9 results
Search Results
2. Theory and Applications of Models of Computation : 18th Annual Conference, TAMC 2024, Hong Kong, China, May 13–15, 2024, Proceedings
- Author
-
Xujin Chen, Bo Li, Xujin Chen, and Bo Li
- Subjects
- Algorithms, Computer science—Mathematics, Discrete mathematics, Computer science
- Abstract
This book constitutes the proceedings of the 18th Annual Conference on Theory and Applications of Models of Computation, TAMC 2024, which was held in Hong Kong, China, during May 13–15, 2024. The 30 full papers presented in this book were carefully reviewed and selected from 69 submissions. The main themes of the selected papers are computability, complexity, algorithms, information theory, as well as their integration with machine learning theory and the foundations of artificial intelligence.
- Published
- 2024
3. Iterative Method of Newton-Raphson for Systems with Two Equations
- Author
-
Triantafyllou, Serafeim A., Rocha, Álvaro, Series Editor, Hameurlain, Abdelkader, Editorial Board Member, Idri, Ali, Editorial Board Member, Vaseashta, Ashok, Editorial Board Member, Dubey, Ashwani Kumar, Editorial Board Member, Montenegro, Carlos, Editorial Board Member, Laporte, Claude, Editorial Board Member, Moreira, Fernando, Editorial Board Member, Peñalvo, Francisco, Editorial Board Member, Dzemyda, Gintautas, Editorial Board Member, Mejia-Miranda, Jezreel, Editorial Board Member, Hall, Jon, Editorial Board Member, Piattini, Mário, Editorial Board Member, Holanda, Maristela, Editorial Board Member, Tang, Mincong, Editorial Board Member, Ivanovíc, Mirjana, Editorial Board Member, Muñoz, Mirna, Editorial Board Member, Kanth, Rajeev, Editorial Board Member, Anwar, Sajid, Editorial Board Member, Herawan, Tutut, Editorial Board Member, Colla, Valentina, Editorial Board Member, Devedzic, Vladan, Editorial Board Member, and Farhaoui, Yousef, editor
- Published
- 2024
- Full Text
- View/download PDF
4. Interactive Algorithms: A Didactic Strategy for Non-programmers
- Author
-
Hurtado Cortés, Luini Leonardo, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Auer, Michael E., editor, Cukierman, Uriel R., editor, Vendrell Vidal, Eduardo, editor, and Tovar Caro, Edmundo, editor
- Published
- 2024
- Full Text
- View/download PDF
5. WALCOM: Algorithms and Computation : 18th International Conference and Workshops on Algorithms and Computation, WALCOM 2024, Kanazawa, Japan, March 18–20, 2024, Proceedings
- Author
-
Ryuhei Uehara, Katsuhisa Yamanaka, Hsu-Chun Yen, Ryuhei Uehara, Katsuhisa Yamanaka, and Hsu-Chun Yen
- Subjects
- Computer science, Computer science—Mathematics, Discrete mathematics, Numerical analysis, Algorithms, Computer graphics, Information technology—Management
- Abstract
This book constitutes the refereed proceedings of the 18th International Conference and Workshops on Algorithms and Computation, WALCOM 2024, held in Kanazawa, Japan, during March 18–20, 2024. The 28 full papers presented in this book, together with two extended abstracts of invited talks, were carefully reviewed and selected from 80 submissions. They cover diverse areas of algorithms and computation, that is, approximation algorithms, algorithmic graph theory and combinatorics, combinatorial algorithms, combinatorial optimization, computational biology, combinatorial reconfiguration, computational complexity, computational geometry, discrete geometry, data structures, experimental algorithm methodologies, graph algorithms, graph drawing, parallel and distributed algorithms, parameterized algorithms, parameterized complexity, network optimization, online algorithms, randomized algorithms, and string algorithms.
