close
1.

電子ブック

EB
Eric Setton, Bernd Girod
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 2:
Video Compression / 2.1:
H.264 Video Coding / 2.1.1:
Distortion Models / 2.1.2:
Video Streaming / 2.2:
Error Resilience / 2.2.1:
Congestion Control / 2.2.2:
Path Diversity / 2.2.3:
Multicast Architectures / 2.3:
IP Multicast / 2.3.1:
Content Delivery Networks / 2.3.2:
Peer-to-Peer Systems / 2.4:
Peer-to-Peer File Transfer, the Example of BitTorrent / 2.4.1:
Peer-to-Peer Streaming / 2.4.2:
Streaming over Throughput-Limited Paths / 3:
Video Encoding for Throughput-Limited Paths / 3.1:
End-to-End Rate-Distortion Performance Model / 3.1.1:
Experimental Results / 3.1.2:
Congestion-Distortion Optimized Scheduling / 3.2:
Channel Model / 3.2.1:
Evaluating a Schedule / 3.2.2:
Randomized Schedule Search / 3.2.3:
CoDiO Light / 3.2.4:
Chapter Summary / 3.2.5:
Peer-to-Peer Control Protocol / 4:
Protocol Description / 4.1:
Different Peer States / 4.1.1:
Different Tree Connection States / 4.1.2:
Multicast Source / 4.1.3:
Protocol Settings / 4.1.4:
Experimental Protocol Evaluation / 4.2:
Experimental Setup / 4.2.1:
Control Protocol Traffic Distribution / 4.2.2:
Join and Rejoin Latency / 4.2.3:
Scalability / 4.2.4:
Limiting Throughput / 4.2.5:
Video Streaming over a Peer-to-Peer Network / 4.3:
Video Streaming Protocol / 5.1:
Video Packet Transmission / 5.1.1:
Retransmissions / 5.1.2:
Peer-to-Peer CoDiO Scheduling / 5.2:
Sender-Driven Prioritization / 5.2.1:
Distortion-Optimized Retransmission Scheduling / 5.2.2:
Scheduler Evaluation / 5.2.3:
Video Sessions / 5.3:
Diversity / 5.3.2:
CoDiO P2P / 5.3.3:
Conclusions and Future Work / 5.4:
Conclusions / 6.1:
Future Work / 6.2:
Video Experiments / A:
Encoding Structures / A.1:
Latency-Constrained Video Streaming / A.1.2:
Error-Resilient Decoding / A.1.3:
Quality Metric / A.1.4:
Video Sequences / A.2:
Container / A.2.1:
Foreman / A.2.2:
Mobile / A.2.3:
Mother & Daughter / A.2.4:
News / A.2.5:
Salesman / A.2.6:
References
Index
Introduction / 1:
Background / 2:
Video Compression / 2.1:
2.

電子ブック

EB
Eric Setton, Bernd Girod
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 2:
Video Compression / 2.1:
H.264 Video Coding / 2.1.1:
Distortion Models / 2.1.2:
Video Streaming / 2.2:
Error Resilience / 2.2.1:
Congestion Control / 2.2.2:
Path Diversity / 2.2.3:
Multicast Architectures / 2.3:
IP Multicast / 2.3.1:
Content Delivery Networks / 2.3.2:
Peer-to-Peer Systems / 2.4:
Peer-to-Peer File Transfer, the Example of BitTorrent / 2.4.1:
Peer-to-Peer Streaming / 2.4.2:
Streaming over Throughput-Limited Paths / 3:
Video Encoding for Throughput-Limited Paths / 3.1:
End-to-End Rate-Distortion Performance Model / 3.1.1:
Experimental Results / 3.1.2:
Congestion-Distortion Optimized Scheduling / 3.2:
Channel Model / 3.2.1:
Evaluating a Schedule / 3.2.2:
Randomized Schedule Search / 3.2.3:
CoDiO Light / 3.2.4:
Chapter Summary / 3.2.5:
Peer-to-Peer Control Protocol / 4:
Protocol Description / 4.1:
Different Peer States / 4.1.1:
Different Tree Connection States / 4.1.2:
Multicast Source / 4.1.3:
Protocol Settings / 4.1.4:
Experimental Protocol Evaluation / 4.2:
Experimental Setup / 4.2.1:
Control Protocol Traffic Distribution / 4.2.2:
Join and Rejoin Latency / 4.2.3:
Scalability / 4.2.4:
Limiting Throughput / 4.2.5:
Video Streaming over a Peer-to-Peer Network / 4.3:
Video Streaming Protocol / 5.1:
Video Packet Transmission / 5.1.1:
Retransmissions / 5.1.2:
Peer-to-Peer CoDiO Scheduling / 5.2:
Sender-Driven Prioritization / 5.2.1:
Distortion-Optimized Retransmission Scheduling / 5.2.2:
Scheduler Evaluation / 5.2.3:
Video Sessions / 5.3:
Diversity / 5.3.2:
CoDiO P2P / 5.3.3:
Conclusions and Future Work / 5.4:
Conclusions / 6.1:
Future Work / 6.2:
Video Experiments / A:
Encoding Structures / A.1:
Latency-Constrained Video Streaming / A.1.2:
Error-Resilient Decoding / A.1.3:
Quality Metric / A.1.4:
Video Sequences / A.2:
Container / A.2.1:
Foreman / A.2.2:
Mobile / A.2.3:
Mother & Daughter / A.2.4:
News / A.2.5:
Salesman / A.2.6:
References
Index
Introduction / 1:
Background / 2:
Video Compression / 2.1:
3.

