Type d'article
Etat
Reliure
Particularités
Pays
Evaluation du vendeur
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540004033ISBN 13 : 9783540004035
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The authorsconsider applications of singularity theory and computer algebra to bifurcations of Hamiltonian dynamical systems. They restrict themselves to the case were the following simplification is possible. Near the equilibrium or (quasi-) periodic solution under consideration the linear part allows approximation by a normalized Hamiltonian system with a torus symmetry. It is assumed that reduction by this symmetry leads to a system with one degree of freedom. The volume focuses on two such reduction methods, the planar reduction (or polar coordinates) method and the reduction by the energy momentum mapping. The one-degree-of-freedom system then istackled by singularity theory, where computer algebra, in particular, Gröbner basis techniques, are applied. The readership addressed consists of advanced graduate students and researchers in dynamical systems. 188 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540004025ISBN 13 : 9783540004028
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In image processing, 'motions by curvature' provide an efficient way to smooth curves representing theboundaries of objects. In such a motion, each point of the curve moves, at any instant, with a normal velocity equal to a function of the curvature at this point. This book is a rigorous and self-contained exposition of the techniques of 'motion by curvature'. The approach is axiomatic and formulated in terms of geometric invariance with respect to the position of the observer. This is translated into mathematical terms, and the author develops the approach of Olver, Sapiro and Tannenbaum, which classifies all curve evolution equations. He then draws a complete parallel with another axiomatic approach using level-set methods: this leads to generalized curvature motions. Finally, novel, and very accurate, numerical schemes are proposed allowing oneto compute the solution of highly degenerate evolution equations in a completely invariant way. The convergence of this scheme is also proved. 204 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540005609ISBN 13 : 9783540005605
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -These notes deal with deformation theory of complex analytic singularities and related objects. The first part treats general theory. The central notion is that of versal deformationin several variants. The theory is developed both in an abstract way and in a concrete way suitable for computations.The second part deals with more specific problems, specially on curves and surfaces. Smoothings of singularities are the main concern.Examples are spread throughout the text. 172 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540004831ISBN 13 : 9783540004837
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Buch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Supernovae, their bearing on cosmology and their connection to gamma-ray bursts are now at the center of astrophysical research programs. This volume deals with astronomical observations of supernovae and their relation to nuclear and particle astrophysics. All known aspects of supernovae explosions are investigated in articles specifically written for researchers and advanced graduate students. It also includes recent numerical 'experiments' related to the question of hydrodynamical instability in two and three dimensions and to problems concerning the complexity of radiation transport in the models. Other contributions discuss the possible energy sources needed to drive these powerful stellar explosions. 436 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540007458ISBN 13 : 9783540007456
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the thoroughly refereed post-proceedings of the Web- and Database-Related Workshops held during the NetObjectDays international conference NODe 2002, in Erfurt, Germany, in October 2002.The 19 revised full papers presented together with 3 keynote papers were carefully selected during2 rounds of reviewing and improvement. The papers are organized in topical sections on advanced Web-services, UDDI extensions, description and classification of Web services, applications based on Web-services, indexing and accessing, Web and XML databases, mobile devices and the Internet, and XML query languages. 328 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540004637ISBN 13 : 9783540004639
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Buch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Over the past decades, the Boundary Element Method has emerged as a ver satile and powerful tool for the solution of engineering problems, presenting in many cases an alternative to the more widely used Finite Element Method. As with any numerical method, the engineer or scientist who applies it to a practical problem needs to be acquainted with, and understand, its basic principles to be able to apply it correctly and be aware of its limitations. It is with this intention that we have endeavoured to write this book: to give the student or practitioner an easy-to-understand introductory course to the method so as to enable him or her to apply it judiciously. As the title suggests, this book not only serves as an introductory course, but also cov ers some advanced topics that we consider important for the researcher who needs to be up-to-date with new developments. This book is the result of our teaching experiences with the Boundary Element Method, along with research and consulting activities carried out in the field. Its roots lie in a graduate course on the Boundary Element Method given by the authors at the university of Stuttgart. The experiences gained from teaching and the remarks and questions of the students have contributed to shaping the 'Introductory course' (Chapters 1-8) to the needs of the stu dents without assuming a background in numerical methods in general or the Boundary Element Method in particular. 504 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540443851ISBN 13 : 9783540443858