- Published
- 2024
6. Cryptography and Cryptanalysis in Java : Creating and Programming Advanced Algorithms with Java SE 21 LTS and Jakarta EE 11
- Author
-
Stefania Loredana Nita, Marius Iulian Mihailescu, Stefania Loredana Nita, and Marius Iulian Mihailescu
- Subjects
- Java (Computer program language), Programming languages (Electronic computers), Cryptography, Data encryption (Computer science), Computer science, Mathematics—Data processing, Algorithms
- Abstract
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21's new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the'hot points'(advantages and disadvantages) from the Java Cryptography Architecture (JCA), a new chapter on Quantum cryptography, and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. New to This Edition: The modernized Second Edition is updated to reflect the latest language features in Java 21 and Jakarta 11, along with the introduction of a new chapter on Quantum Cryptography (Chapter 6). What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore “good” vs “bad” cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.
- Published
- 2024
7. Trustworthy Communications and Complete Genealogies : Unifying Ancestries for a Genealogical History of the Modern World
- Author
-
Reagan W. Moore and Reagan W. Moore
- Subjects
- Information storage and retrieval systems, Data mining, Genealogy, Algorithms, Data structures (Computer science), Information theory, Computer science
- Abstract
This book explains how all persons with Western European ancestry are related through a Unifying Ancestry. The author presents the knowledge metrics needed to derive the best representation for a Unifying Ancestry. The book uses example lineages to historically notable persons including relationships to U.S. Presidents, royal families, actors, and singers in order to demonstrate these points. This third edition is based upon expanded data, applying the algorithms to validate the Unifying Ancestry to a 348,844-person Research Genealogy. The author successfully demonstrates that a Unifying Ancestry with 38,533 persons is sufficient to identify familial relationships between Western Europeans.
- Published
- 2024
8. Digital Signal Processing : Illustration Using Python
- Author
-
S Esakkirajan, T Veerakumar, Badri N Subudhi, S Esakkirajan, T Veerakumar, and Badri N Subudhi
- Subjects
- Python (Computer program language), Signal processing, Algorithms, Computer science
- Abstract
Digital signal processing deals with extraction of useful information from signals. Signal processing algorithms help observe, analyse and transform signals. The objective of this book is to develop signal processing algorithms using Python. Python is an interpreted, object-oriented high-level programming language widely used in various software development fields such as data science, machine learning, web development and more. Digital Signal Laboratory is playing an important role in realizing signal processing algorithms, utilizing different software solutions. The intention of this textbook is to implement signal processing algorithms using Python. Since Python is an open-source language, students, researchers, and faculty can install and work with it without spending money, reducing the financial burden on institutions. Each chapter in this book begins with prelab questions, a set of Python examples to illustrate the concepts, exercises to strengthen the understanding of the concepts, and objective questions to help students prepare for competitive examinations. This book serves as an undergraduate textbook, it can be used for individual study, and it can also be used as the textbook for related courses.
- Published
- 2024
9. Incentive Mechanism for Mobile Crowdsensing : A Game-theoretic Approach
- Author
-
Youqi Li, Fan Li, Song Yang, Chuan Zhang, Youqi Li, Fan Li, Song Yang, and Chuan Zhang
- Subjects
- Mobile computing, Cooperating objects (Computer systems), Data mining, Computer science—Mathematics, Mathematical statistics, Algorithms, Computer science
- Abstract
Mobile crowdsensing (MCS) is emerging as a novel sensing paradigm in the Internet of Things (IoTs) due to the proliferation of smart devices (e.g., smartphones, wearable devices) in people's daily lives. These ubiquitous devices provide an opportunity to harness the wisdom of crowds by recruiting mobile users to collectively perform sensing tasks, which largely collect data about a wide range of human activities and the surrounding environment. However, users suffer from resource consumption such as battery, processing power, and storage, which discourages users'participation. To ensure the participation rate, it is necessary to employ an incentive mechanism to compensate users'costs such that users are willing to take part in crowdsensing. This book sheds light on the design of incentive mechanisms for MCS in the context of game theory. Particularly, this book presents several game-theoretic models for MCS in different scenarios. In Chapter 1, the authors present an overview of MCS and state the significance of incentive mechanism for MCS. Then, in Chapter 2, 3, 4, and 5, the authors propose a long-term incentive mechanism, a fair incentive mechanism, a collaborative incentive mechanism, and a coopetition-aware incentive mechanism for MCS, respectively. Finally, Chapter 6 summarizes this book and point out the future directions. This book is of particular interest to the readers and researchers in the field of IoT research, especially in the interdisciplinary field of network economics and IoT.
- Published
- 2024
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.