- Table View
- List View
Crossing Numbers of Graphs (Discrete Mathematics and Its Applications)
by Marcus SchaeferCrossing Numbers of Graphs is the first book devoted to the crossing number, an increasingly popular object of study with surprising connections. The field has matured into a large body of work, which includes identifiable core results and techniques. The book presents a wide variety of ideas and techniques in topological graph theory, discrete geometry, and computer science. The first part of the text deals with traditional crossing number, crossing number values, crossing lemma, related parameters, computational complexity, and algorithms. The second part includes the rich history of alternative crossing numbers, the rectilinear crossing number, the pair crossing number, and the independent odd crossing number.It also includes applications of the crossing number outside topological graph theory. Aimed at graduate students and professionals in both mathematics and computer science The first book of its kind devoted to the topic Authored by a noted authority in crossing numbers
Crossing the River with Dogs: Problem Solving for College Students
by Judy Kysh Ken Johnson Ted HerrCrossing the River with Dogs: Problem Solving for College Students has been adapted from the popular high school text to provide an accessible and coherent college-level course in mathematical problem solving for adults. Focusing entirely on problem solving and using issues relevant to college students for example, the authors continue their approach of explaining classic as well as non-traditional strategies through dialogs among fictitious students. This text is appropriate for a problem solving, liberal arts mathematics, mathematics for elementary teachers, or developmental mathematics course.
Crossroads of Computability and Logic: 21st Conference on Computability in Europe, CiE 2025, Lisbon, Portugal, July 14–18, 2025, Proceedings (Lecture Notes in Computer Science #15764)
by Florin Manea Arnold Beckmann Isabel OitavemThis book constitutes the refereed proceedings of the 21st Conference on Computability and Logic, CiE 2025, held in Lisbon, Portugal, during July 14–18, 2025. The 27 full papers included in this book were carefully reviewed and selected from 49 submissions. They focus on computability-related science, ranging over mathematics, computer science and applications in various natural and engineering sciences, such as physics and biology, as well as related fields, such as philosophy and history of computing. CiE 2025 hadas its motto Crossroads of Computability and Logic: Insights, Inspirations, and Innovations, drawing on the numerous interconnections between computability research and broader logical methodologies, considering both well-established perspectives as well as recent innovations.
Crossroads: Comparative Immigration Regimes In A World Of Demographic Change
by Anna K. Boucher Justin GestIn this ambitious study, Anna K. Boucher and Justin Gest present a unique analysis of immigration governance across thirty countries. <P><P>Relying on a database of immigration demographics in the world's most important destinations, they present a novel taxonomy and an analysis of what drives different approaches to immigration policy over space and time. In an era defined by inequality, populism, and fears of international terrorism, they find that governments are converging toward a 'Market Model' that seeks immigrants for short-term labor with fewer outlets to citizenship - an approach that resembles the increasingly contingent nature of labor markets worldwide.<P> Introduces a universal empirical conceptualization of an immigration regime.<P> Assembles and analyzes a new cross-national, standardized database of immigration demographic outcomes in thirty countries.<P> Presents a novel, transparently derived taxonomy of immigration regimes worldwide.
Crowd Behavior Simulation of Pedestrians During Evacuation Process: Dem-based Approach (SpringerBriefs in Applied Sciences and Technology)
by Noorhazlinda Abd RahmanThis book introduces the use of the distinct element method (DEM) in modeling crowd behavior and simulating evacuation processes. Focusing on the mathematical computation of the uncertain behavior of evacuees, which is switching action behavior, it subsequently reproduces the crowd evacuation process under several conjectural scenarios using a DEM-based multi-agent model that has been modified by introducing the switching action behavior. The proposed switching action behavior model describes a person who has to change his/her destination due to the limited space capacity of the designated evacuation area. The change in the destination of a person is determined according to the motion of other individuals in the perception domain during the defined switching action time. The switching action time is formulated in the so-called switching action function, which is described by a convolution integral of the input and unit response functions. The newly developed switching action model is then validated using sensitivity analysis in which the primary focus is the crowd motion and flow of switching action behavior.