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Buch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Invasive software composition as a new, component-based way to construct software systems is presented. To improve reuse, this method regards software components as greybox and integrates them during composition. Components are distinct in design, but are merged in implementations, leading to highly integrated and more efficient systems. Building on a minimal set of program transformations, composition operator libraries can be developed that parameterize, extend, connect, mediate, and aspect-weave components. Invasive software composition unifies several software engineering techniques such as generic programming, architecture systems, inheritance, and aspect-oriented programming. The book is centered around the JAVA language and a freely available demonstrator library called COMPOST. The book provides a wealth of material for researchers, students and professional software architects alike. 348 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540005315ISBN 13 : 9783540005315
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Biomolecular computing has emerged as an interdisciplinary eld that draws - gether chemistry, computer science, mathematics, molecular biology, and physics. Our knowledge on DNA nanotechnology and biomolecular computing increases exponentially with every passing year. The international meeting on DNA Based Computers has been a forum where scientists with di erent backgrounds, yet sharing a common interest in biomolecular computing, meet and present their latest results. Continuing this tradition, the 8th International Meeting on DNA Based Computers (DNA8) focuses on the current theoretical and experimental results with the greatest impact. Papers and poster presentations were sought in all areas that relate to b- molecular computing, including (but not restricted to): algorithms and appli- tions, analysis of laboratory techniques/theoretical models, computational p- cesses in vitro and in vivo, DNA-computing-based biotechnological applications, DNA devices, error evaluation and correction, in vitro evolution, models of biomolecular computing (using DNA and/or other molecules), molecular - sign, nucleic acid chemistry, and simulation tools. Papers and posters with new experimental results were particularly encouraged. Authors who wished their work to be considered for either oral or poster presentation were asked to select from one of two submission 'tracks': - Track A - Full Paper - Track B - One-Page Abstract For authors with late-breaking results, or who were submitting their manuscript to a scienti c journal, a one-page abstract, rather than a full paper, could be submitted in Track B. Authors could (optionally) include a preprint of their full paper, for consideration only by the program committee. 356 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540006796ISBN 13 : 9783540006794
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -FIDJI 2002 was an international forum for researchers and practitioners in- rested in the advances in, and applications of, software engineering for distri- ted application development. Concerning the technologies, the workshop focused on 'Java-related' technologies. It was an opportunity to present and observe the latest research, results, and ideas in these areas. All papers submitted to this workshop were reviewed by at least two members of the International Program Committee. Acceptance was based primarily on the originality and contribution. We selected for these postworkshop proceedings 16 papers amongst 33 submitted, two tutorials, and two keynotes. FIDJI 2002 was aimed at promoting a scienti c approach to software engin- ring. The scope of the workshop included the following topics: - design of distributed Java applications - Java-related technologies - software and system architecture engineering and development methodo- gies - development methodologies for UML - development methodologies for reliable distributed systems - component-based development methodologies - management of evolutions/iterations in the analysis, design, implementation, and test phases - dependability support during system lifecycle - managing inconsistencies during application development - atomicity and exception handling in system development - software architectures, frameworks, and design patterns for developing d- tributed systems - integration of formal techniques in the development process - formal analysis and grounding of modeling notation and techniques (e. g. 220 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540007423ISBN 13 : 9783540007425
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the thoroughly refereed post-proceedings of the three agent-related workshops held during the NetObjectDays international conference, NODe 2002, held in Erfurt, Germany, in October 2002.The 23 revised full papers presented with a keynote paper and 2 abstracts were carefully selected during 2 rounds of reviewing and improvement. The papers are organized in topical sections on agent-oriented requirements engineering and specification, agent-oriented software engineering, reuse, negotiation and communication, large complex systems, e-business, and applications. 396 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540003517ISBN 13 : 9783540003519
