The object of this book is to introduce to a new generation of students an area of mathematics that has received a tremendous impetus during the last twenty years or so from developments in singularity theory.

The differential geometry of curves, families of curves and surfaces in Euclidean space has fascinated mathematicians and users...

With this updated text, Weste conveys an understanding of CMOS technology, circuit design, layout, and system design sufficient to feel confident with the technology. The book deals the technology down to the layout level of detail, thereby providing a bridge from a circuit to a form that may be fabricated. The early chapters provide a circuit view...

Skillfully organized introductory text examines origin of differential equations, then defines basic terms and outlines general solution of a differential equation. Subsequent sections deal with integrating factors; dilution and accretion problems; linearization of first order systems; Laplace Transforms; Newton’s Interpolation Formulas,...

Recent years have seen an explosive growth in research in combinatorics and graph theory.
One primary factor in this rapid development has been the advent of computers, and the
parallel study of practical and efficient algorithms. This volume represents an attempt to...

Until recently there has not been much consensus among educators on
what formal education is necessary for a computer professional. It has always
been considered essential to have a great deal of mathematical knowledge,
as \vell as an understanding of computer hardware. Software education,
however, often consisted of the teaching...

The IBM Vienna Laboratory has made a significant contribution to the work on
the semantic description of computer systems. Both the operational semantics
descriptions ("VDL") and the later work on denotational semantics ("Meta-IV",
"VEM") contain interesting scientific ideas. Partly because of the large...

Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...

The use of modular and parallel programming languages, and the development of distributed architectures is having a profound influence on computer programming and systems design; hardware and performance can now conspire to produce much higher operating speeds than could previously be achieved through sequential processing. Executing...

This book is intended as a text for a one- or two-semester course in compiler
design at the senior undergraduate or introductory graduate level. It can also be
used as a self-study and reference book in compiler design. The purpose of this
text is to cover the underlying concepts and techniques used in compiler design.
Some of...

Classic text considers general theory of computability, computable functions, operations on computable functions, Turing machines self-applied, unsolvable decision problems, applications of general theory, mathematical logic, Kleene hierarchy, computable functionals, classification of unsolvable decision problems and more.

Essential details of every major battle on land and sea in recorded history, from the first battle of Megiddo in 1479 B.C. to the Grenada conflict in 1984. Included: strategic situations, roles played by political/military leaders, troop numbers and training, tactics and objectives, casualties and losses and military/political consequences. Index....