Network -- On the Complexity of Delaying an Adversary’s Project -- A Note on Eswaran and Tarjan’s Algorithm for the Strong Connectivity Augmentation Problem -- Integer and Mixed Integer Programming -- Generating Set Partitioning Test Problems with Known Optimal Integer Solutions -- Computational Aspects of Controlled Tabular Adjustment: Algorithm and Analysis -- The Symphony Callable Librar…
The Telegraph and Telephone Modes -- Fundamentals -- Broadcasting -- Gossiping -- Systolic Communication -- Fault-Tolerance -- Distributed Networks -- Broadcast on Distributed Networks -- Leader Election in Asynchronous Distributed Networks -- Fault-Tolerant Broadcast in Distributed Networks.Preface Due to the development of hardware technologies (such as VLSI) in the early 1980s, the interest …
Efficient Distributed Computation Modulo a Shared Secret -- Multiparty Computation, an Introduction -- Foundations of Modern Cryptography -- Provable Security for Public Key Schemes -- Efficient and Secure Public-Key Cryptosystems.The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: - efficient distr…
On Regular and Logarithmic Solutions of Ordinary Linear Differential Systems -- Computing the Betti Numbers of Arrangements in Practice -- A MAPLE Symbolic-Numeric Program for Solving the 2D-Eigenvalue Problem by a Self-consistent Basis Method -- RelView – An OBDD-Based Computer Algebra System for Relations -- On the Use of Gröbner Bases for Computing the Structure of Finite Abelian Groups -…
Introduction: If CiE Did Not Exist, It Would Be Necessary to Invent It -- Computably Enumerable Sets in the Solovay and the Strong Weak Truth Table Degrees -- The Fan Theorem and Uniform Continuity -- Continuous Semantics for Strong Normalization -- A Thread Algebra with Multi-level Strategic Interleaving -- Membrane Computing — Current Results and Future Problems -- How to Compare the Power …
High Performance Computing and Algorithms -- Computer Modeling and Simulations -- Biological and Medical Informatics -- Data and Information Sciences -- Computational Graphics and Visualization.The 2004 International Symposium on Computational and Information Sciences (CIS 2004) aimed at bringing researchers in the area of computational and - formation sciences together to exchange new ideas an…
From the contents: Neural Networks: Neural Networks Theory; Learning Theory; Computational Neuroscience and Neurodynamics; Neural Networks in Process Engineering; Neural Networks in Robotics and Control; Clustering and Unsupervised Learning; Self-Organising Maps -- Evolutionary Computation: Evolutionary Computation; Genetic Algorithms Theory; Complex Systems and Genetic Programming; Swarm Optim…
Motivations: What is Constraint Theory and why is it important?- The Four-fold way: How to Perceive Complex Mathematical Models and Well-Posed Problems -- General Results: From Protomath to Math to Metamath -- Regular Relations: Searching for the Kernels of Constraint -- Discrete and Interval Relations: The Diminished Utility of Metamodels -- The Logical Structure of Constraint: Theory A Compac…
Genetic algorithms: a guide for absolute beginners -- Evolutionary algorithms and their theory -- Epistasis -- Examples -- Walsh transforms -- Multary epistasis -- Generalized Walsh transforms.
Keynote Addresses -- Rethinking Computer Architecture Research -- Event Servers for Crisis Management -- DIET: Building Problem Solving Environments for the Grid -- The Future Evolution of High-Performance Microprocessors -- Low Power Robust Computing -- Networks and Games -- Plenary Session - Best Papers -- An Incentive Driven Lookup Protocol for Chord-Based Peer-to-Peer (P2P) Networks -- A No…