Edited by J. W. P. Hirschfeld
Surveys in Combinatorics, 2001
London Mathematical Society Lecture Note
Series
Description
This volume contains the proceedings of the
18th British Combinatorial Conference. This
meeting,
held every two years is now a key event for
mathematicians working in combinatorics
throughout the world. The papers contained
here are from the invited speakers and are
thus of a
quality fitting for the event. This book
will be a valuable reference for researchers
in a variety of
branches of combinatorics. However, graduate
students will find much here that will be
of use
for future directions in their research.
Chapter Contents
1. The penrose polynomial of graphs and matroids
M. Aigner; 2. Cyclic designs I.
Anderson; 3. Orthogonal designs and space-time
codes for wireless communication A. R.
Calderbank; 4. Sampling and counting unlabelled
structures L. A. Goldberg; 5. Graphs
on surfaces and graph minors B. Mohar; 6.
Graph colouring with the probabilistic method
M. S. O.
Molloy; 7. The interplay between graphs and
matroids J. G. Oxley; 8. Ovoids, spreads
and
m-systems of finite classical polar spaces
J. A. Thas; 9. List colourings of graphs
D. R. Woodall.
ISBN: 0-521-00270-2
Binding: Paperback
Janet Whalen Kammeyer, Daniel J. Rudolph
Restricted Orbit Equivalence for Actions
of Discrete Amenable
Groups
Cambridge Tracts in Mathematics
Description
This monograph offers a broad investigative
tool in ergodic theory and measurable dynamics.
The
motivation for this work is that one may
measure how similar two dynamical systems
are by asking
how much the time structure of orbits of
one system must be distorted for it to become
the
other. Different restrictions on the allowed
distortion will lead to different restricted
orbit
equivalence theories. These include Ornstein's
Isomorphism theory, Kakutani Equivalence
theory and a list of others. By putting such
restrictions in an axiomatic framework, a
general
approach is developed that encompasses all
these examples simultaneously and gives insight
into how to seek further applications. The
work is placed in the context of discrete
amenable group
actions where time is not required to be
one-dimensional, making the results applicable
to a much wider range of problems and examples.
Chapter Contents
1. Preface; 2. Definitions and examples;
3. The Ornstein-Weiss machinery; 4. Copying
lemmas;
5.m-entropy; 6.m-joinings; 7. The equivalence
theorem; 8. Appendix.
ISBN: 0-521-80795-6
Binding: Hardback
Pages: 216
Edited by Patrick T. Harker, Stavros A. Zenios
Performance of Financial Institutions
Description
The efficient operation of financial intermediaries
- banks, insurance and pension fund firms,
government agencies - is instrumental for
the efficient functioning of the financial
system and
the fuelling of the economies of the twenty-first
century. But what drives the performance
of
these institutions in today's global environment?
The interdisciplinary and international perspective
of this volume offers a deep understanding
of
the drivers of performance in financial institutions.
World-renowned scholars from
economics, finance, operations management
and marketing, and leading industry professionals,
bring their expertise to bear. Among their
concerns are: the definition and measurement
of
the efficiency of such institutions; benchmarks
of efficiency; identification of performance
drivers
and measurement of their effects; the impact
of financial innovation and information technologies
on performance; the effects of process design,
human resource management policies and
regulations on efficiency; and interrelationships
between risk management and operational
efficiency.
Chapter Contents
1. What drives the performance of financial
institutions? Patrick T. Harker and Stavros
A. Zenios; 2. Efficiency of financial institutions:
international survey and directions for future
research Allen Berger and David Humphrey;
3. Inside the black box: what explains differencesin
the efficiency of financial institutions
Allen Berger and Loretta Mester; Part I.
Drivers ofPerformance: Indentification, Specification,
and
Measurement: 4. Diversification, organization,
and efficiency: evidence from bank holding
companies Peter Klein and Marc Saidenberg;
5. Product focus versus diversification:
estimates of x-efficiency for the US life
insurance industry Joseph Meador, Harley
Ryan and Caroline Schellhorn; 6. Outperformance:
does managerial
specialization pay? Piet Eicholtz, Hans Op
Veld and Mark Schweitzer; 7. Bank relationships:
a
review Steven Ongena and David C. Smith;
8. Inside the black box: what makes a bank
efficient? Frances Frei, Patrick Harker and
Larry Hunter; 9. An optimization framework
for the triad: capabilities, service quality
and
performance Andreas Athanassopoulos; 10.