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -the solution or its gradient. These new discretization techniques are promising approaches to overcome the severe problem of mesh-generation. Furthermore, the easy coupling of meshfree discretizations of continuous phenomena to dis crete particle models and the straightforward Lagrangian treatment of PDEs via these techniques make them very interesting from a practical as well as a theoretical point of view. Generally speaking, there are two different types of meshfree approaches; first, the classical particle methods [104, 105, 107, 108] and second, meshfree discretizations based on data fitting techniques [13, 39]. Traditional parti cle methods stem from physics applications like Boltzmann equations [3, 50] and are also of great interest in the mathematical modeling community since many applications nowadays require the use of molecular and atomistic mod els (for instance in semi-conductor design). Note however that these methods are Lagrangian methods; i. e. , they are based On a time-dependent formulation or conservation law and can be applied only within this context. In a particle method we use a discrete set of points to discretize the domain of interest and the solution at a certain time. The PDE is then transformed into equa tions of motion for the discrete particles such that the particles can be moved via these equations. After time discretization of the equations of motion we obtain a certain particle distribution for every time step. 208 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540005803ISBN 13 : 9783540005803
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -AlegendsaysthatJackEdmondsshouted Eureka youshrink! whenhefound a good characterization for matching (and the matching algorithm) in 1963, the daybeforehistalkatasummerworkshopatRANDCorporationwithcelebrities like George Dantzig, Ralph Gomory, and Alan Ho man in the audience. During Aussois 2001, Jack con rmed: Eureka you shrink! is really true, except that instead of Eureka it maybe was some less digni ed word. Aussois 2001 was the fth in an annual series of workshops on combinatorial optimization that are alternately organized by Thomas Liebling, Denis Naddef, andLaurenceWolsey theinitiatorsofthisseries inevenyearsandtheeditors of this book in odd years (except 1997). We decided to dedicate Aussois 2001 to Jack Edmonds in appreciation of his groundbreaking work that laid the foundations of much of what combinatorial optimizers have done in the last 35 years. Luckily, Jack is a regular participant of the Aussois workshops and, as ever, he cares a lot for young combinatorial optimizers who traditionally play a major r ole in the Aussois series. Fig.1. Handout for the Aussois 2001 participants VI Preface Highlights of Aussois 2001 included a special session entitled Eureka you shrink! in honor of Jack and a special lecture by Jack on Submodular Fu- tions, Matroids, and Certain Polyhedra that closed the workshop. In this book, we give an account of the Eureka you shrink! session as well as reprints of three hardly accessible papers that Jack gave as a handout to the Aussois 2001 participants and that were originally published in theProceedings oftheCalgaryInternationalConferenceonCombinatorialStructuresandTheir Applications 1969, Gordon and Breach (1970) newly typeset by the editors and reprinted by permission. 224 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 354000565XISBN 13 : 9783540005650
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The second Privacy Enhancing Technologies workshop (PET2002), held April 14 15, 2002 in San Francisco, California, continued the enthusiasm and quality of the rst workshop in July 2000 (then called Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, LNCS 2009). The workshop focused on the design and realization of anonymity and an- censorship services for the Internet and other communication networks. For c- venienceitwasheldattheCathedralHillHoteljustpriortotheTwelfthConf- ence on Computers, Freedom, and Privacy (CFP2002), but it was not formally a liated with that conference. There were 48 submissions of which we accepted 17. The program committee listed on the next page made the di cult decisions on which papers to accept, with additional reviewing help from Oliver Berthold, Sebastian Clauß, Lorrie Cranor, Stefan K opsell, Heinrich Langos, Nick Mathewson, and Sandra Ste- brecher. Thanks to all who helped and apologies to anyone we have overlooked. Thanks also to everyone who contributed a submission. Besides the contributed papers we were honored to have an invited talk by someone who as much as anyone could be said to have started the entire technology eld of anonymity and privacy: David Chaum. The talk covered his recently developed voting technology based on visual secret sharing, and as if thatweren tenough,alsodescribednewprimitivesforelectroniccash.Therewas also a lively rump session, covering a variety of new and upcoming technologies. 252 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 354000730XISBN 13 : 9783540007302
