An effort has been made to present the various topics in the theory of graphs in a logical order, to indicate the historical background, and to clarify the exposition by including figures to illustrate concepts and results. In addition, there are three appendices which provide diagrams of graphs, directed graphs, and trees. The emphasis throughout is on theorems rather than algorithms or applications, which however are occaisionally mentioned.
Graphical Enumeration deals with the enumeration of various kinds of graphs. Topics covered range from labeled enumeration and George Pólya's theorem to rooted and unrooted trees, graphs and digraphs, and power group enumeration. Superposition, blocks, and asymptotics are also discussed. A number of unsolved enumeration problems are presented. Comprised of 10 chapters, this book begins with an overview of labeled graphs, followed by a description of the basic enumeration theorem of Pólya. The next three chapters count an enormous variety of trees, graphs, and digraphs. The Power Group Enumeration Theorem is then described together with some of its applications, including the enumeration of self-complementary graphs and digraphs and finite automata. Two other chapters focus on the counting of superposition and blocks, while another chapter is devoted to asymptotic numbers that are developed for several different graphical structures. The book concludes with a comprehensive definitive list of unsolved graphical enumeration problems. This monograph will be of interest to both students and practitioners of mathematics.
The aim of the book is to help students become data scientists. Since this requires a series of courses over a considerable period of time, the book intends to accompany students from the beginning to an advanced understanding of the knowledge and skills that define a modern data scientist. The book presents a comprehensive overview of the mathematical foundations of the programming language R and of its applications to data science.
Fully revised, the proven primer on forensic accounting with all-new cases A must-have reference for every business professional, Forensic Accounting and Fraud Investigation for Non-Experts, Third Edition is a necessary tool for those interested in understanding how financial fraud occurs and what to do when you find or suspect it within your organization. With comprehensive coverage, it provides insightful advice on where an organization is most susceptible to fraud. Updated with new cases and new material on technology tools in forensic accounting Covers the core accounting, investigative, and legal aspects of forensic accounting for professionals new to the field Covers investigative and legal issues along with accounting schemes Written by a team of recognized experts in the field of forensic accounting, Forensic Accounting and Fraud Investigation for Non-Experts, Third Edition is essential reading for accountants and investigators requiring the most up-to-date methods in dealing with financial fraud within their organizations.
Reliability and Maintenance: Networks and Systems gives an up-to-date presentation of system and network reliability analysis as well as maintenance planning with a focus on applicable models. Balancing theory and practice, it presents state-of-the-art research in key areas of reliability and maintenance theory and includes numerous examples and exercises. Every chapter starts with theoretical foundations and basic models and leads to more sophisticated models and ongoing research. The first part of the book introduces structural reliability theory for binary coherent systems. Within the framework of these systems, the second part covers network reliability analysis. The third part presents simply structured maintenance policies that may help with the cost-optimal scheduling of preventive maintenance. Each part can be read independently of one another. Suitable for researchers, practitioners, and graduate students in engineering, operations research, computer science, and applied mathematics, this book offers a thorough guide to the mathematical modeling of reliability and maintenance. It supplies the necessary theoretical and practical details for readers to perform reliability analyses and apply maintenance policies in their organizations.
This book provides an account of the structure and properties of crystalline binary adducts. Such crystals are perhaps better known as molecular compounds and complexes and are estimated to make up one quarter of the world's crystals. More than 600 figures, 200 tables and 3500 references are included in the book.
This comprehensive introduction to computational network theory as a branch of network theory builds on the understanding that such networks are a tool to derive or verify hypotheses by applying computational techniques to large scale network data. The highly experienced team of editors and high-profile authors from around the world present and explain a number of methods that are representative of computational network theory, derived from graph theory, as well as computational and statistical techniques. With its coherent structure and homogenous style, this reference is equally suitable for courses on computational networks.
The textbook provides students with tools they need to analyze complex data using methods from data science, machine learning and artificial intelligence. The authors include both the presentation of methods along with applications using the programming language R, which is the gold standard for analyzing data. The authors cover all three main components of data science: computer science; mathematics and statistics; and domain knowledge. The book presents methods and implementations in R side-by-side, allowing the immediate practical application of the learning concepts. Furthermore, this teaches computational thinking in a natural way. The book includes exercises, case studies, Q&A and examples.
First published in 1971, this book argues that schools at the time were underpowered, due partly to circumstances within contemporary educational institutions, but chiefly to their relationships with the wider social environment. It suggests that schools lacked bargaining power and that their position deteriorated because they had marketed an ev
This volume presents the proceedings of the Second Workshop on Algorithms and Data Structures (WADS '91), held at Carleton University in Ottawa. The workshop was organized by the School of Computer Science at Carleton University. The workshop alternates with the Scandinavian Workshop on Algorithm Theory (SWAT), continuing the tradition of SWAT '88 (LNCS, Vol. 318), WADS '89 (LNCS, Vol. 382), and SWAT '90 (LNCS, Vol. 447). From 107 papers submitted, 37 were selected for presentation at the workshop. In addition, there were 5 invited presentations.
