Listing 1 - 10 of 574 | << page >> |
Sort by
|
Choose an application
Database and Mobile Computing brings together in one place important contributions and up-to-date research results in this important area. Databases and Mobile Computing serves as an excellent reference, providing insight into some of the most important research issues in the field.
Computer science. --- Data structures (Computer science). --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Computer Science, general. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Mobile computing. --- Distributed databases.
Choose an application
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.
Computer security --- Computer science. --- Data structures (Computer science). --- Computer graphics. --- Computers. --- Law and legislation. --- Information theory. --- Mathematics. --- Visualization. --- Computer Science. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Data Structures, Cryptology and Information Theory. --- Legal Aspects of Computing. --- Information and Communication, Circuits.
Choose an application
These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math education, the C. P. Snow two-culture problem, and mistreatment of women in academia. The stories speak for themselves and reflect the experiences of a student and later a scientist caught up in the tumultuous events of his generation.
Mathematics. --- History of Mathematics. --- Number Theory. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Data structures (Computer science). --- Data encryption (Computer science). --- Mathematics_$xHistory. --- Number theory. --- Mathématiques --- Structures de données (Informatique) --- Chiffrement (Informatique) --- Théorie des nombres --- Koblitz, Neal. --- Mathematicians --- World politics --- Mathematics - General --- Mathematics --- Physical Sciences & Mathematics --- Koblitz, Neal, --- Travel. --- Koblit︠s︡, N., --- Koblitz, Neal I. --- History. --- History of Mathematical Sciences.
Choose an application
The study of permutation complexity can be envisioned as a new kind of symbolic dynamics whose basic blocks are ordinal patterns, that is, permutations defined by the order relations among points in the orbits of dynamical systems. Since its inception in 2002 the concept of permutation entropy has sparked a new branch of research in particular regarding the time series analysis of dynamical systems that capitalizes on the order structure of the state space. Indeed, on one hand ordinal patterns and periodic points are closely related, yet ordinal patterns are amenable to numerical methods, while periodicity is not. Another interesting feature is that since it can be shown that random (unconstrained) dynamics has no forbidden patterns with probability one, their existence can be used as a fingerprint to identify any deterministic origin of orbit generation. This book is primarily addressed to researchers working in the field of nonlinear dynamics and complex systems, yet will also be suitable for graduate students interested in these subjects. The presentation is a compromise between mathematical rigor and pedagogical approach. Accordingly, some of the more mathematical background needed for more in depth understanding has been shifted into the appendices.
Nonlinear theories. --- Time-series analysis. --- Mathematical statistics. --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Analysis of time series --- Statistical methods --- Physics. --- Data structures (Computer science). --- Applied mathematics. --- Engineering mathematics. --- Statistical physics. --- Dynamical systems. --- Statistical Physics, Dynamical Systems and Complexity. --- Mathematical Methods in Physics. --- Data Structures, Cryptology and Information Theory. --- Applications of Mathematics. --- Statistics --- Probabilities --- Sampling (Statistics) --- Autocorrelation (Statistics) --- Harmonic analysis --- Mathematical statistics --- Time-series analysis
Choose an application
The theory of elliptic curves involves a pleasing blend of algebra, geometry, analysis, and number theory. This book stresses this interplay as it develops the basic theory, thereby providing an opportunity for advanced undergraduates to appreciate the unity of modern mathematics. At the same time, every effort has been made to use only methods and results commonly included in the undergraduate curriculum. This accessibility, the informal writing style, and a wealth of exercises make Rational Points on Elliptic Curves an ideal introduction for students at all levels who are interested in learning about Diophantine equations and arithmetic geometry. Most concretely, an elliptic curve is the set of zeroes of a cubic polynomial in two variables. If the polynomial has rational coefficients, then one can ask for a description of those zeroes whose coordinates are either integers or rational numbers. It is this number theoretic question that is the main subject of this book. Topics covered include the geometry and group structure of elliptic curves, the Nagell–Lutz theorem describing points of finite order, the Mordell–Weil theorem on the finite generation of the group of rational points, the Thue–Siegel theorem on the finiteness of the set of integer points, theorems on counting points with coordinates in finite fields, Lenstra’s elliptic curve factorization algorithm, and a discussion of complex multiplication and the Galois representations associated to torsion points. Additional topics new to the second edition include an introduction to elliptic curve cryptography and a brief discussion of the stunning proof of Fermat’s Last Theorem by Wiles et al. via the use of elliptic curves.