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The idea of evolving machines, whose origins can be traced to the cybernetics movementofthe1940sand1950s,hasrecentlyresurgedintheformofthenascent eld of bio-inspired systems and evolvable hardware. The inaugural workshop, Towards Evolvable Hardware, took place in Lausanne in October 1995, followed by the First International Conference on Evolvable Systems: From Biology to Hardware (ICES), held in Tsukuba, Japan in October 1996. The second ICES conference was held in Lausanne in September 1998, with the third and fourth being held in Edinburgh, April 2000 and Tokyo, October 2001 respectively. This has become the leading conference in the eld of evolvable systems and the 2003 conference promised to be at least as good as, if not better than, the four that preceeded it. The fth international conference was built on the success of its predec- sors, aiming at presenting the latest developments in the eld. In addition, it brought together researchers who use biologically inspired concepts to imp- ment real systems in arti cial intelligence, arti cial life, robotics, VLSI design and related domains. We would say that this fth conference followed on from the previous four in that it consisted of a number of high-quality interesting thought-provoking papers. 488 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540005676ISBN 13 : 9783540005674
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The Twelfth International Conference on Inductive Logic Programming was held in Sydney, Australia, July 9-11, 2002. The conference was colocated with two other events, the Nineteenth International Conference on Machine Learning (ICML2002) and the Fifteenth Annual Conference on Computational Learning Theory (COLT2002). Startedin1991,InductiveLogicProgrammingistheleadingannualforumfor researchers working in Inductive Logic Programming and Relational Learning. Continuing a series of international conferences devoted to Inductive Logic Programming and Relational Learning, ILP 2002 was the central event in 2002 for researchers interested in learning relational knowledge from examples. The Program Committee, following a resolution of the Community Me- ing in Strasbourg in September 2001, took upon itself the issue of the possible change of the name of the conference. Following an extended e-mail discussion, a number of proposed names were subjected to a vote. In the rst stage of the vote, two names were retained for the second vote. The two names were: Ind- tive Logic Programming, and Relational Learning. It had been decided that a 60% vote would be needed to change the name; the result of the vote was 57% in favor of the name Relational Learning. Consequently, the name Inductive Logic Programming was kept. 368 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540006117ISBN 13 : 9783540006114
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This volume originated in the Workshop on Membrane Computing, WMC- CdeA 2002, which took place in Curtea de Arge s, Romania, during August 19 23, 2002.This was the third annual workshop held in Curtea de Arge s.The rst one, Workshop on Multiset Processing, WMP-CdeA 2000, took place in August 2000, and the proceedings were published in Lecture Notes in Computer Science, volume 2235.The second one, Workshop on Membrane Comp- ing, WMC-CdeA 2001, took place in August 2001, and selected papers were published as a special issue of Fundamenta Informaticae, volume 49, numbers 1 3, 2002. The aim of these workshops is to provide a stimulating environment for - searchers working in the area covered by a given workshop, so that existing sci- ti c collaborations can be strengthened, and new collaborations (and friendships) can be initiated.Indeed, all three workshops held up to now were of such ch- acter, with very international attendance and collaboration taking place across national and scienti c boundaries. 436 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540007164ISBN 13 : 9783540007166
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics. 564 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540781064ISBN 13 : 9783540781066
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -he desire to teach and the fulfillment attained from teaching T have again prompted us to produce a work that we hope will be both useful and enlightening to our readers. The field of oculoplastic surgery has grown and evolved to include all aspects of eyelid and facial plastic surgery. Our literature must now reflect the advancements and direction of our field. Knowledge of anatomy, the basis of all surgery and the root of surgical princi pIes and techniques, is the basis of our ability to deli ver the highest quality care to our patients. We have therefore combined text and diagrams, and supplemented them with CD-ROM digital video technology to provide to those who wish to perform this surgery the best possible instruction and prepa ration. We hope that our attempts to accomplish this will be rewarded by the use of our material by our colleagues and the acknowledgment of our unique and logical progression in the field of eyelid and facial plastic surgery. Future volumes in this series will cover other aspects of eyelid, lacrimal, facial, and orbital surgery. 128 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540007377ISBN 13 : 9783540007371
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the thoroughly refereed post-proceedings of the international conference NetObjectDays 2002, held in Erfurt, Germany, in October 2002.The 26 revised full papers presented were carefully selected during two rounds of reviewing and revision. The papers are organized in topical sections on embedded and distributed systems; components and MDA; Java technology; Web services; aspect-oriented software design; agents and mobility; software product lines; synchronization; testing, refactoring, and CASE tools. 448 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 354000646XISBN 13 : 9783540006466