Crowd Dynamics, Volume 1: Theory, Models, and Safety Problems (Modeling and Simulation in Science, Engineering and Technology)
by Nicola Bellomo Livio GibelliThis volume explores the complex problems that arise in the modeling and simulation of crowd dynamics in order to present the state-of-the-art of this emerging field and contribute to future research activities. Experts in various areas apply their unique perspectives to specific aspects of crowd dynamics, covering the topic from multiple angles. These include a demonstration of how virtual reality may solve dilemmas in collecting empirical data; a detailed study on pedestrian movement in smoke-filled environments; a presentation of one-dimensional conservation laws with point constraints on the flux; a collection of new ideas on the modeling of crowd dynamics at the microscopic scale; and others. Applied mathematicians interested in crowd dynamics, pedestrian movement, traffic flow modeling, urban planning, and other topics will find this volume a valuable resource. Additionally, researchers in social psychology, architecture, and engineering may find this information relevant to their work.
Crowd Dynamics, Volume 2: Theory, Models, and Applications (Modeling and Simulation in Science, Engineering and Technology)
by Livio GibelliThis contributed volume explores innovative research in the modeling, simulation, and control of crowd dynamics. Chapter authors approach the topic from the perspectives of mathematics, physics, engineering, and psychology, providing a comprehensive overview of the work carried out in this challenging interdisciplinary research field. After providing a critical analysis of the current state of the field and an overview of the current research perspectives, chapters focus on three main research areas: pedestrian interactions, crowd control, and multiscale modeling. Specific topics covered in this volume include: crowd dynamics through conservation lawsrecent developments in controlled crowd dynamicsmixed traffic modelinginsights and applications from crowd psychology Crowd Dynamics, Volume 2 is ideal for mathematicians, engineers, physicists, and other researchers working in the rapidly growing field of modeling and simulation of human crowds.
Crowd Dynamics, Volume 3: Modeling and Social Applications in the Time of COVID-19 (Modeling and Simulation in Science, Engineering and Technology)
by Nicola Bellomo Livio GibelliThis contributed volume explores innovative research in the modeling, simulation, and control of crowd dynamics. Chapter authors approach the topic from the perspectives of mathematics, physics, engineering, and psychology, providing a comprehensive overview of the work carried out in this challenging interdisciplinary research field. In light of the recent COVID-19 pandemic, special consideration is given to applications of crowd dynamics to the prevention of the spreading of contagious diseases. Some of the specific topics covered in this volume include: - Impact of physical distancing on the evacuation of crowds- Generalized solutions of opinion dynamics models- Crowd dynamics coupled with models for infectious disease spreading- Optimized strategies for leaders in controlling the dynamics of a crowdCrowd Dynamics, Volume 3 is ideal for mathematicians, engineers, physicists, and other researchers working in the rapidly growing field of modeling and simulation of human crowds.
Crowd Dynamics, Volume 4: Analytics and Human Factors in Crowd Modeling (Modeling and Simulation in Science, Engineering and Technology)
by Nicola Bellomo Livio GibelliThis contributed volume explores innovative research in the modeling, simulation, and control of crowd dynamics. Chapter authors approach the topic from the perspectives of mathematics, physics, engineering, and psychology, providing a comprehensive overview of the work carried out in this challenging interdisciplinary research field. The volume begins with an overview of analytical problems related to crowd modeling. Attention is then given to the importance of considering the social and psychological factors that influence crowd behavior – such as emotions, communication, and decision-making processes – in order to create reliable models. Finally, specific features of crowd behavior are explored, including single-file traffic, passenger movement, modeling multiple groups in crowds, and the interplay between crowd dynamics and the spread of disease.Crowd Dynamics, Volume 4 is ideal for mathematicians, engineers, physicists, and other researchers working in the rapidly growing field of modeling and simulation of human crowds.
