Combinatorial Group Testing and Its Applications


Book Description

Group testing has been used in medical, chemical and electrical testing, coding, drug screening, pollution control, multiaccess channel management, and recently in data verification, clone library screening and AIDS testing. The mathematical model can be either combinatorial or probabilistic. This book summarizes all important results under the combinatorial model, and demonstrates their applications in real problems. Some other search problems, including the famous counterfeit-coins problem, are also studied in depth. There are two reasons for publishing a second edition of this book. The first is the usual need to update the text (after six years) and correct errors. The second - and more important - reason is to accommodate the recent sudden growth of interest in applying the idea of group testing to clone library screening. This development is much more than just a new application, since the new application brings with it new objectives which require a new twist of theory. It also embraces the growing importance of two topics: nonadaptive algorithms and error tolerance. Two new chapters, one on clone library screening and the other on error tolerance, have been added. Also included is a new chapter on counterfeit coins, the most famous search problem historically, which recently drew on an unexpected connection to some deep mathematical theory to yield new results. Finally, the chapters have been reorganized into parts to provide focuses and perspectives.




Combinatorial Group Testing and Its Applications


Book Description

Group testing has been used in medical, chemical and electrical testing, coding, drug screening, pollution control, multiaccess channel management, and recently in data verification, clone library screening and AIDS testing. The mathematical model can be either combinatorial or probabilistic. This book summarizes all important results under the combinatorial model, and demonstrates their applications in real problems. Some other search problems, including the famous counterfeit-coins problem, are also studied in depth. There are two reasons for publishing a second edition of this book. The first is the usual need to update the text (after six years) and correct errors. The second -- and more important -- reason is to accommodate the recent sudden growth of interest in applying the idea of group testing to clone library screening. This development is much more than just a new application, since the new application brings with it new objectives which require a new twist of theory. It also embraces the growing importance of two topics: nonadaptive algorithms and error tolerance. Two new chapters, one on clone library screening and the other on error tolerance, have been added. Also included is a new chapter on counterfeit coins, the most famous search problem historically, which recently drew on an unexpected connection to some deep mathematical theory to yield new results. Finally, the chapters have been recognized into parts to provide focuses and perspectives.




Inverse Problems for Electrical Networks


Book Description

Annotation This book is a very timely exposition of part of an important subject which goes under the general name of "inverse problems". The analogous problem for continuous media has been very much studied, with a great deal of difficult mathematics involved, especially partial differential equations. Some of the researchers working on the inverse conductivity problem for continuous media (the problem of recovering the conductivity inside from measurements on the outside) have taken an interest in the authors' analysis of this similar problem for resistor networks. The authors' treatment of inverse problems for electrical networks is at a fairly elementary level. It is accessible to advanced undergraduates, and mathematics students at the graduate level. The topics are of interest to mathematicians working on inverse problems, and possibly to electrical engineers. A few techniques from other areas of mathematics have been brought together in the treatment. It is this amalgamation of such topics as graphtheory, medial graphs and matrix algebra, as well as the analogy to inverse problems for partial differential equations, that makes the book both original and interesting.




High Assurance Services Computing


Book Description

Service computing is a cutting-edge area, popular in both industry and academia. New challenges have been introduced to develop service-oriented systems with high assurance requirements. High Assurance Services Computing captures and makes accessible the most recent practical developments in service-oriented high-assurance systems. An edited volume contributed by well-established researchers in this field worldwide, this book reports the best current practices and emerging methods in the areas of service-oriented techniques for high assurance systems. Available results from industry and government, R&D laboratories and academia are included, along with unreported results from the “hands-on” experiences of software professionals in the respective domains. Designed for practitioners and researchers working for industrial organizations and government agencies, High Assurance Services Computing is also suitable for advanced-level students in computer science and engineering.




Encyclopedia of Computer Science and Technology


Book Description

With breadth and depth of coverage, the Encyclopedia of Computer Science and Technology, Second Edition has a multi-disciplinary scope, drawing together comprehensive coverage of the inter-related aspects of computer science and technology. The topics covered in this encyclopedia include: General and reference Hardware Computer systems organization Networks Software and its engineering Theory of computation Mathematics of computing Information systems Security and privacy Human-centered computing Computing methodologies Applied computing Professional issues Leading figures in the history of computer science The encyclopedia is structured according to the ACM Computing Classification System (CCS), first published in 1988 but subsequently revised in 2012. This classification system is the most comprehensive and is considered the de facto ontological framework for the computing field. The encyclopedia brings together the information and historical context that students, practicing professionals, researchers, and academicians need to have a strong and solid foundation in all aspects of computer science and technology.




