Dry eye is one of the most common disorders encountered in ophthalmological practice. Its symptoms cause considerable discomfort and substantially reduce the patient's quality of life. As it is a complex and multifactorial condition, research investigating dry eye is a matter of great interest all over the world. In this book, the wide range of current basic and clinical research in dry eye and correlated ocular surface diseases is presented by scientists from Germany, Austria and the USA.
Introductory Probability is a pleasure to read and provides a fine answer to the question: How do you construct Brownian motion from scratch, given that you are a competent analyst? There are at least two ways to develop probability theory. The more familiar path is to treat it as its own discipline, and work from intuitive examples such as coin flips and conundrums such as the Monty Hall problem.
Framed by historic developments—from the Open Admissions movement of the 1960s and 1970s to the attacks on remediation that intensified in the 1990s and beyond, Basic Writing traces the arc of these large social and cultural forces as they have shaped and reshaped the field. George Otte and Rebecca Williams Mlynarczyk balance fidelity to the past with present relevance, local concerns with (presumptively) global knowledge, personal judgment with (apparent) objectivity.
Foundations of Cryptography: Volume 2, Basic Applications
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts.
Foundations of Cryptography: Volume 1, Basic Tools
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs.