Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 753 dokumen yang sesuai dengan query
cover
Jager, Tibor
"Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements. This is modeled by treating the group as a black-box. The fact that a computational problem cannot be solved by a reasonably restricted class of algorithms may be seen as support towards the conjecture that the problem is also hard in the classical Turing machine model. Moreover, a lower complexity bound for certain algorithms is a helpful insight for the search for cryptanalytic algorithms. Tibor Jager addresses several fundamental questions concerning algebraic black-box models of computation : Are the generic group model and its variants a reasonable abstraction? What are the limitations of these models? Can we relax these models to bring them closer to the reality?"
Wiesbaden: [Springer Spektrum , ], 2012
e20419322
eBooks  Universitas Indonesia Library
cover
Rosenberg, Nathan
Cambridge, UK: Cambridge University Press, 1982
338.06 ROS i
Buku Teks  Universitas Indonesia Library
cover
Meduna, Alexander
"This textbook gives a systematized and compact summary, providing the most essential types of modern models for languages and computation together with their properties and applications. Most of these models properly reflect and formalize current computational methods, based on parallelism, distribution and cooperation covered in this book. As a result, it allows the user to develop, study, and improve these methods very effectively.
This textbook also represents the first systematic treatment of modern language models for computation. It covers all essential theoretical topics concerning them. From a practical viewpoint, it describes various concepts, methods, algorithms, techniques, and software units based upon these models. Based upon them, it describes several applications in biology, linguistics, and computer science.
Advanced-level students studying computer science, mathematics, linguistics and biology will find this textbook a valuable resource. Theoreticians, practitioners and researchers working in today’s theory of computation and its applications will also find this book essential as a reference."
Switzerland: Springer International Publishing, 2017
e20528420
eBooks  Universitas Indonesia Library
cover
Russell, David W.
"Michie and Chambers’ BOXES methodology created a black box system that was designed to control a mechanically unstable system with very little a priori system knowledge, linearization or approximation. All the method needed was some notion of maximum and minimum values for the state variables and a set of boundaries that divided each variable into an integer state number. The BOXES methodology applies the method to a variety of systems including continuous and chaotic dynamic systems, and discusses how it may be possible to create a generic control method that is self organizing and adaptive that learns with the assistance of near neighbouring states."
London: [, Springer], 2012
e20418183
eBooks  Universitas Indonesia Library
cover
Sputtek, Rebekka
"[Rebekka Sputtek sheds light upon the question of how the personality and emotional traits of executives influence their decision making and leadership behavior. While recent strategic management research has started to recognize the relevance of an executive's personality traits as antecedents of organizational outcomes, this stream has called for a more fine-grained clarification of the psychological processes underlying executive decision making. In order to contribute to the understanding of these processes, a holistic model integrating the role of an expedient set of personality variables and anger in executive’s decision making comprehensiveness as well as authenticity of transformational leadership is developed., Rebekka Sputtek sheds light upon the question of how the personality and emotional traits of executives influence their decision making and leadership behavior. While recent strategic management research has started to recognize the relevance of an executive's personality traits as antecedents of organizational outcomes, this stream has called for a more fine-grained clarification of the psychological processes underlying executive decision making. In order to contribute to the understanding of these processes, a holistic model integrating the role of an expedient set of personality variables and anger in executive’s decision making comprehensiveness as well as authenticity of transformational leadership is developed.]"
Wiesbaden: [Gabler Verlag, ], 2012
e20397193
eBooks  Universitas Indonesia Library
cover
Artikel Jurnal  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 9th International Conference on Theory and Applications of Models of Computation, TAMC 2012, held in Beijing, China, in May 2012. The conference was combined with the Turing Lectures 2012, dedicated to celebrating Alan Turing’s unique impact on mathematics, computing, computer science, informatics, morphogenesis, philosophy, and the wider scientific world. Eight Turing Lectures were given at the TAMC 2012. The 40 revised full papers presented together with invited talks were carefully reviewed and selected from 86 submissions. The papers address 4 special sessions at TAMC 2012 which were algorithms and information in networks, complexity and cryptography, models of computing and networking, programming and verification."
Berlin: Springer-Verlag, 2012
e20410304
eBooks  Universitas Indonesia Library
cover
Ramnath, Rudrapatna V.
Heidelberg : [Springer, ], 2012
e20398119
eBooks  Universitas Indonesia Library
cover
Lalement, Rene
Masson, Paris: Prentice-Hall, 1993
005.1 LAL c
Buku Teks SO  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions."
Heidelberg : Springer, 2012
e20406300
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>