Algorithms - ESA 2002


Book Description

This volume contains the 74 contributed papers and abstracts of 4 of the 5 invited talks presented at the 10th Annual European Symposium on Algorithms (ESA 2002), held at the University of Rome “La Sapienza”, Rome, Italy, 17-21 September, 2002. For the ?rst time, ESA had two tracks, with separate program committees, which dealt respectively with: – the design and mathematical analysis of algorithms (the “Design and An- ysis” track); – real-world applications, engineering and experimental analysis of algorithms (the “Engineering and Applications” track). Previous ESAs were held in Bad Honnef, Germany (1993); Utrecht, The Neth- lands (1994); Corfu, Greece (1995); Barcelona, Spain (1996); Graz, Austria (1997); Venice, Italy (1998); Prague, Czech Republic (1999); Saarbruc ̈ ken, Ger- ? many (2000), and Arhus, Denmark (2001). The predecessor to the Engineering and Applications track of ESA was the Annual Workshop on Algorithm En- neering (WAE). Previous WAEs were held in Venice, Italy (1997), Saarbruc ̈ ken, ? Germany (1998), London, UK (1999), Saarbru ̈cken, Germany (2000), and Arhus, Denmark (2001). The proceedings of the previous ESAs were published as Springer LNCS volumes 726, 855, 979, 1284, 1461, 1643, 1879, and 2161. The proceedings of WAEs from 1999 onwards were published as Springer LNCS volumes 1668, 1982, and 2161.




Content Computing


Book Description

This book constitutes the refereed proceedings of the Advanced Workshop on Content Computing, AWCC 2004, held in Zhen Jiang, Jiang Su, China in November 2004. The 26 revised full papers and 36 revised short papers presented were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections on mobile code and agent technology, content sharing and consistency management, networking infrastructure and performance, content aware security, multimedia content, content mining and knowledge extraction, Web services and content applications, content retrieval and management, and ontologies and knowledge conceptualization.




Medium Access Control in Wireless Networks


Book Description

Wireless technologies and applications are becoming one of the fastest growing and most promising areas in recent years. To accommodate data transmission by multiple stations sharing the scarce wireless bandwidth, a medium access control (MAC) protocol plays a crucial role in scheduling packet transmission fairly and efficiently. The emerging wireless networks, such as ad-hoc networks, sensor networks or mesh networks, are mostly multi-hop based and in distributed manner, which brings a lot of problems and challenges in designing fine-tuned MAC protocols tailored for modern wireless network. In this book, the authors give complete and in-depth overviews to the classic medium access control algorithms and the related protocols, as well as their applications in various wireless data networks especially the most successful Wireless Local Area Networks (WLAN). The book consists of three major parts. Part I of this book, including Chapters 1-7, is emphasising on the fundamentals of medium access control algorithms and protocols. Chapter 1 provides an introduction to the wireless networks, such as overview of wireless networks, problems and challenges of the wireless networks, and the classifications of MAC protocols as well as the performance metrics. Chapter 2 introduces important collision resolution algorithms applied in medium access controls, for example, the splitting algorithm and the backoff algorithm. Chapter 3 reviews the hybrid access control algorithms that combine both contention and allocation schemes. A series of important collision avoidance schemes are introduced in Chapters 4-7 respectively, with a specific design goal covered in each chapter. Chapter 4 focuses on the multi-channel MAC protocols for collision avoidance; Chapter 5 introduces the concepts of power control and power management in medium access control and how they can be applied in MAC protocol design; Chapter 6 presents how to provide Quality-of- Service (QoS) to multimedia wireless networks, in either centralised or distributed manner; and Chapter 7 explains how the smart antennas can be applied in the medium access control to provide high channel throughput and low packet collision.




Information Theory, Combinatorics, and Search Theory


Book Description

This volume is dedicated to the memory of Rudolf Ahlswede, who passed away in December 2010. The Festschrift contains 36 thoroughly refereed research papers from a memorial symposium, which took place in July 2011. The four macro-topics of this workshop: theory of games and strategic planning; combinatorial group testing and database mining; computational biology and string matching; information coding and spreading and patrolling on networks; provide a comprehensive picture of the vision Rudolf Ahlswede put forward of a broad and systematic theory of search.




BioMath in the Schools


Book Description

Even though contemporary biology and mathematics are inextricably linked, high school biology and mathematics courses have traditionally been taught in isolation. But this is beginning to change. This volume presents papers related to the integration of biology and mathematics in high school classes. The first part of the book provides the rationale for integrating mathematics and biology in high school courses as well as opportunities for doing so. The second part explores the development and integration of curricular materials and includes responses from teachers. Papers in the third part of the book explore the interconnections between biology and mathematics in light of new technologies in biology. The last paper in the book discusses what works and what doesn't and presents positive responses from students to the integration of mathematics and biology in their classes.