Springer Theoretical Computer Science titles
http://www.springer.com/computer/theoretical+computer+science?SGWID=0-174204-0-0-0
These are Springer recent titles in Theoretical Computer ScienceSat, 31 Jan 2015 13:07:43 GMT2015-01-31T13:07:43ZSpringer Theoretical Computer Sciencehttp://images.springer.com/cda/content/designimage/cda_displaydesignimage.gif?SGWID=0-0-17-901483-0
http://www.springer.com/computer/theoretical+computer+science?SGWID=0-174204-0-0-0
Algebraic Biology
http://www.springer.com/computer/theoretical+computer+science/book/978-3-540-85101-1
Third International Conference, AB 2008, Castle of Hagenberg, Austria, July 31-August 2, 2008, Proceedings<br /><b>series:</b>Theoretical Computer Science and General Issues<p>This book constitutes the refereed proceedings of the Third International Conference on Algebraic Biology, AB 2008, held at the Castle of Hagenberg, Austria in July 2008 as part of the RISC Summer 2008, organized by the Research Institute for Symbolic Computation.The 14 revised full papers presented together with 3 tutorial lectures were carefully reviewed and selected from 27 submissions. The ...Logics and Meanings of ProgramsWed, 09 Jul 2014 23:27:03 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-3-540-85101-12014-07-09T23:27:03ZCryptography in Constant Parallel Time(Applebaum)
http://www.springer.com/computer/theoretical+computer+science/book/978-3-642-17366-0
<b>series:</b>Information Security and Cryptography<p>Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and ...Mathematics of ComputingWed, 25 Dec 2013 06:16:09 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-3-642-17366-02013-12-25T06:16:09ZFault-Tolerant Search Algorithms(Cicalese)
http://www.springer.com/computer/theoretical+computer+science/book/978-3-642-17327-1
Reliable Computation with Unreliable Information<br /><b>series:</b>Monographs in Theoretical Computer Science. An EATCS Series<p>Why a book on fault-tolerant search algorithms? Searching is one of the fundamental problems in computer science. Time and again algorithmic and combinatorial issues originally studied in the context of search find application in the most diverse areas of computer science and discrete mathematics. On the other hand, fault-tolerance is a necessary ingredient of computing. Due to their inherent ...Theory of ComputationFri, 06 Dec 2013 00:06:09 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-3-642-17327-12013-12-06T00:06:09ZFault-Tolerant Search Algorithms(Cicalese)
http://www.springer.com/computer/theoretical+computer+science/book/978-3-642-17326-4
Reliable Computation with Unreliable Information<br /><b>series:</b>Monographs in Theoretical Computer Science. An EATCS Series<p>Why a book on fault-tolerant search algorithms? Searching is one of the fundamental problems in computer science. Time and again algorithmic and combinatorial issues originally studied in the context of search find application in the most diverse areas of computer science and discrete mathematics. On the other hand, fault-tolerance is a necessary ingredient of computing. Due to their inherent ...Theory of ComputationWed, 04 Dec 2013 00:05:33 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-3-642-17326-42013-12-04T00:05:33ZThe Cross-Entropy Method(Rubinstein et al.)
http://www.springer.com/computer/theoretical+computer+science/book/978-1-4419-1940-3
A Unified Approach to Combinatorial Optimization, Monte-Carlo Simulation and Machine Learning<br /><b>series:</b>Information Science and Statistics<p>The cross-entropy (CE) method is one of the most significant developments in stochastic optimization and simulation in recent years. This book explains in detail how and why the CE method works. The CE method involves an iterative procedure where each iteration can be broken down into two phases: (a) generate a random data sample (trajectories, vectors, etc.) according to a specified ...Simulation and ModelingMon, 11 Nov 2013 00:24:15 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-1-4419-1940-32013-11-11T00:24:15ZUnderstanding Petri Nets(Reisig)
http://www.springer.com/computer/theoretical+computer+science/book/978-3-642-33277-7
Modeling Techniques, Analysis Methods, Case Studies<p>With their intuitive graphical approach and expressive analysis techniques, Petri nets are suitable for a wide range of applications and teaching scenarios, and they have gained wide acceptance as a modeling technique in areas such as software design and control engineering. The core theoretical principles have been studied for many decades and there is now a comprehensive research literature ...Theory of ComputationTue, 20 Aug 2013 23:22:48 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-3-642-33277-72013-08-20T23:22:48ZModelling Computing Systems(Moller et al.)