Crucial Event Rehabilitation Therapy: Multifractal Medicine (SpringerBriefs in Bioengineering)
by Mauro Bologna Bruce J. West Paolo GrigoliniThis book describes a new strategy for rehabilitation from injury and/or disease using Crucial Event Therapy. Recent studies have shown that individuals can recuperate more rapidly from surgery and other invasive procedures intended to correct the negative effects of disease or injury through the use of life support systems that operate at the body's natural biofrequencies. The same observation has been clinically shown to reverse the degenerative effects of neurodegenerative diseases such as Parkinson’s and Alzheimer's Disease. Crucial Event Therapy describes medicine as the operational control of the functions of the human body treated as a network-of-networks, with 1/f-variable crucial events coding the dynamic states of health and disease through information flow within a network and information exchange between biomedical networks. A new way of thinking based on the statistics of Cortical Events is presented and the relevant literature is suitably referenced. This is an ideal book for biophysicists and data scientists seeking to understand the connection of complexity measures for the study of consciousness with the clinical aspects of designing a rehabilitation strategy.
Cryogenic Safety: A Guide to Best Practice in the Lab and Workplace (International Cryogenics Monograph Series)
by Thomas J. Peterson J. G. Weisend IIThis book describes the current state of the art in cryogenic safety best practice, helping the reader to work with cryogenic systems and materials safely. It brings together information from previous texts, industrial and laboratory safety polices, and recent research papers. Case studies, example problems, and an extensive list of references are included to add to the utility of the text. It describes the unique safety hazards posed by cryogenics in all its guises, including issues associated with the extreme cold of cryogenics, the flammability of some cryogenic fluids, the displacement of oxygen by inert gases boiling off from cryogenic fluids, and the high pressures that can be formed during the volume expansion that occurs when a cryogenic fluid becomes a room temperature gas. A further chapter considers the challenges arising from the behavior of materials at cryogenic temperatures. Many materials are inappropriate for use in cryogenics and can fail, resulting in hazardous conditions. Despite these hazards, work at cryogenic temperatures can be performed safely. The book also discusses broader safety issues such as hazard analysis, establishment of a safe work culture and lessons learned from cryogenic safety in accelerator labs. This book is designed to be useful to everyone affected by cryogenic hazards regardless of their expertise in cryogenics.
Cryptanalysis of Number Theoretic Ciphers (Computational Mathematics)
by Samuel S. Wagstaff, Jr.At the heart of modern cryptographic algorithms lies computational number theory. Whether you're encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist and practicing cryptographer, Cryptanalysis of Number Theoretic Ciphers takes you from basic number theory to the inner workings of ciphers and protocols.First, the book provides the mathematical background needed in cryptography as well as definitions and simple examples from cryptography. It includes summaries of elementary number theory and group theory, as well as common methods of finding or constructing large random primes, factoring large integers, and computing discrete logarithms. Next, it describes a selection of cryptographic algorithms, most of which use number theory. Finally, the book presents methods of attack on the cryptographic algorithms and assesses their effectiveness. For each attack method the author lists the systems it applies to and tells how they may be broken with it.Computational number theorists are some of the most successful cryptanalysts against public key systems. Cryptanalysis of Number Theoretic Ciphers builds a solid foundation in number theory and shows you how to apply it not only when breaking ciphers, but also when designing ones that are difficult to break.
