this book gathers selected, peer-reviewed contributions presented at the Fifthinternationalconference on Numerical Analysis and Optimization (NAO-V), which was held at Sultan Qaboos University, Oman, on January 6-9,...
详细信息
ISBN:
(数字)9783030720407
ISBN:
(纸本)9783030720391
this book gathers selected, peer-reviewed contributions presented at the Fifthinternationalconference on Numerical Analysis and Optimization (NAO-V), which was held at Sultan Qaboos University, Oman, on January 6-9, 2020. Each chapter reports on developments in key fields, such as numerical analysis, numerical optimization, numerical linear algebra, numerical differential equations, optimal control, approximation theory, appliedmathematics, derivative-free optimization methods, programming models, and challenging applications that frequently arise in statistics, econometrics, finance, physics, medicine, biology, engineering and industry.;Many real-world, complex problems can be formulated as optimization tasks, and can be characterized further as large scale, unconstrained, constrained, non-convex, nondifferentiable or discontinuous, and therefore require adequate computational methods, algorithms and software tools. these same tools are often employed by researchers working in current IT hot topics, such as big data, optimization and other complex numerical algorithms in the cloud, devising special techniques for supercomputing systems. this interdisciplinary view permeates the work included in this volume.;the NAO conference series is held every three years at Sultan Qaboos University, withthe aim of bringing together a group of international experts and presenting novel and advanced applications to facilitate interdisciplinary studies among pure scientific and applied knowledge. It is a venue where prominent scientists gather to share innovative ideas and know-how relating to new scientific methodologies, to promote scientific exchange, to discuss possible future cooperations, and to promote the mobility of local and young researchers.
this book constitutes the proceedings of the 4thinternationalconference on algorithms and discreteappliedmathematics, CALDAM 2018, held in Guwahati, India, in February 2018.
ISBN:
(数字)9783319741802
ISBN:
(纸本)9783319741796
this book constitutes the proceedings of the 4thinternationalconference on algorithms and discreteappliedmathematics, CALDAM 2018, held in Guwahati, India, in February 2018.
this three-volume set LNCS 15161, 15162 and 15163 constitutes the refereed proceedings of the 30thinternationalconference, COCOON 2024, held in Shanghai, China, during August 23–25, 2024.the 90 full papers and 6 sh...
详细信息
ISBN:
(数字)9789819610907
ISBN:
(纸本)9789819610891
this three-volume set LNCS 15161, 15162 and 15163 constitutes the refereed proceedings of the 30thinternationalconference, COCOON 2024, held in Shanghai, China, during August 23–25, 2024.
the 90 full papers and 6 short papers were carefully reviewed and selected from 277 submissions. COCOON 2024 provided an excellent venue for researchers working in the area of algorithms, theory of computation, computational complexity, and combinatorics related to computing.
this book constitutes the refereed proceedings of the 6thinternational Frontiers of Algorithmics Workshop, FAW 2012, and the 8thinternationalconference on Algorithmic Aspects in Information and Management, AAIM 201...
详细信息
ISBN:
(数字)9783642297007
ISBN:
(纸本)9783642296994
this book constitutes the refereed proceedings of the 6thinternational Frontiers of Algorithmics Workshop, FAW 2012, and the 8thinternationalconference on Algorithmic Aspects in Information and Management, AAIM 2012, jointly held in Beijing, China, in May 2012.
the 33 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 81 submissions. the papers are organized in topical sections on algorithms and data structures, algorithmic game theory and incentive analysis, biomedical imaging algorithms, communication networks and optimization, computational learning theory, knowledge discovery, and data mining, experimental algorithmic methodologies, optimization algorithms in economic and operations research, pattern recognition algorithms and trustworthy algorithms and trustworthy software.
this book constitutes the proceedings of the 47thinternational Workshop on60;Graph-theoretic Concepts in Computer Science which was held during60;June 23–25, 2021. the conference was planned to take place in W...
详细信息
ISBN:
(数字)9783030868383
ISBN:
(纸本)9783030868376
this book constitutes the proceedings of the 47thinternational Workshop on Graph-theoretic Concepts in Computer Science which was held during June 23–25, 2021. the conference was planned to take place in Warsaw, Poland, but changed to an online event due to the COVID-19 pandemic.;the 30 full papers included in this volume were carefully reviewed and selected from 73 submissions. the conference aims to merge theory and practice by demonstrating how concepts from graph theory can be applied to various areas in computer science or by extracting new graph-theoretic problems from applications.;Chapter “Bears with Hats and Independence Polynomials” is are available open access under a Creative Commons Attribution 4.0 international License via ***.;Chapters 1, 6, and 22 are available open access under a Creative Commons Attribution 4.0 international License via ***.
this book constitutes the proceedings of the 15thinternationalconference on Algorithmic Aspects in Information and Management, AAIM 2021, which was held online during December 20-22, 2021. the conference was origina...