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The Sixth International Financial Cryptography Conference was held during March 11-14, 2002, in Southampton, Bermuda. As is customary at FC, these proceedings represent 'final' versions of the papers presented, revised to take into account comments and discussions from the conference. Submissions to the conference were strong, with 74 papers submitted and 19 accepted for presentation and publication. (Regrettably, three of the submit ted papers had to be summarily rejected after it was discovered that they had been improperly submitted in parallel to other conferences.) The small program committee worked very hard under a tight schedule (working through Christmas day) to select the program. No program chair could ask for a better committee; my thanks to everyone for their hard work and dedication. In addition to the refereed papers, the program included a welcome from the Minister of Telecommunications and e-Commerce, Renee Webb, a keynote address by Nigel Hickson, and a panel on privacy tradeoffs cheiired by Rebecca Wright (with panelists Ian Goldberg, Ron Rivest, and Graham Wood). The traditional Tuesday evening 'rump session' was skillfully officiated by Markus Jakobsson. My job as program chair was made much, much easier by the excellent work of our general chair, Nicko van Someren, who performed the miracle of hiding from me any evidence of the innumerable logistical nightmares associated with conducting this conference. I have no idea how he did it, but it must have involved many sleepless nights. 316 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540676236ISBN 13 : 9783540676232
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Buch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The use of constraints had its scientific and commercial breakthrough in the 1990s. Programming with constraints makes it possible to model and specify problems with uncertain, incomplete information and to solve combi natorial problems, as they are abundant in industry and commerce, such as scheduling, planning, transportation, resource allocation, layout, design, and analysis. This book is a short, concise, and complete presentation of constraint programming and reasoning, covering theoretical foundations, algorithms, implementations, examples, and applications. It is based on more than a decade of experience in teaching and research about this subject. This book is intended primarily for graduate students, researchers, and practitioners in diverse areas of computer science and related fields, including programming languages, computational logic, symbolic computation, and ar tificial intelligence. The book is complemented by a web-page with teaching material, software, links, and more. We take the reader on a step-by-step journey through the world of constraint-based programming and constraint reasoning. Feel free to join in . Acknowledgements Thorn thanks his wife Andrea and his daughter Anna - for everything. He dedicates his contribution to the book to the memory of his mother, Grete. Slim thanks his wife N abila and his daughters Shirine and Amira for their ongoing support and patience. 160 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 354000713XISBN 13 : 9783540007135
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Over the past three decades, software engineers have derived a progressively better understanding of the characteristics of complexity in software. It is now widely recognised thatinteraction is probably the most important single char- teristic of complex software. Software architectures that contain many dyna- cally interacting components, each with their own thread of control, and eng- ing in complex coordination protocols, are typically orders of magnitude more complex to correctly and e ciently engineer than those that simply compute a function of some input through a single thread of control. Unfortunately, it turns out that many (if not most) real-world applications have precisely these characteristics. As a consequence, a major research topic in c- puter science over at least the past two decades has been the development of tools and techniques to model, understand, and implement systems in which interaction is the norm. Indeed, many researchers now believe that in future computation itself will be understood as chie y a process of interaction. 244 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540006222ISBN 13 : 9783540006220
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), Univ- sity of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshopis to provide a relaxedatmosphere in which researchersin cr- tography can present and discuss new work on selected areasof current interest. The traditional themes for SAC workshops are: Design and analysis of symmetric key cryptosystems. Primitives for private-key cryptography,including block and streamciphers, hash functions, and MACs. E cientimplementationofcryptographicsystems inpublic- andprivate-key cryptography. The special theme for SAC 2002 was: Cryptographic solutions for mobile and wireless network security. The local historic connections can be described in three words: communi- tions, transatlantic,and wireless.After JohnCabot discoveredNewfoundland at the end of the 15th century, sea communication was established between that eastern outpost of the Western Hemisphere and Europe. Also in Newfoundland is Hearts Content where the rst successful transatlantic cable was landed in 1866.Mostremarkably,onDecember12,1901,GuglielmoMarconireportedfrom Signal Hill near St. John s that he successfully received the rst transatlantic wireless signals, three dots, the Morse coding of letter S, sent from Cornwall, UK. 424 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540007369ISBN 13 : 9783540007364
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the thoroughly refereed joint post-proceedings of the VLDB 2002 Workshop on Efficiency and Effectiveness of XML Tools and Techniques, EEXTT and the CAiSE 2002 Workshop on Data Integration over the Web, DIWeb.The 10 revised full papers presented were carefully selected during two rounds of reviewing and revision. The papers are organized in topical sections on XML languages, XML modeling and integration, XML storage, benchmarking XML, and data integration over the Web. 276 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 354000579XISBN 13 : 9783540005797