Cryptanalysis of RSA and Its Variants (Chapman & Hall/CRC Cryptography and Network Security Series)
by M. Jason HinekThirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its main variants, includin
Cryptocoding Based on Quasigroups (SpringerBriefs in Information Security and Cryptography)
by Verica Bakeva Daniela Mechkaroska Aleksandra Popovska-MitrovikjThis book presents the concept of cryptcoding which arises from the need to obtain secure and accurate transmission. Therefore, it is necessary to improve constantly existing and develop new algorithms that will ensure accurate and secure data transfer. This leads to the intensive development of coding theory and cryptography as scientific fields which solve these problems. To ensure efficient and secure data transmission at the same time, the concept of cryptcoding is developed such that the coding and encryption processes are merged into one process. Cryptcodes provide correction of a certain number of errors in the transmitted message and data confidentiality, using only one algorithm. The main research in this field is to define new algorithms for coding that detects and corrects errors, random codes, stream ciphers, block ciphers, pseudo-random generators, hash functions, etc. This monograph examines an application of quasigroups for designing error-correcting cryptcodes, called Random Codes Based on Quasigroups (RCBQ ). These codes are a combination of cryptographic algorithms and error-correcting codes and depend on several parameters. Some modifications (new coding/decoding algorithms) of RCBQ for improving their performances for transmission ordinary messages, images, and audio files trough a binary-symmetric channel, Gaussian channel, and burst channels are considered. Also, authors propose and analyze filter for visually enhance of the decoded images and improving the quality of decoded audio files.
Cryptofinance and Mechanisms of Exchange: The Making of Virtual Currency (Contributions to Management Science)
by Stéphane Goutte Khaled Guesmi Samir SaadiThis book describes how the rapid advancement in encryption and network computing gave birth to new tools and products that have influenced the local and global economy alike. One recent and notable example is the emergence of virtual currencies (such as Bitcoin) also known as cryptocurrencies. Virtual currencies introduced a fundamental transformation that affected the way goods, services and assets are exchanged. As a result of its distributed ledgers based on blockchain, cryptocurrencies not only offer some unique advantages to the economy, investors, and consumers, but also pose considerable risks to users and challenges for regulators when fitting the new technology into the old legal framework. The core of this proposed book is to present and discuss the evidence on financial asset capabilities of virtual currencies. The contributors of this volume analyze several interesting and timely issues such as the particularities of virtual currencies and their statistical characteristics; the diversification benefits of virtual currencies; the behavior and dependence structure between virtual currencies and the financial markets; the economic implications of virtual currencies, their effects, their price risk, and contagion spillovers in a unified and comprehensive framework; the future of virtual currencies and their distributed ledgers technology.
Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10
by Stefania Loredana Nita Marius Iulian MihailescuHere is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore “good” vs “bad” cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.
Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 21 LTS and Jakarta EE 11
by Stefania Loredana Nita Marius Iulian MihailescuHere is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21's new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), a new chapter on Quantum cryptography, and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. New to This Edition: The modernized Second Edition is updated to reflect the latest language features in Java 21 and Jakarta 11, along with the introduction of a new chapter on Quantum Cryptography (Chapter 6). What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore “good” vs “bad” cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.
Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation (SpringerBriefs in Mathematics)
by Amparo Fúster-Sabater Sara Díaz CardellThis book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized self-shrinking and the DECIM algorithm - with examples and references. Further, the book discusses several attacks on these generators and applications. It concludes by demonstrating how the output sequences can be modeled by means of different families of one-dimensional cellular automata, rendering the generators vulnerable to attacks. Intended for researchers and graduate students, the book will hopefully inspire them to search for more details on this family of generators and to address the open problems in this field.
Cryptography: Theory and Practice (Fourth Edition) (Textbooks in Mathematics #2012)
by Douglas Robert Stinson Maura Paterson<p>Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography. <p>The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.</p>
Cryptology: Classical and Modern (Chapman & Hall/CRC Cryptography and Network Security Series)
by Richard Klima Neil SigmonCryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. <P><P> The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book.
Cubed: The Puzzle of Us All
by Erno RubikThe first book by the reclusive inventor of the world’s most iconic puzzle THE RUBIK’S CUBE. Erno Rubik inspires us with what he’s learned in a lifetime of creating, curiosity, and discovery.Erno Rubik was a child when he first became obsessed with puzzles of all kinds. “Puzzles,” he writes, “bring out important qualities in each of us: concentration, curiosity, a sense of play, the eagerness to discover a solution.” To Rubik puzzles aren’t just games—they’re creativity machines. He encourages us to embrace our inner curiosity and find the puzzles that surround us in our everyday lives. “If you are determined, you will solve them,” he writes. Rubik’s own puzzle, the Cube, went on to be solved by millions worldwide for over forty years, become one of the bestselling toys of all time, and to be featured as a global symbol of intelligence and ingenuity.In Cubed, Rubik covers more than just his journey to inventing his eponymous cube. He makes a case for always being an amateur—something he has always considered himself to be. He discusses the inevitability of problems during any act of invention. He reveals what it was like to experience the astonishing worldwide success of an object he made purely for his own play. And he offers what he thinks it means to be a true creator (hint: anyone can do it). Steeped in the wisdom and also the humility of a born inventor, Cubed offers a unique look at the imperfect science of creation.
