With ever increasing computational resources and improvements in algorithms, new opportunities are emerging for lattice gauge theory to address key questions in strongly interacting systems, such as n
If you're looking for a fun, effective, low-impact workout that will build stamina, enhance flexibility, and improve your cardiovascular well-being, look no more. This gentle and effective dance is no
This is the first book to present a systematic review of applications of the Haar wavelet method for solving Calculus and Structural Mechanics problems. Haar wavelet-based solutions for a wide range o
The four-volume set LNCS 6016 - 6019 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2010, held in Fukuoka, Japan, in March 20
This book presents revised reviewed versions of lectures given during the Machine Learning Summer School held in Canberra, Australia, in February 2002.The lectures address the following key topics in
The book provides an elementary tutorial presentation on computational fluid dynamics (CFD), emphasizing the fundamentals and surveying a variety of solution techniques whose applications range from l
Data analysis and machine learning are research areas at the intersection of computer science, artificial intelligence, mathematics and statistics. They cover general methods and techniques that can b
This book constitutes the proceedings of the 9th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2013, held in Sophia Ant
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups an
This book deals with condition as a main aspect in the understanding of the performance—regarding both stability and complexity—of numerical algorithms. It offers partial solutions for Smale's 17th p
Looking for the real state of play in computational many-particle physics? Look no further. This book presents an overview of state-of-the-art numerical methods for studying interacting classical and
This book constitutes the refereed proceedings of the 11th International Workshop on Algorithms and Models for the Web Graph, WAW 2014, held in Beijing, China, in December 2014.The 12 papers presented
This book tackles the Optimal Non-Linear Experimental Design problem from an applications perspective. At the same time it offers extensive mathematical background material that avoids technicalities,
No matter how monolithic it may appear, an organization is a collection of moving parts. Whether we are looking at building teams, providing leadership, hiring and training employees, problem solving,
Fast Compact Algorithms and Software for Spline Smoothing investigates algorithmic alternatives for computing cubic smoothing splines when the amount of smoothing is determined automatically by minimi
CEA's Jack Diamond Schuster is an intelligent doctor of forensics. He has years of experience with problem-solving, especially with crime scene investigations. He doesn't like the district attorney's
This book constitutes the joint refereed proceedings of the 8th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2005 and the 9th International Worksh
This book is intended for students of computational systems biology with only a limited background in mathematics. Typical books on systems biology merely mention algorithmic approaches, but without o
Architecting High Performing, Scalable and Available Enterprise Web Applications provides in-depth insights into techniques for achieving desired scalability, availability and performance quality goal
This book covers the latest advances in the rapid growing field of inter-cooperative collective intelligence aiming the integration and cooperation of various computational resources, networks and int
In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of
Jake has a problem-a BIG Math problem. A teenage tutor comes to his rescue, and that's when the fun begins. His eagerness to show what he's learned turns into trouble-especially for know-it-all Angela
This volume directly addresses the complexities involved in data mining and the development of new algorithms, built on an underlying theory consisting of linear and non-linear dynamics, data selectio
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we ha
Bob's just moved in near his granddad. He finds everything boring until he discovers a time machine in his granddad's attic. Bob and his new friend, Tom, are sent on a mission to stop Bob's evil great
Bob's just moved in near his granddad. He finds everything boring until he discovers a time machine in his granddad's attic. Bob and his new friend, Tom, are sent on a mission to stop Bob's evil great
This book constitutes the proceedings of the 5th International Conference, FUN 2010, held in June 2010 in Ischia, Italy. FUN with algorithms is a three-yearly conference that aims at atractings works
This book constitutes the proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP. The 47 papers were carefully selected from 157 submissions a
This book constitutes the proceedings of the 4th International Workshop on Algorithms and Computation, held in Dhaka, Bangladesh, in February 2010. The 23 revised full papers were carefully reviewed a
This book constitutes the refereed proceedings of the 13th Annual European Symposium on Algorithms, ESA 2005, held in Palma de Mallorca, Spain, in September 2005 in the context of the combined confere
One of the most important and exciting trends in web development in recent years is the move towards single page applications, or SPAs. Instead of clicking through hyperlinks and waiting for each page
"A Gecko in the Machine....Postcards from the Bahamas" covers a period from the emigration by the author and his wife with Habu, their German Shepherd dog to their newly built home on the island of Ex
Detectives and CSI crews may work for weeks, months, sometimes years searching and piecing together forensic evidence to find the vital clues in solving a crime. With the use of planetary positions, h
Product reliability is one of the important aspects of product quality. It's dependent on the reliability of every component used in the system. In "Reliability Basic Theories and Applications in Elec
The Castle in the Potomac has stood abandoned for four hundred years. The secret service and the president of the United States got involved in solving the mystery of these ruins due to disapperance o
This book is designed to provide practical applications of sociocultural theory with regard to teachers' roles in second language education. By providing specific examples of teachers' roles in the cl
This book is designed to provide practical applications of sociocultural theory with regard to teachers' roles in second language education. By providing specific examples of teachers' roles in the cl
Classical valuation theory has applications in number theory and class field theory as well as in algebraic geometry, e.g. in a divisor theory for curves. But the noncommutative equivalent is mainly
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the
This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class