Pattern recognition currently comprises a vast body of methods supporting the development of numerous applications in many different areas of activity. The generally recognized relevance of pattern recognition methods and techniques lies, for the most part, in the general trend or "intelligent" task emulation, which has definitely...
Radiologists have long been interested in imaging and measuring blood fl ow and in
characterising the structure of blood vessels within pathological tissues. In 1927 Egas
Moniz described the technique of cerebral angiography using injection of radio-opaque
contrast agent combined with conventional radiology. His earlier published...
Haptic devices allow users to feel their interfaces and interactions. This has the
potential to radically change the way we use computers. Haptic interaction is
interaction related to the sense of touch. This could be based on force-feedback or
tactile devices. We can take advantage of our powerful sense of touch as an
alternative...
A number of imaging techniques, many of them complementary, are used in the investigation and treatment of disorders of the stomach and duodenum. Optimal patient treatment requires a thorough knowledge of the application of these techniques, as well as a sound understanding of pathology of the stomach and its presenting symptomatology. This...
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Algorithm Engineering, WAE 2000, held in Saarbrücken, Germany in September 2000. The 19 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 30 submissions. Among the topics addressed...
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology.|This book by the designers of the block cipher presents...
"This book is intended for a general scientifically interested audience . The author develops a generative theory of shape along two principles fundamental to intelligence maximization of transfer and maximization of recoverability. He proceeds by using an algebraically flavoured approach characterizing features as...
This monograph is a detailed introductory presentation of the key classes of intelligent data analysis methods. The ten coherently written chapters by leading experts provide complete coverage of the core issues.
The first half of the book is devoted to the discussion of classical statistical issues, ranging from the basic concepts of...
The multiset (a set with multiplicities associated with its elements, in the form
of natural numbers) is a notion which has appeared again and again in many
areas of mathematics and computer science, sometimes called a bag (some historical
information appears in the enclosed paper by A. Syropoulos). As a data
structure, this...
There are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists...
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key...
The First Summer School on Theoretical Aspects on Computer Science was held
at the Institute for Studies in Theoretical Physics and Mathematics (IPM) from
July 3-10, 2000.
The idea of organizing a summer school was originated during a conversation
between the first and the second editor of this volume in the winter...