详细信息
ISBN:
(数字)9783030931766
ISBN:
(纸本)9783030931759
this book constitutes the proceedings of the 15thinternationalconference on Algorithmic Aspects in Information and Management, AAIM 2021, which was held online during December 20-22, 2021. the conference was originally planned to take place in Dallas, Texas, USA, but changed to a virtual event due to the COVID-19 pandemic.;the 38 regular papers included in this book were carefully reviewed and selected from 62 submissions. they were organized in the following topical sections: approximation algorithms; scheduling; nonlinear combinatorial optimization; network problems; blockchain, logic, complexity and reliability; and miscellaneous.
TCC 2009, the 6ththeory of Cryptography conference, was held in San Fr- cisco, CA, USA, March 15–17, 2009. TCC 2009 was sponsored by the Inter- tional Association for Cryptologic Research (IACR) and was organized in...
详细信息
ISBN:
(数字)9783642004575
ISBN:
(纸本)9783642004568
TCC 2009, the 6ththeory of Cryptography conference, was held in San Fr- cisco, CA, USA, March 15–17, 2009. TCC 2009 was sponsored by the Inter- tional Association for Cryptologic Research (IACR) and was organized in - operation withthe applied Crypto Group at Stanford University. the General Chair of the conference was Dan Boneh. the conference received 109 submissions, of which the Program Comm- tee selected 33 for presentation at the conference. these proceedings consist of revised versions of those 33 papers. the revisions were not reviewed, and the authors bear full responsibility for the contents of their papers. the conference program also included two invited talks: “the Di?erential Privacy Frontier,” given by Cynthia Dwork and “Some Recent Progress in Lattice-Based Crypt- raphy,” given by Chris Peikert. I thank the Steering Committee of TCC for entrusting me withthe resp- sibility for the TCC 2009 program. I thank the authors of submitted papers for their contributions. the general impression of the Program Committee is that the submissions were of very high quality, and there were many more papers we wanted to accept than we could. the review process was therefore very - warding but the selection was very delicate and challenging. I am grateful for the dedication, thoroughness,and expertise ofthe ProgramCommittee. Obse- ing the way the members of the committee operated makes me as con?dent as possible of the outcome of our selection process.
this two volume set LNCS 8634 and LNCS 8635 constitutes the refereed conference proceedings of the 39thinternational Symposium on Mathematical Foundations of Computer Science, MFCS 2014, held in Budapest, Hungary, in...
详细信息
ISBN:
(数字)9783662445228
ISBN:
(纸本)9783662445211
this two volume set LNCS 8634 and LNCS 8635 constitutes the refereed conference proceedings of the 39thinternational Symposium on Mathematical Foundations of Computer Science, MFCS 2014, held in Budapest, Hungary, in August 2014. the 95 revised full papers presented together with6 invited talks were carefully selected from 270 submissions. the focus of the conference was on following topics: Logic, Semantics, Automata, theory of Programming, algorithms, Complexity, Parallel and Distributed Computing, Quantum Computing, Automata, Grammars and Formal Languages, Combinatorics on Words, Trees and Games.
the 36thinternational Workshop on Graph-theoretic Concepts in Computer Science (WG 2010) took place in Zar´ os, Crete, Greece, June 28–30, 2010. About 60 mathematicians and computer scientists from all over the...
详细信息
ISBN:
(数字)9783642169267
ISBN:
(纸本)9783642169250
the 36thinternational Workshop on Graph-theoretic Concepts in Computer Science (WG 2010) took place in Zar´ os, Crete, Greece, June 28–30, 2010. About 60 mathematicians and computer scientists from all over the world (Australia, Canada, Czech Republic, France, Germany, Greece, Hungary, Israel, Japan, the Netherlands, Norway, Poland, Switzerland, the UK, and the USA) attended the conference. WG has a long tradition. Since 1975, WG has taken place 21 times in Germany, four times in the Netherlands, twice in Austria, twice in France and once in the Czech Republic, Greece, Italy, Norway, Slovakia, Switzerland, and the UK. WG aims at merging theory and practice by demonstrating how concepts from graph theory can be applied to various areas in computer science, or by extracting new graph theoretic problems from applications. the goal is to presentemergingresearchresultsand to identify and exploredirections of future *** conference is well-balanced with respect to established researchers and young scientists. there were 94 submissions, two of which where withdrawn before entering the review process. Each submission was carefully reviewed by at least 3, and on average 4.5, members of the Program Committee. the Committee accepted 28 papers, which makes an acceptance ratio of around 30%. I should stress that, due to the high competition and the limited schedule, there were papers that were not accepted while they deserved to be.
this book constitutes the thoroughly refereed post-conference proceedings of the 6thinternational Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. the 17 revised full papers presented were carefully sel...
详细信息
ISBN:
(数字)9783319214764
ISBN:
(纸本)9783319214757
this book constitutes the thoroughly refereed post-conference proceedings of the 6thinternational Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. the 17 revised full papers presented were carefully selected from 48 submissions. the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, countermeasures, and Hands-on Side-channel analysis.
暂无评论