Cubic Fields with Geometry (CMS Books in Mathematics)
by Samuel A. Hambleton Hugh C. WilliamsThe objective of this book is to provide tools for solving problems which involve cubic number fields. Many such problems can be considered geometrically; both in terms of the geometry of numbers and geometry of the associated cubic Diophantine equations that are similar in many ways to the Pell equation. With over 50 geometric diagrams, this book includes illustrations of many of these topics. The book may be thought of as a companion reference for those students of algebraic number theory who wish to find more examples, a collection of recent research results on cubic fields, an easy-to-understand source for learning about Voronoi’s unit algorithm and several classical results which are still relevant to the field, and a book which helps bridge a gap in understanding connections between algebraic geometry and number theory.The exposition includes numerous discussions on calculating with cubic fields including simple continued fractions of cubic irrational numbers, arithmetic using integer matrices, ideal class group computations, lattices over cubic fields, construction of cubic fields with a given discriminant, the search for elements of norm 1 of a cubic field with rational parametrization, and Voronoi's algorithm for finding a system of fundamental units. Throughout, the discussions are framed in terms of a binary cubic form that may be used to describe a given cubic field. This unifies the chapters of this book despite the diversity of their number theoretic topics.
Cubical Homotopy Theory
by Brian A. Munson Ismar VolićGraduate students and researchers alike will benefit from this treatment of classical and modern topics in homotopy theory of topological spaces with an emphasis on cubical diagrams. The book contains 300 examples and provides detailed explanations of many fundamental results. Part I focuses on foundational material on homotopy theory, viewed through the lens of cubical diagrams: fibrations and cofibrations, homotopy pullbacks and pushouts, and the Blakers–Massey Theorem. Part II includes a brief example-driven introduction to categories, limits and colimits, an accessible account of homotopy limits and colimits of diagrams of spaces, and a treatment of cosimplicial spaces. The book finishes with applications to some exciting new topics that use cubical diagrams: an overview of two versions of calculus of functors and an account of recent developments in the study of the topology of spaces of knots.
Cuckoo Search and Firefly Algorithm: Theory and Applications (Studies in Computational Intelligence #516)
by Xin-She YangNature-inspired algorithms such as cuckoo search and firefly algorithm have become popular and widely used in recent years in many applications. These algorithms are flexible, efficient and easy to implement. New progress has been made in the last few years, and it is timely to summarize the latest developments of cuckoo search and firefly algorithm and their diverse applications. This book will review both theoretical studies and applications with detailed algorithm analysis, implementation and case studies so that readers can benefit most from this book. Application topics are contributed by many leading experts in the field. Topics include cuckoo search, firefly algorithm, algorithm analysis, feature selection, image processing, travelling salesman problem, neural network, GPU optimization, scheduling, queuing, multi-objective manufacturing optimization, semantic web service, shape optimization, and others. This book can serve as an ideal reference for both graduates and researchers in computer science, evolutionary computing, machine learning, computational intelligence, and optimization, as well as engineers in business intelligence, knowledge management and information technology.
Cuenta de Ratón
by F. Isabel Campoy Ellen Stoll WalshEs una aventura de contar en esta edición en español de ratón Conde. Una serpiente hambrienta se fuera en busca de su cena, y los ratones temerario debe hacer su escape como el recuento de los lectores de UNO de Diez - y de vuelta otra vez!