Comprehensive and engaging, this textbook introduces students not only to foundational sociological work, but also to insights from contemporary sociological theory and research. This combined approach ensures that students become familiar with the core of sociology: key concepts, theories, perspectives, methods, and findings. Students will acquire the ability to think like a sociologist, investigate and understand complex social phenomena. This text presents a complete sociological toolkit, guiding students in the art of asking good sociological questions, devising a sophisticated theory and developing methodologies to observe social phenomena. The chapters of this book build cumulatively to equip students with the tools to quickly understand any new sociological topic or contemporary social problem. The textbook also applies the sociological toolkit to selected key sociological issues, showing how specific sociological topics can be easily investigated and understood using this approach. Taking a global and comparative perspective, the book covers a rich diversity of sociological topics and social problems, such as crime, immigration, race and ethnicity, media, education, family, organizations, gender, poverty, modernization and religion. The book presents a range of helpful pedagogical features throughout, such as: Chapter overview and learning goals summaries at the start of every chapter; Thinking like a sociologist boxes, encouraging students to reflect critically on learning points; Principle boxes, summarizing key sociological principles; Theory schema boxes, presenting sociological theories in a clear, understandable manner; Stylized facts highlighting key empirical findings and patterns; Key concepts and summary sections at the end of every chapter; and Companion website providing additional material for every chapter for both instructors and students, including PowerPoint lecture notes, discussion questions and answers, multiple-choice questions, further reading and a full glossary of terms. This clear and accessible text is essential reading for students taking introductory courses in sociology. It will also be useful for undergraduate and graduate courses in other social science disciplines, such as psychology, economics, human geography, demography, communication studies, education sciences, political science and criminology.
This introduction to networking large scale parallel computer systems acts as a primary resource for a wide readership, including network systems engineers, electronics engineers, systems designers, computer scientists involved in systems design and implementation of parallel algorithms development, graduate students in systems architecture, design, or engineering.
This highly acclaimed criminology text presents an up-to-date review of rational choice theories, including deterrence, shaming, and routine activities. It also incorporates current examples of deterrence research regarding domestic violence, drunk driving, and capital punishment, and features thought-provoking discussion of the relativity of crime. The authors explore the crime problem, its context, and causes of crime. The organization of the text reflects the fact that the etiology of crime must be at the heart of criminology. It examines contemporary efforts to redefine crime by focusing on family violence, hate crimes, white-collar misconduct with violent consequences, and other forms of human behavior often neglected by criminologists. Extensive discussion of evolving laws is included, and while the prevalence of the scientific method in the field of criminology is highlighted, the impact of ideology on explanations of crime is the cornerstone of the book.
This volume contains papers presented at the Third International Conference on Computing and Information, ICCI '91, held at Carleton University in Ottawa, Canada, May 27-29, 1991. The conference was organized by the School of Computer Science at Carleton University, and was sponsored by the Natural Sciences and Engineering Research Council of Canada (NSERC) and Carleton University. ICCI '91 was an international forum for the presentation of original results in research, development, and applications in computing and information processing. The conference was aimed at both practitioners and theoreticians, and was organized into five streams: - Algorithms and complexity, - Databases and information systems, - Parallel processing and systems, - Distributed computing and systems, - Expert systems, artificial intelligence. This volume contains three invited papers, by E.C.R. Hehner, R.L. Probert, and S.J. Smith, and 71 selected papers.
Economics and the social sciences are, in fact, the ?hard? sciences, as Herbert Simon argued, because the complexity of the problems dealt with cannot simply be reduced to analytically solvable models or decomposed into separate subprocesses. Nevertheless, in recent years, the emerging interdisciplinary ?sciences of complexity? have provided new methods and tools for tackling these problems, ranging from complex data analysis to sophisticated computer simulations. In particular, advanced methods developed in the natural sciences have recently also been applied to social and economic problems.The twenty-one chapters of this book reflect this modern development from various modeling perspectives (such as agent-based models, evolutionary game theory, reinforcement learning and neural network techniques, time series analysis, non-equilibrium macroscopic dynamics) and for a broad range of socio-economic applications (market dynamics, technological evolution, spatial dynamics and economic growth, decision processes, and agent societies). They jointly demonstrate a shift of perspective in economics and the social sciences that is allowing a new outlook in this field to emerge.
This book is a collection of surveys and exploratory articles about recent developments in the field of computational Euclidean geometry. Topics covered include the history of Euclidean geometry, Voronoi diagrams, randomized geometric algorithms, computational algebra, triangulations, machine proofs, topological designs, finite-element mesh, computer-aided geometric designs and Steiner trees. This second edition contains three new surveys covering geometric constraint solving, computational geometry and the exact computation paradigm.
Safety in the process industries is critical for those who work with chemicals and hazardous substances or processes. The field of loss prevention is, and continues to be, of supreme importance to countless companies, municipalities and governments around the world, and Lees' is a detailed reference to defending against hazards. Recognized as the standard work for chemical and process engineering safety professionals, it provides the most complete collection of information on the theory, practice, design elements, equipment, regulations and laws covering the field of process safety. An entire library of alternative books (and cross-referencing systems) would be needed to replace or improve upon it, but everything of importance to safety professionals, engineers and managers can be found in this all-encompassing three volume reference instead. - The process safety encyclopedia, trusted worldwide for over 30 years - Now available in print and online, to aid searchability and portability - Over 3,600 print pages cover the full scope of process safety and loss prevention, compiling theory, practice, standards, legislation, case studies and lessons learned in one resource as opposed to multiple sources
An effort has been made to present the various topics in the theory of graphs in a logical order, to indicate the historical background, and to clarify the exposition by including figures to illustrate concepts and results. In addition, there are three appendices which provide diagrams of graphs, directed graphs, and trees. The emphasis throughout is on theorems rather than algorithms or applications, which however are occaisionally mentioned.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.