Disentagling within- and between-country
efficiency differences of bank branches Andreas
Soteriou, Andreas Athanassopolulos and Stavros
A. Zenios; Part II. Further Drivers of
Performance: Innovation, Regulation and Technology:
11. The challenges of new electronic technologies
in banking: private strategies and public
policies Paul Horvitz and Lawrence J. White;
12. Technological change, financial innovation
and financial regulation in the US: the challenge
for public policy Lawrence J. White; Part
IV. Performance and Risk Management: 14.
Risks and returns in relationship and transaction
banks: evidence from Bank痴 returns in Germany,
Japan, and the UK and the US Kathryn Dewenter
and Alan Hess; 15. Acceptable risk: A study
of global currency trading rooms in the US
and Japan Srilata Zaheer.
ISBN: 0-521-77154-4
Binding: Hardback (Paperback)
Size: 237 x 160 mm
Pages: 512
Weight: 0.825kg
Figures: 16 line diagrams 70 tables
Michael R. A. Huth
Secure Communicating Systems
Description
More and more working computer professionals
are confronted with the use, maintenance,
or
customization of cryptographic components
and program certification mechanisms for
local or
mobile code. This text for advanced undergraduate
and beginning graduate students
tells what every computer scientist ought
to know about cryptographic systems, security
protocols,
and secure information flow in programs.
Highlights include a detailed description
of the
new advanced encryption standard Rijndael;
a complete description of an optimal public-key
encryption using RSA which turns extbook
RSA・ into a practical implementation; a
current, and
formal discussion of standard security models
for information flow in computer programs
or human
organizations; and a discussion of moral,
legal, and political issues. Another novel
feature of the
book is the presentation of a formal model-checking
tool for specifying and debugging security
protocols. The book also includes numerous
implementation exercises and programming
projects. A supporting web site
contains Java source code for the programs
featured in the text plus links to other
sites,
including online papers and tutorials offering
deeper treatments of the topics presented.
Chapter Contents
1. Secure communication in modern information
societies; 2. Public-key cryptography; 3.
Symmetric-key cryptography; 4. Security protocol
design and analysis; 5. Optimal public-key
encryption with RSA; 6. Secure information-flow
analysis.
ISBN: 0-521-80731-X
Binding: Hardback
Pages: 256
Figures: 8 line diagrams 9 tables
Robert McEliece
The Theory of Information and Coding, 2nd
edition
Encyclopedia of Mathematics and its Applications
Description
This is a revised edition of McEliece's classic.
It is a self-contained introduction to all
basic results
in the theory of information and coding (invented
by Claude Shannon in 1948). This theory was
developed to deal with the fundamental problem
of communication, that of reproducing at
one
point, either exactly or approximately, a
message selected at another point. There
is a
short and elementary overview introducing
the reader to the concept of coding. Then,
following
the main results, the channel and source
coding theorems, there is a study of specific
coding
schemes which can be used for channel and
source coding. This volume can be used either
for self-study, or for a graduate/undergraduate
level course at university. It includes dozens
of
worked examples and several hundred problems
for solution. The exposition will be easily
comprehensible to readers with some prior
knowlege of probability and linear algebra.
Chapter Contents
1. Entropy and mutual information; 2. Discrete
memoryless channels and their capacity-cost
functions; 3. Discrete memoryless sources
and their rate-distortion functions; 4. The
Gaussian
channel and source; 5. The source-channel
coding theorem; 6. Survey of advanced topics
for
part I; 7. Linear codes; 8. BCH Goppa, and
related codes; 9. Convolutional codes; 10.
Variable-length source coding; 11. Survey
of advanced topics for part II.
ISBN: 0-521-00095-5
Binding: Hardback
Pages: 305
Figures: 108 line diagrams 15 tables