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -By presenting state-of-the-art aspects of theoretical computer science and practical applications in various fields, this book commemorates the 60th birthday of Thomas Ottmann. The 26 research papers presented span the whole range of Thomas Ottmann's scientific career, from formal languages to algorithms and data structures, from topics in practical computer science like software engineering or database systems to applications of Web technology, groupware, and e-learning. 372 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540007318ISBN 13 : 9783540007319
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The 18 revised full papers presented in this book together with an introductorysurvey were carefully reviewed and constitutethe documentation of the Second International Workshop on Self-adaptive Software, IWSAS 2001, held in Balatonfüred, Hungary in May 2001.Self-adaptive software evaluates its own behavior and changes it when the evaluation indicates that the software does not accomplish what it is intended to do or when better functionality or better performance is possible. The self-adaptive approach in software engineering builds on well known dynamic features familiar to Lisp or Java programmes and aims at improving the robustness of software systems by gradually adding new features of self-adaption or autonomy. 304 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540006249ISBN 13 : 9783540006244
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the 10th International Workshop on Abstract State Machines, ASM 2003, held in Taormina, Italy in March 2003.The 16 revised full papers presented together with 8 invited papers and 12 abstracts were carefully reviewed and selected for inclusion in the book. The papers reflect the state of the art of the abstract state machine method for the design and analysis of complex software/hardware systems. Besides theoretical results and methodological progress, application in various fields are studied as well. 448 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 354000680XISBN 13 : 9783540006800
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The 20 revised full papers presented in this book together with 4 section surveys were carefully reviewed and selected from the papers contributed to the 14th International Conference on Applications of Prolog, INAP 2001, held in Tokyo, Japan, in October 2002.The papers are devoted to the four tightly interwoven aspects knowledge acquisition, knowledge management, knowledge processing, and knowledge distribution, all in the context of the World Wide Web; they are organized in topical sections on Web languages and logic, knowlege acquisition and knowledge representation, decision support by advanced logic programming, and Web-knowledge management and data mining. The book is targeted to designers and users of e-business systems and e-government systems, for IT professionals who build such systems, as well as for the wider audience interested in the technical background of knowledge processing for the Web. 324 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540005684ISBN 13 : 9783540005681
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This volume contains the proceedings of theSecondInternationalConferenceon MathematicalKnowledgeManagement (MKM 2003), held 16 18 February 2003 in Bertinoro, Italy. Mathematical Knowledge Management is an exciting new eld at the int- section between mathematics and computer science. We need e cient, new te- niques, based on sophisticated formal mathematics and software technology, to exploit the enormous knowledge available in current mathematical sources and to organize mathematical knowledge in a new way. On the other side, due to its verynature,therealmofmathematicalinformationlookslikethebestcandidate for testing innovative theoretical and technological solutions for content-based systems, interoperability, management of machine-understandable information, and the Semantic Web. The organizers are grateful to Dana Scott and Massimo Marchiori for agr- ing to give invited talks at MKM 2003. November 2002 AndreaAsperti BrunoBuchberger JamesDavenport Conference Organization Andrea Asperti (Program Chair) Luca Padovani (Organizing Chair) Program Commitee A. Asperti (Bologna) P. D. F. Ion (Michigan) B. Buchberger (RISC Linz) Z. Luo (Durham) J. Caldwell (Wyoming) R. Nederpelt (Eindhoven) O. Caprotti (RISC Linz) M. Sofroniou (Wolfram Research Inc. ) J. Davenport (Bath) N. Soi er (Wolfram Research Inc. ) W. M. Farmer (McMaster Univ. ) M. Suzuki (Kyushu) H. Geuvers (Nijmegen) N. Takayama (Kobe) T. Hardin (Paris 6) A. Trybulec (Bialystok) M. Hazewinkel (CWI Amsterdam) S. M. Watt (UWO) M. Kohlhase (CMU) B. Wegner (Berlin) Invited Speakers Massimo Marchiori (W3C, University of Venezia) Dana Scott (CMU) Additional Referees G. Bancerek R. Gamboa G. Jojgov P. Callaghan B. Han V. Prevosto D. Doligez Table of Contents Regular Contributions Digitisation,Representation,andFormalisation (DigitalLibrariesofMathematics) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Andrew A. Adams MKMfromBooktoComputer:ACaseStudy . . . . . . . . . . . . . . . . . . . . . . . 240 pp. Englisch.
Edité par Springer Berlin Heidelberg Feb 2003, 2003
ISBN 10 : 3540007083ISBN 13 : 9783540007081
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Livre impression à la demande
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed.This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well. 488 pp. Englisch.