Mathematics. --- Algebraic Geometry. --- Number Theory. --- Data Structures, Cryptology and Information Theory. --- Data structures (Computer science). --- Geometry, algebraic. --- Number theory. --- Mathématiques --- Structures de données (Informatique) --- Théorie des nombres --- Geometry --- Mathematics --- Physical Sciences & Mathematics --- Algebraic geometry. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Curvas elípticas --- Number study --- Numbers, Theory of --- Algebra --- Algebraic geometry --- Curves, Elliptic. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science)
Choose an application
This volume contains a collection of research and survey papers written by some of the most eminent mathematicians in the international community and is dedicated to Helmut Maier, whose own research has been groundbreaking and deeply influential to the field. Specific emphasis is given to topics regarding exponential and trigonometric sums and their behavior in short intervals, anatomy of integers and cyclotomic polynomials, small gaps in sequences of sifted prime numbers, oscillation theorems for primes in arithmetic progressions, inequalities related to the distribution of primes in short intervals, the Möbius function, Euler’s totient function, the Riemann zeta function and the Riemann Hypothesis. Graduate students, research mathematicians, as well as computer scientists and engineers who are interested in pure and interdisciplinary research, will find this volume a useful resource. Contributors to this volume: Bill Allombert, Levent Alpoge, Nadine Amersi, Yuri Bilu, Régis de la Bretèche, Christian Elsholtz, John B. Friedlander, Kevin Ford, Daniel A. Goldston, Steven M. Gonek, Andrew Granville, Adam J. Harper, Glyn Harman, D. R. Heath-Brown, Aleksandar Ivić, Geoffrey Iyer, Jerzy Kaczorowski, Daniel M. Kane, Sergei Konyagin, Dimitris Koukoulopoulos, Michel L. Lapidus, Oleg Lazarev, Andrew H. Ledoan, Robert J. Lemke Oliver, Florian Luca, James Maynard, Steven J. Miller, Hugh L. Montgomery, Melvyn B. Nathanson, Ashkan Nikeghbali, Alberto Perelli, Amalia Pizarro-Madariaga, János Pintz, Paul Pollack, Carl Pomerance, Michael Th. Rassias, Maksym Radziwiłł, Joël Rivat, András Sárközy, Jeffrey Shallit, Terence Tao, Gérald Tenenbaum, László Tóth, Tamar Ziegler, Liyang Zhang.
Algebra --- Mathematics --- Physical Sciences & Mathematics --- Numerical analysis. --- Data structures (Computer science) --- Mathematics. --- Math --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Data structures (Computer science). --- Number theory. --- Number Theory. --- Numerical Analysis. --- Data Structures, Cryptology and Information Theory. --- Science --- Mathematical analysis --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Number study --- Numbers, Theory of
Choose an application
This textbook effectively builds a bridge from basic number theory to recent advances in applied number theory. It presents the first unified account of the four major areas of application where number theory plays a fundamental role, namely cryptography, coding theory, quasi-Monte Carlo methods, and pseudorandom number generation, allowing the authors to delineate the manifold links and interrelations between these areas. Number theory, which Carl-Friedrich Gauss famously dubbed the queen of mathematics, has always been considered a very beautiful field of mathematics, producing lovely results and elegant proofs. While only very few real-life applications were known in the past, today number theory can be found in everyday life: in supermarket bar code scanners, in our cars’ GPS systems, in online banking, etc. Starting with a brief introductory course on number theory in Chapter 1, which makes the book more accessible for undergraduates, the authors describe the four main application areas in Chapters 2-5 and offer a glimpse of advanced results that are presented without proofs and require more advanced mathematical skills. In the last chapter they review several further applications of number theory, ranging from check-digit systems to quantum computation and the organization of raster-graphics memory. Upper-level undergraduates, graduates and researchers in the field of number theory will find this book to be a valuable resource.
Algebra --- Mathematics --- Physical Sciences & Mathematics --- Mathematics. --- Data structures (Computer science). --- Information theory. --- Number theory. --- Number Theory. --- Information and Communication, Circuits. --- Data Structures, Cryptology and Information Theory. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Number study --- Numbers, Theory of --- Math --- Science --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication theory --- Communication --- Cybernetics
Choose an application
This textbook provides an introduction to the mathematics on which modern cryptology is based. It covers not only public key cryptography, the glamorous component of modern cryptology, but also pays considerable attention to secret key cryptography, its workhorse in practice. Modern cryptology has been described as the science of the integrity of information, covering all aspects like confidentiality, authenticity and non-repudiation and also including the protocols required for achieving these aims. In both theory and practice it requires notions and constructions from three major disciplines: computer science, electronic engineering and mathematics. Within mathematics, group theory, the theory of finite fields, and elementary number theory as well as some topics not normally covered in courses in algebra, such as the theory of Boolean functions and Shannon theory, are involved. Although essentially self-contained, a degree of mathematical maturity on the part of the reader is assumed, corresponding to his or her background in computer science or engineering. Algebra for Cryptologists is a textbook for an introductory course in cryptography or an upper undergraduate course in algebra, or for self-study in preparation for postgraduate study in cryptology.
Mathematics. --- Data structures (Computer science). --- Computer science --- Algebra. --- Data Structures, Cryptology and Information Theory. --- Discrete Mathematics in Computer Science. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Math --- Mathematics --- Data structures (Computer scienc. --- Computational complexity. --- Data Structures and Information Theory. --- Mathematical analysis --- Complexity, Computational --- Machine theory --- Data encryption (Computer science) --- Computer science—Mathematics. --- File organization (Computer science) --- Abstract data types (Computer science)
Choose an application
This book constitutes the refereed proceedings of the First International Conference on Data Science Analytics and Applications, DaSAA 2017, held in Chennai, India, in January 2017. The 16 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 77 submissions. The papers address issues such as data analytics, data mining, cloud computing, machine learning, text classification and analysis, information retrieval, DSS, security, image and video processing.
Computer science. --- Data structures (Computer science). --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data mining --- Database management. --- Database Management. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management
Choose an application
This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology – New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education. Features the most recent advances in information technology; Presents early work and novel results from research laboratories around the world; Facilitates managers making business decisions, academics shaping research work, and educators keeping abreast of recent advances in learning technologies.
Information technology --- Computer science. --- Data structures (Computer science). --- Computer Science. --- Information Systems Applications (incl. Internet). --- Security. --- Data Structures, Cryptology and Information Theory. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Data protection. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 10 of 574 | << page >> |
Sort by
|