Edited by J. W. P. Hirschfeld

Surveys in Combinatorics, 2001

London Mathematical Society Lecture Note Series

Description

This volume contains the proceedings of the 18th British Combinatorial Conference. This meeting,
held every two years is now a key event for mathematicians working in combinatorics
throughout the world. The papers contained here are from the invited speakers and are thus of a
quality fitting for the event. This book will be a valuable reference for researchers in a variety of
branches of combinatorics. However, graduate students will find much here that will be of use
for future directions in their research.

Chapter Contents

1. The penrose polynomial of graphs and matroids M. Aigner; 2. Cyclic designs I.
Anderson; 3. Orthogonal designs and space-time codes for wireless communication A. R.
Calderbank; 4. Sampling and counting unlabelled structures L. A. Goldberg; 5. Graphs
on surfaces and graph minors B. Mohar; 6. Graph colouring with the probabilistic method M. S. O.
Molloy; 7. The interplay between graphs and matroids J. G. Oxley; 8. Ovoids, spreads and
m-systems of finite classical polar spaces J. A. Thas; 9. List colourings of graphs D. R. Woodall.

ISBN: 0-521-00270-2
Binding: Paperback

Janet Whalen Kammeyer, Daniel J. Rudolph

Restricted Orbit Equivalence for Actions of Discrete Amenable Groups

Cambridge Tracts in Mathematics

Description

This monograph offers a broad investigative tool in ergodic theory and measurable dynamics. The
motivation for this work is that one may measure how similar two dynamical systems are by asking
how much the time structure of orbits of one system must be distorted for it to become the
other. Different restrictions on the allowed distortion will lead to different restricted orbit
equivalence theories. These include Ornstein's Isomorphism theory, Kakutani Equivalence
theory and a list of others. By putting such restrictions in an axiomatic framework, a general
approach is developed that encompasses all these examples simultaneously and gives insight
into how to seek further applications. The work is placed in the context of discrete amenable group
actions where time is not required to be one-dimensional, making the results applicable
to a much wider range of problems and examples.

Chapter Contents

1. Preface; 2. Definitions and examples; 3. The Ornstein-Weiss machinery; 4. Copying lemmas;
5.m-entropy; 6.m-joinings; 7. The equivalence theorem; 8. Appendix.

ISBN: 0-521-80795-6
Binding: Hardback
Pages: 216

Edited by Patrick T. Harker, Stavros A. Zenios

Performance of Financial Institutions

Description

The efficient operation of financial intermediaries - banks, insurance and pension fund firms,
government agencies - is instrumental for the efficient functioning of the financial system and
the fuelling of the economies of the twenty-first century. But what drives the performance of
these institutions in today's global environment?
The interdisciplinary and international perspective of this volume offers a deep understanding of
the drivers of performance in financial institutions. World-renowned scholars from
economics, finance, operations management and marketing, and leading industry professionals,
bring their expertise to bear. Among their concerns are: the definition and measurement of
the efficiency of such institutions; benchmarks of efficiency; identification of performance drivers
and measurement of their effects; the impact of financial innovation and information technologies
on performance; the effects of process design, human resource management policies and
regulations on efficiency; and interrelationships between risk management and operational
efficiency.

Chapter Contents

1. What drives the performance of financial institutions? Patrick T. Harker and Stavros A. Zenios; 2. Efficiency of financial institutions: international survey and directions for future research Allen Berger and David Humphrey; 3. Inside the black box: what explains differencesin the efficiency of financial institutions Allen Berger and Loretta Mester; Part I. Drivers ofPerformance: Indentification, Specification, and
Measurement: 4. Diversification, organization, and efficiency: evidence from bank holding companies Peter Klein and Marc Saidenberg; 5. Product focus versus diversification: estimates of x-efficiency for the US life insurance industry Joseph Meador, Harley Ryan and Caroline Schellhorn; 6. Outperformance: does managerial
specialization pay? Piet Eicholtz, Hans Op Veld and Mark Schweitzer; 7. Bank relationships: a
review Steven Ongena and David C. Smith; 8. Inside the black box: what makes a bank efficient? Frances Frei, Patrick Harker and Larry Hunter; 9. An optimization framework for the triad: capabilities, service quality and
performance Andreas Athanassopoulos; 10. Disentagling within- and between-country efficiency differences of bank branches Andreas Soteriou, Andreas Athanassopolulos and Stavros A. Zenios; Part II. Further Drivers of
Performance: Innovation, Regulation and Technology: 11. The challenges of new electronic technologies in banking: private strategies and public policies Paul Horvitz and Lawrence J. White; 12. Technological change, financial innovation and financial regulation in the US: the challenge for public policy Lawrence J. White; Part
IV. Performance and Risk Management: 14. Risks and returns in relationship and transaction banks: evidence from Bank痴 returns in Germany, Japan, and the UK and the US Kathryn Dewenter and Alan Hess; 15. Acceptable risk: A study of global currency trading rooms in the US and Japan Srilata Zaheer.

ISBN: 0-521-77154-4
Binding: Hardback (Paperback)
Size: 237 x 160 mm
Pages: 512
Weight: 0.825kg
Figures: 16 line diagrams 70 tables


Michael R. A. Huth

Secure Communicating Systems

Description

More and more working computer professionals are confronted with the use, maintenance, or
customization of cryptographic components and program certification mechanisms for local or
mobile code. This text for advanced undergraduate and beginning graduate students
tells what every computer scientist ought to know about cryptographic systems, security protocols,
and secure information flow in programs. Highlights include a detailed description of the
new advanced encryption standard Rijndael; a complete description of an optimal public-key
encryption using RSA which turns extbook RSA・ into a practical implementation; a current, and
formal discussion of standard security models for information flow in computer programs or human
organizations; and a discussion of moral, legal, and political issues. Another novel feature of the
book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site
contains Java source code for the programs featured in the text plus links to other sites,
including online papers and tutorials offering deeper treatments of the topics presented.

Chapter Contents

1. Secure communication in modern information societies; 2. Public-key cryptography; 3.
Symmetric-key cryptography; 4. Security protocol design and analysis; 5. Optimal public-key
encryption with RSA; 6. Secure information-flow analysis.

ISBN: 0-521-80731-X
Binding: Hardback
Pages: 256
Figures: 8 line diagrams 9 tables

Robert McEliece

The Theory of Information and Coding, 2nd edition

Encyclopedia of Mathematics and its Applications

Description

This is a revised edition of McEliece's classic. It is a self-contained introduction to all basic results
in the theory of information and coding (invented by Claude Shannon in 1948). This theory was
developed to deal with the fundamental problem of communication, that of reproducing at one
point, either exactly or approximately, a message selected at another point. There is a
short and elementary overview introducing the reader to the concept of coding. Then, following
the main results, the channel and source coding theorems, there is a study of specific coding
schemes which can be used for channel and source coding. This volume can be used either
for self-study, or for a graduate/undergraduate level course at university. It includes dozens of
worked examples and several hundred problems for solution. The exposition will be easily
comprehensible to readers with some prior knowlege of probability and linear algebra.

Chapter Contents

1. Entropy and mutual information; 2. Discrete memoryless channels and their capacity-cost
functions; 3. Discrete memoryless sources and their rate-distortion functions; 4. The Gaussian
channel and source; 5. The source-channel coding theorem; 6. Survey of advanced topics for
part I; 7. Linear codes; 8. BCH Goppa, and related codes; 9. Convolutional codes; 10.
Variable-length source coding; 11. Survey of advanced topics for part II.

ISBN: 0-521-00095-5
Binding: Hardback
Pages: 305
Figures: 108 line diagrams 15 tables