Thirty years ago mathematical, as opposed to applied numerical, computation was difficult to perform and so relatively little used. Three threads changed that: the emergence of the personal computer; the discovery of fiber-optics and the consequent development of the modern internet; and the building of the Three “M’s”...
Computer vision seeks a process that starts with a noisy, ambiguous signal from a TV
camera and ends with a high-level description of discrete objects located in 3-dimensional
space and identified in a human classification. In this book we address this process at
several levels. We first treat the low-level image-processing issues of...
Each of the volumes of the Chemical Engineering Series includes numerical examples to
illustrate the application of the theory presented in the text. In addition, at the end of each
volume, there is a selection of problems which the reader is invited to solve in order to
consolidate his (or her) understanding of the principles and to...
The substantial effort of parallel programming is only justified if the resulting
codes are adequately efficient. In this sense, all types of performance tuning are
extremely important to parallel software development. With parallel programs,
performance improvements are much more difficult to achieve than with con
ventional...
Linear-quadratic optimization is one of the most exciting topics in the con trol engineering literature of recent decades. The interest in linear optimal dynamical systems, and especially in those with quadratic cost functional, can be explained by both the richness of properties these systems possess, and the pragmatic value and physical...
Mixed-mode switching circuits distinguish themselves from other circuits
by including switches that are either clocked externally or controlled
internally. These circuits have found broad applications in telecommunication
networks, instrumentation, and power electronic systems, to
name a few. It is the emergence of switched capacitor...
This book consists of 9 chapters encompassing both the fundamental
aspects of dynamic fracture mechanics as well as the studies of fracture
mechanics in novel engineering materials. The chapters have been
written by leading authorities in various fields of fracture mechanics
from all over the world. These chapters have been arranged...
This book represents thirteen papers that are based on the presentations made in the five
session symposium on "Damage and Interfacial Debonding in Composites" on the occasion
of the 32nd Society of Engineering Science Meeting; held in New Orleans, Louisiana,
October 29 - November 1, 1995. The five sessions were mainly in the...
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the...
This book addresses the fundamentals of communications systems and networks, providing
models and analytical methods for evaluating their performance. It is divided into ten chapters,
which are the result of a joint effort by the authors and contributors. The authors and the
contributors have a long history of collaboration, both in...
Cutting planes (cuts) are very popular in the OR community, where they are
used to strengthen the Linear Programming (LP) relaxation of Mixed-Integer
Programs (MIPs) in the hope of improving the performance of an exact LPbased
solver. In particular, an intense research effort has been devoted to the
study of families of general cuts,...
Thirteen years after the publication of the first MPI (message passing interface)
specification and 17 years after the first published paper on PVM(parallel virtual
machine), MPI and PVM have emerged as standard programming environments
and continue to be the development environment of choice for a large variety of...