http://www.springer.com/computer/theoretical+computer+science/book/978-1-84800-321-7
Mathematics for Computer Science<br /><b>series:</b>Undergraduate Topics in Computer Science<p>We have all experienced delays and frustrations as a result of the notorious ‘computer glitch.’ However, the more dependent we become on computational systems in our daily lives, the more we must ensure that they are safe, reliable and user-friendly.This engaging textbook presents the fundamental mathematics and modelling techniques for computing systems in a novel and light-hearted way, which ...Logics and Meanings of ProgramsWed, 17 Jul 2013 23:00:37 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-1-84800-321-72013-07-17T23:00:37ZModelling and Optimization of Distributed Parameter Systems Applications to engineering
http://www.springer.com/computer/theoretical+computer+science/book/978-0-387-34922-0
Selected Proceedings of the IFIP WG7.2 on Modelling and Optimization of Distributed Parameter Systems with Applications to Engineering, June 1995<br /><b>series:</b>IFIP Advances in Information and Communication Technology<p>This volume contains a selection of papers presented at the conference on Modelling and Optimization of Distributed Parameter Systems with Applications to Engineering, held in Warsaw on July 17-21, 1995. This conference was a consecutive one in the series of conferences sponsored by the IFIP Working Group WG 7.2 "Computational Techniques in Distributed Systems", chaired by Irena Lasiecka. It ...Numeric ComputingWed, 05 Jun 2013 23:13:37 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-0-387-34922-02013-06-05T23:13:37ZBeyond Two: Theory and Applications of Multiple-Valued Logic
http://www.springer.com/computer/theoretical+computer+science/book/978-3-7908-1769-0
<b>series:</b>Studies in Fuzziness and Soft Computing<p>This volume represents the state of the art for much current research in many-valued logics. Primary researchers in the field are among the authors. Major methodological issues of many-valued logics are treated, as well as applications of many-valued logics to reasoning with fuzzy information. Areas covered include: Algebras of multiple valued logics and their applications, proof theory and ...Mathematical Logic and Formal LanguagesWed, 05 Jun 2013 23:13:13 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-3-7908-1769-02013-06-05T23:13:13ZResearch Directions in Data and Applications Security
http://www.springer.com/computer/theoretical+computer+science/book/978-0-387-35697-6
IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK<br /><b>series:</b>IFIP Advances in Information and Communication Technology<p>Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: -Role-Based Access Control; -Database Security; -XML Security; -Data Mining and Inference; -Multimedia System Security; ...Theory of ComputationWed, 27 Mar 2013 00:33:51 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-0-387-35697-62013-03-27T00:33:51ZIncomplete Information: Rough Set Analysis
http://www.springer.com/computer/theoretical+computer+science/book/978-3-7908-1888-8
<b>series:</b>Studies in Fuzziness and Soft Computing<p>The book presents rough set formalisms and methods of modeling and handling incomplete information and motivates their applicability to knowledge representation, knowledge discovery and machine learning. The book focuses on providing representational and inference mechanisms for dealing with two particular aspects of incompleteness, namely indiscernibility and similarity. Those manifestations ...Theory of ComputationFri, 22 Mar 2013 14:13:34 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-3-7908-1888-82013-03-22T14:13:34ZSmart Card Research and Advanced Applications
http://www.springer.com/computer/theoretical+computer+science/book/978-0-387-35528-3
IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20–22, 2000, Bristol, United Kingdom<br /><b>series:</b>IFIP Advances in Information and Communication Technology<p>Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are ...Theory of ComputationTue, 19 Mar 2013 06:44:59 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-0-387-35528-32013-03-19T06:44:59ZSimulated Evolution and Learning
http://www.springer.com/computer/theoretical+computer+science/book/978-3-642-34859-4
9th International Conference, SEAL 2012, Hanoi, Vietnam, December 16-19, 2012, Proceedings<br /><b>series:</b>Theoretical Computer Science and General Issues<p>This volume constitutes the proceedings of the 9th International Conference on Simulated Evolution and Learning, SEAL 2012, held in Hanoi, Vietnam, in December 2012. The 50 full papers presented were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on evolutionary algorithms, theoretical developments, swarm intelligence, data mining, learning ...Computation by Abstract DevicesMon, 11 Feb 2013 09:52:47 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-3-642-34859-42013-02-11T09:52:47ZComputational Intelligence Methods for Bioinformatics and Biostatistics
http://www.springer.com/computer/theoretical+computer+science/book/978-3-642-35686-5
8th International Meeting, CIBB 2011, Gargnano del Garda, Italy, June 30 - July 2, 2011, Revised Selected Papers<br /><b>series:</b>Lecture Notes in Bioinformatics<p>This book constitutes the thoroughly refereed post-proceedings of the 8th International Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics, CIBB 2011, held in Gargnano del Garda, Italy, in June/July 2011. The 19 papers, presented together with 2 keynote speeches, were carefully reviewed and selected from 24 submissions. The papers are organized in topical ...Computation by Abstract DevicesMon, 11 Feb 2013 09:31:53 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-3-642-35686-52013-02-11T09:31:53ZTheory of Quantum Computation, Communication, and Cryptography
http://www.springer.com/computer/theoretical+computer+science/book/978-3-642-35656-8
7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers<br /><b>series:</b>Theoretical Computer Science and General Issues<p>This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012, held in Tokyo, Japan, in May 2012.The 12 papers presented were carefully reviewed and selected for inclusion in this book. They contain original research on the rapidly growing, interdisciplinary field of quantum computation, communication and ...Theory of ComputationMon, 11 Feb 2013 09:10:12 GMThttp://www.springer.com/computer/theoretical+computer+science/book/978-3-642-35656-82013-02-11T09:10:12Z