‘Network’ is a heavily overloaded term, so that ‘network analysis’ means different things to different people. Specific forms of network analysis are used in the study of diverse structures such as th
Tabu Search (TS) and, more recently, Scatter Search (SS) have proved highly effective in solving a wide range of optimization problems, and have had a variety of applications in industry, science, and
“What joy to discern the minute in in?nity, the vast to perceive in the small, what divinity!” Jacob Bernoulli (1654-1705) in Ars Conjectandi (1713) We are proud to present to you the proceedings of t
The parametric lambda calculus is a metamodel for reasoning about various kinds of computations. Its syntactic definition is based on the notion of "sets of input values", and different lambda calculi
Rapid technical advances in medical imaging, including its growing application to drug/gene therapy and invasive/interventional procedures, have attracted significant interest in close integration of
This book constitutes the refereed proceedings of the 4th International Workshop on Algorithms in Bioinformatics, WABI 2004, held in Bergen, Norway, in September 2004.The 39 revised full papers presen
This book is devoted to computer-based modeling in cardiology, by taking an educational point of view, and by summarizing knowledge from several, commonly considered delimited areas of cardiac researc
DEXA 2004, the 15th International Conference on Database and Expert Systems Applications, was held August 30 ? September 3, 2004, at the University of Zaragoza, Spain. The quickly growing spectrum of
It is with great pleasure that we present to you this tutorial volume entitled Validation of Stochastic Systems.ItisoneoftheresultsoftheDutch-German- lateral cooperation project “Validation of Stochas
This book constitutes the refereed proceedings of the 4th International Workshop on Ant Colony Optimization and Swarm Intelligence, ANTS 2004, held in Brussels, Belgium in September 2004.The 22 revise
Interactive Digital Storytelling has evolved as a prospering research topic banding together formerly disjointed disciplines stemming from the arts and humanities as well as computer science. It’s tie
The Internet and the worldwide web play an increasingly important role in our private and professional activities, for example in accessing information about cultural, political, economical, medical o
A self-contained treatment of theoretically and practically important efficient algorithms for the primality problem. The text covers the randomized algorithms by Solovay-Strassen and Miller-Rabin fro
The four-volume set LNCS 3036, LNCS 3037, LNCS 3038 and LNCS 3039 constitutes the refereed proceedings of the 4th International Conference on Computational Science, ICCS 2004, held in Krakow, Poland i
The International Conference on Computational Science (ICCS 2004) held in Krak’ ow, Poland, June 6–9, 2004, was a follow-up to the highly successful ICCS 2003 held at two locations, in Melbourne, Aust
This book is dedicated to the memory of Ole-Johan Dahl who passed away in June 2002 at the age of 70, shortly after he had received, together with his colleague Kristen Nygaard, the ACM Alan M. Turing
This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.The 32 rev
This book constitutes the refereed proceedings of the first International Theory of Cryptography Conference, TCC 2004, held in Cambridge, MA, USA in February 2004.The 28 revised full papers presented
The aim of contextual logic is to provide a formal theory of elementary logic, which is based on the doctrines of concepts, judgements, and conclusions. Concepts are mathematized using Formal Concept
This book is a solid foundation of the most important formalisms used for specification and verification of reactive systems. In particular, the text presents all important results o
This book constitutes the refereed proceedings of the 18th International Symposium on Computer and Information Sciences, ISCIS 2003, held in Antalya, Turkey in November 2003.The 135 revised papers pre
Schedule-Based Dynamic Transit Modeling: Theory and Applications outlines the new schedule-based dynamic approach to mass transit modeling. In the last ten years the schedule-based dynamic approach ha
The 14th DEXA 2003 International Conference on Database and Expert - stems Applications was held during September 1–5, 2003 at the Czech Technical UniversityinPrague,CzechRepublic.TheDEXAlineofconfere
The 7th Annual Financial Cryptography Conference was held January 27–30, 2003, in Guadeloupe, French West Indies. Financial Cryptography is organized by the International Financial Cryptography Associ
Algorithms that have to process large data sets have to take into account that the cost of memory access depends on where the data is stored. Traditional algorithm design is based on the von Neumann m
Nowadays, engineering large-scale software systems means dealing with complex systems composed of pervasive software components that move around and adapt to nondeterministic and open environments, li
This book constitutes the refereed proceedings of the Second International Workshop on Experimental and Efficient Algorithms, WEA 2003, held in Ascona, Switzerland in May 2003.The 19 revised full pape
The 2nd International Conference on Evolutionary Multi-Criterion Optimi- tion (EMO 2003) was held on April 8–11, 2003, at the University of the Algarve in Faro, Portugal. This was the second internati
This book presents revised reviewed versions of lectures given during the Machine Learning Summer School held in Canberra, Australia, in February 2002.The lectures address the following key topics in
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern development
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on the Design, Specification, and Verification of Interactive Systems, DSV-IS 2002, held in Rostock, G
A central aim and ever-lasting dream of computer science is to put the development of hardware and software systems on a mathematical basis which is both firm and practical. Such a scientific foundati
The evolutionary approach called scatter search originated from strategies for creating composite decision rules and surrogate constraints. Recent studies demonstrate the practical advantages of this
Telecommunications Network Design And Management represents the state-of-the-art of applying operations research techniques and solutions across a broad spectrum of telecommunications problems and imp
TheAlgorithmicNumberTheorySymposiabeganin1994atCornellUniversity inIthaca,NewYorktorecognizethegrowingimportanceofalgorithmicwork in the theory of numbers. The subject of the conference is broadly con
The two internationally renowned authors elucidate the structure of "fast" parallel computation. Its complexity is emphasised through a variety of techniques ranging from finite combinatorics, probabi
th 2002 DEXA, the 13 International Conference on Database and Expert Systems Applications was held on September 2–6, 2002, at the Universite Aix–Marseille II, France. The quickly growing field of info
This book constitutes the refereed proceedings of the 7th International Conference on Parallel Problem Solving from Nature,PPSN 2002, held in Granada, Spain in September 2002.The 90 revised full paper
Biometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral characteristics. It associates an individual with a previously determine