that offer a springboard for creative exploration.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents.