View All Book Series

Discrete Mathematics and Its Applications

45 Series Titles


Introduction to Combinatorial Designs

Introduction to Combinatorial Designs

2nd Edition

By W.D. Wallis
May 17, 2007

Combinatorial theory is one of the fastest growing areas of modern mathematics. Focusing on a major part of this subject, Introduction to Combinatorial Designs, Second Edition provides a solid foundation in the classical areas of design theory as well as in more contemporary designs based on ...

Handbook of Combinatorial Designs

Handbook of Combinatorial Designs

2nd Edition

Edited By Charles J. Colbourn, Jeffrey H. Dinitz
November 02, 2006

Continuing in the bestselling, informative tradition of the first edition, the Handbook of Combinatorial Designs, Second Edition remains the only resource to contain all of the most important results and tables in the field of combinatorial design. This handbook covers the constructions, properties...

An Introduction to Cryptography

An Introduction to Cryptography

2nd Edition

By Richard A. Mollin
September 18, 2006

Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field.With numerous ...

Handbook of Elliptic and Hyperelliptic Curve Cryptography

Handbook of Elliptic and Hyperelliptic Curve Cryptography

1st Edition

Edited By Henri Cohen, Gerhard Frey, Roberto Avanzi, Christophe Doche, Tanja Lange, Kim Nguyen, Frederik Vercauteren
July 19, 2005

The discrete logarithm problem based on elliptic and hyperelliptic curves has gained a lot of popularity as a cryptographic primitive. The main reason is that no subexponential algorithm for computing discrete logarithms on small genus curves is currently available, except in very special cases. ...

Spanning Trees and Optimization Problems

Spanning Trees and Optimization Problems

1st Edition

By Bang Ye Wu, Kun-Mao Chao
January 27, 2004

The design of approximation algorithms for spanning tree problems has become an exciting and important area of theoretical computer science and also plays a significant role in emerging fields such as biological sequence alignments and evolutionary tree construction. While work in this field ...

Fundamentals of Information Theory and Coding Design

Fundamentals of Information Theory and Coding Design

1st Edition

By Roberto Togneri, Christopher J.S deSilva
January 13, 2003

Books on information theory and coding have proliferated over the last few years, but few succeed in covering the fundamentals without losing students in mathematical abstraction. Even fewer build the essential theoretical framework when presenting algorithms and implementation details of modern ...

Verification of Computer Codes in Computational Science and Engineering

Verification of Computer Codes in Computational Science and Engineering

1st Edition

By Patrick Knupp, Kambiz Salari
October 29, 2002

How can one be assured that computer codes that solve differential equations are correct? Standard practice using benchmark testing no longer provides full coverage because today's production codes solve more complex equations using more powerful algorithms. By verifying the order-of-accuracy of ...

A Practical Handbook of Speech Coders

A Practical Handbook of Speech Coders

1st Edition

By Randy Goldberg, Lance Riek
April 21, 2000

The demand for digital speech coding algorithms grows every day, fueled by applications such as streaming speech over the Internet, Internet telephone, digital cellular telephony, wireless teleconferencing, and various multimedia applications. Until now, most of the books available on audio coding ...

Handbook of Applied Cryptography

Handbook of Applied Cryptography

1st Edition

By Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
October 16, 1996

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for ...

37-45 of 45
AJAX loader