Computer Science -- Theory and Applications: First International Symposium on Computer Science in Russia, CSR 2006, St. Petersburg, Russia, June 8-12, 2006, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$137.61
Used and New from Other Sellers
Used and New from Other Sellers
from $3.68
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (11) from $3.68   
  • New (6) from $92.07   
  • Used (5) from $3.68   

More About This Textbook

Overview

This book constitutes the refereed proceedings of the First International Symposium on Computer Science in Russia, CSR 2006. The 35 revised full theory papers and 29 revised application papers together with 3 invited talks address all major areas in computer science are addressed. The theory track deals with algorithms, prools, data structures and more. The application part comprises programming and languages; computer architecture and hardware design among many more topics.

Read More Show Less

Product Details

Table of Contents

Non-black-box techniques in cryptography 1
Complexity of polynomial multiplication over finite fields 2
Synchronous elastic circuits 3
SZK proofs for black-box group problems 6
Canonical decomposition of a regular factorial language 18
Acyclic bidirected and skew-symmetric graphs : algorithms and structure 23
Inductive type schemas as functors 35
Unfolding synthesis of asynchronous automata 46
Conjugacy and equivalence of weighted automata and functional transducers 58
Applications of the linear matroid parity algorithm to approximating Steiner trees 70
Tuples of disjoint NP-sets 80
Constructive equivalence relations on computable probability measures 92
Planar dimer tilings 104
The complexity of equality constraint languages 114
Window subsequence problems for compressed texts 127
Efficient algorithms in zero-characteristic for a new model of representation of algebraic varieties 137
Relativisation provides natural separations for resolution-based proof systems 147
Bounded-degree forbidden patterns problems are constraint satisfaction problems 159
Isolation and reducibility properties and the collapse result 171
Incremental branching programs 178
Logic of proofs for bounded arithmetic 191
On a maximal NFA without mergible states 202
Expressiveness of metric modalities for continuous time 211
Extending Dijkstra's algorithm to maximize the shortest path by node-wise limited arc interdiction 221
Weighted logics for traces 235
On nonforgetting restarting automata that are deterministic and/or monotone 247
Unwinding a non-effective cut elimination proof 259
Enumerate and expand : improved algorithms for connected vertex cover and tree cover 270
Shannon entropy vs. Kolmogorov complexity 281
Language equations with symmetric difference 292
On primitive recursive realizabilities 304
Evidence reconstruction of epistemic modal logic S5 313
Linear temporal logic with until and before on integer numbers, deciding algorithms 322
On the frequency of letters in morphic sequences 334
Functional equations in Shostak theories 346
All semi-local longest common subsequences in subquadratic time 352
Non-approximability of the randomness deficiency function 364
Multi-agent explicit knowledge 369
Polarized subtyping for sized types 381
Neural-network based physical fields modeling techniques 393
Approximate methods for constrained total variation minimization 403
Dynamic isoline extraction for visualization of streaming data 415
Improved technique of IP address fragmentation strategies for DoS attack traceback 427
Performance comparison between backpropagation, neuro-fuzzy network, and SVM 438
Evolutionary multi-objective optimisation by diversity control 447
3D facial recognition using eigenface and cascade fuzzy neural networks : normalized facial image approach 457
A new scaling kernel-based fuzzy system with low computational complexity 466
Bulk synchronous parallel ML : semantics and implementation of the parallel juxtaposition 475
A shortest path algorithm based on limited search heuristics 487
A new hybrid directory scheme for shared memory multi-processors 498
Manipulator path planning in 3-dimensional space 505
Least likely to use : a new page replacement strategy for improving database management system response time 514
Nonlinear visualization of incomplete data sets 524
A review of race detection mechanisms 534
Fuzzy-Q knowledge sharing techniques with expertness measures : comparison and analysis 544
Explaining symbolic trajectory evaluation by giving it a faithful semantics 555
Analytic modeling of channel traffic in n-cubes 567
Capturing an intruder in the pyramid 580
Speech enhancement in short-wave channel based on empirical mode decomposition 591
Extended resolution proofs for conjoining BDDs 600
Optimal difference systems of sets with multipliers 612
Authentication mechanism using one-time password for 802.11 wireless LAN 619
Optimizing personalized retrieval system based on Web ranking 629
Instruction selection for ARM/thumb processors based on a multi-objective ant algorithm 641
A new flow control algorithm for high speed computer network 652
Nonlinear systems modeling and control using support vector machine technique 660
Fast motif search in protein sequence databases 670
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)