This book constitutes the refereed proceedings of the Third Latin American Symposium on Theoretical Informatics, LATIN'98, held in Campinas, Brazil, in April 1998.;The 28 revised full papers presented together wit...
详细信息
ISBN:
(数字)9783540697152
ISBN:
(纸本)9783540642756
This book constitutes the refereed proceedings of the Third Latin American Symposium on Theoretical Informatics, LATIN'98, held in Campinas, Brazil, in April 1998.;The 28 revised full papers presented together with five invited surveys were carefully selected from a total of 53 submissions based on 160 referees' reports. The papers are organized in sections on algorithms and complexity; automata, transition systems and combinatorics on words; computational geometry and graph drawing; cryptography; graph theory and algorithms on graphs; packet routing; parallel algorithms; and pattern matching and browsing.
This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012, held in Tokyo, Japan, in May 2012.The 12 papers presented were careful...
详细信息
ISBN:
(数字)9783642356568
ISBN:
(纸本)9783642356551
This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012, held in Tokyo, Japan, in May 2012.
The 12 papers presented were carefully reviewed and selected for inclusion in this book. They contain original research on the rapidly growing, interdisciplinary field of quantum computation, communication and cryptography. Topics addressed are such as quantum algorithms, quantum computation models, quantum complexity theory, simulation of quantum systems, quantum programming languages, quantum cryptography, quantum communication, quantum estimation, quantum measurement, quantum tomography, completely positive maps, decoherence, quantum noise, quantum coding theory, fault-tolerant quantum computing, entanglement theory, and quantum teleportation.
This is the first book on ";", a recent, but controversial development for inferring evolutionary trees. Rather than analyze the combined primary character data directly, supertree construction proceeds by c...
详细信息
ISBN:
(数字)9781402023309
ISBN:
(纸本)9781402023286;9781402023293
This is the first book on ";", a recent, but controversial development for inferring evolutionary trees. Rather than analyze the combined primary character data directly, supertree construction proceeds by combining the tree topologies derived from those data. This difference in strategy has allowed for the exciting possibility of larger, more complete phylogenies than are otherwise currently possible, with the potential to revolutionize evolutionarily-based research. This book provides a comprehensive look at supertrees, ranging from the methods used to build supertrees to the significance of supertrees to bioinformatic and biological research. Reviews of many the major supertree methods are provided and four new techniques, including a Bayesian implementation of supertrees, are described for the first time. The far-reaching impact of supertrees on biological research is highlighted both in general terms and through specific examples from diverse clades such as flowering plants, even-toed ungulates, and primates. The book also critically examines the many outstanding challenges and problem areas for this relatively new field, showing the way for supertree construction in the age of genomics. Interdisciplinary contributions from the majority of the leading authorities on supertree construction in all areas of the bioinformatic community (biology, computersciences, and mathematics) will ensure that this book is a valuable reference with wide appeal to anyone interested in phylogenetic inference.
This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 papers presented together with one invited...
详细信息
ISBN:
(数字)9783642023842
ISBN:
(纸本)9783642023835
This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered are hash functions, block ciphers, asymmetric encryption, digital signatures, asymmetric encryption and anonymity, key agreement protocols, cryptographic protocols, efficient implementations, and implementation attacks.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Symposium on Combinatorial Optimization, ISCO 2018, held in Marrakesh, Marocco, in April 2018. The 35 revised full ...
详细信息
ISBN:
(数字)9783319961514
ISBN:
(纸本)9783319961507
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Symposium on Combinatorial Optimization, ISCO 2018, held in Marrakesh, Marocco, in April 2018. The 35 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The symposium aims to bring together researchers from all the communities related to combinatorial optimization, including algorithms and complexity, mathematical programming and operations research.
This book constitutes the refereed proceedings of the 14th International Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2014, held in Copenhagen, Denmark, in July 2014. The 33 papers were carefully rev...
详细信息
ISBN:
(数字)9783319084046
ISBN:
(纸本)9783319084039
This book constitutes the refereed proceedings of the 14th International Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2014, held in Copenhagen, Denmark, in July 2014. The 33 papers were carefully reviewed and selected from a total of 134 submissions. The papers present original research and cover a wide range of topics in the field of design and analysis of algorithms and data structures including but not limited to approximation algorithms, parameterized algorithms, computational biology, computational geometry and topology, distributed algorithms, external-memory algorithms, exponential algorithms, graph algorithms, online algorithms, optimization algorithms, randomized algorithms, streaming algorithms, string algorithms, sublinear algorithms and algorithmic game theory.
暂无评论