The Mezonic Agenda: Hacking the Presidency"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will... | | Fuzzy Mathematical Programming and Fuzzy Matrix GamesFrom the reviews of the first edition:
"The book presents a systematic theory … oriented primarily to senior undergraduate students, as well as to graduate students and researchers in the area of fuzzy optimization and related topics. Special attention is devoted to various approaches to fuzzy linear and quadratic programming... | | Problem Solving Methods
Researchers in Artificial Intelligence have traditionally been classified into two
categories: the “neaties” and the “scruffies”. According to the scruffies, the neaties
concentrate on building elegant formal frameworks, whose properties are beautifully
expressed by means of definitions, lemmas, and theorems, but... |