電子ブック

EB
Marcus S. Fisher
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Chapter 1:
Managing Verification and Validation / Chapter 2:
The Axioms of Leadership / Section 2.1:
Planning / Section 2.2:
Establishing the V&V Requirements / Section 2.2.1:
Establishing the V&V Plan / Section 2.2.2:
Managing the Plan / Section 2.3:
Effectiveness Measures / Section 2.3.2:
Control Gates / Section 2.3.3:
Risk Management / Section 2.4:
Identify / Section 2.4.1:
Analyze / Section 2.4.2:
Plan / Section 2.4.3:
Track / Section 2.4.4:
Control / Section 2.4.5:
Risk Management Plan / Section 2.4.6:
Communication Structures / Section 2.5:
References
The Verification and Validation Life Cycle / Chapter 3:
Traceability Analysis / Section 3.1:
Interface Analysis / Section 3.2:
Phase Dependent Analysis / Section 3.3:
Requirements Analysis / Section 3.3.1:
Design Analysis / Section 3.3.2:
Code Analysis / Section 3.3.3:
Test Analysis / Section 3.3.4:
V&V Testing / Section 3.4:
Systems V&V / Chapter 4:
Appendix A
Index
Introduction / Chapter 1:
Managing Verification and Validation / Chapter 2:
The Axioms of Leadership / Section 2.1:
4.

電子ブック

EB
Roland Zimmermann, Monique Calisti, Marius Walliser
出版情報: Springer eBooks Computer Science , Dordrecht : Birkh?user Basel, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
Event-related Information Logistics / 2.1.1:
Supply Networks / 2.1.2:
Formal Specification of the Problem / 2.1.3:
Requirements of an Event Management Solution / 2.2:
General Requirements / 2.2.1:
Functional Requirements / 2.2.2:
Data Requirements / 2.2.3:
Implications / 2.2.4:
Potential Benefits / 2.3:
Benefits for Single Enterprises / 2.3.1:
Analysis of Supply Network Effects / 2.3.2:
Benefits for Supply Networks / 2.3.3:
Summary on Potential Benefits / 2.3.4:
Existing Approaches / 2.4:
Tracking Systems / 2.4.1:
SCEM Software / 2.4.2:
Conclusion on Existing Approaches / 2.4.3:
Information Base for Event Management / 3:
Data Model / 3.1:
Representation of the Supply Network Domain / 3.1.1:
Aggregation and Refinement of Status Data / 3.1.2:
Disruptive Event Data for Decision Support / 3.1.3:
Extendable Data Structures / 3.1.4:
Semantic Interoperability / 3.2:
Requirements for Semantic Interoperability / 3.2.1:
Ontology for Supply Network Event Management / 3.2.2:
Data Sources / 3.3:
Data Bases / 3.3.1:
Internet Sources and Web Services / 3.3.2:
Radio Frequency Identification Technologies / 3.3.3:
Event Management Functions / 4:
Information Gathering in Supply Networks / 4.1:
Trigger Events / 4.1.1:
Inter-organizational Information Gathering / 4.1.2:
Proactive and Flexible Monitoring / 4.2:
Critical Profiles / 4.2.1:
Discovery of Critical Profiles / 4.2.2:
Continuous Assessment of Critical Profiles / 4.2.3:
Analysis and Interpretation of Event Data / 4.3:
Basic Approach / 4.3.1:
Data Interpretation with Fuzzy Logic / 4.3.2:
Aggregated Order Status / 4.3.3:
Assessment of Disruptive Events / 4.3.4:
Adjustment of Milestone Plans / 4.3.5:
Distribution of Event Data / 4.4:
Alert Management Process / 4.4.1:
Alert Decision Management / 4.4.2:
Escalation Management / 4.4.3:
Selection of Recipient and Media Type / 4.4.4:
Selection of Content / 4.4.5:
Event Management Process / 4.5:
Distributed Event Management in Supply Networks / 4.5.1:
Agent-based Concept / 5:
Software Agents and Supply Network Event Management / 5.1:
Introduction to Software Agents / 5.1.1:
Benefits of Agent Technology for Event Management / 5.1.2:
Related Work in Agent Technologies / 5.1.3:
Agent Oriented Software Engineering / 5.2:
Approaches / 5.2.1:
AUML for Supply Network Event Management / 5.2.2:
Agent Society for Supply Network Event Management / 5.3:
Roles and Agent Types / 5.3.1:
Agent Interactions / 5.3.2:
Institutional Agreements / 5.3.3:
Coordination Agent / 5.4:
Structure / 5.4.1:
Behaviors / 5.4.2:
Interactions / 5.4.3:
Surveillance Agent / 5.5:
Discourse Agent / 5.5.1:
Wrapper Agent / 5.6.1:
Prototype Implementations / 5.7.1:
Generic Prototype / 6.1:
Overview / 6.1.1:
Ontology Integration / 6.1.2:
Supply Network Testbed / 6.1.3:
Simulated Enterprise Data Base / 6.2.1:
Simulator / 6.2.2:
Industry Showcase / 6.3:
Evaluation / 6.3.1:
Concept / 7.1:
Constraints to an Evaluation / 7.1.1:
Multi-dimensional Evaluation / 7.1.2:
Analytical Evaluation / 7.2:
Effects of SNEM Cycles / 7.2.1:
Costs of Event Management / 7.2.2:
Cost-Benefit-Model and Benchmarks / 7.2.3:
Supply Network Effects / 7.2.4:
Event Management with Profiles / 7.2.5:
Conclusions / 7.2.6:
Experimental Evaluation / 7.3:
Reaction Function / 7.3.1:
Experimental Results / 7.3.2:
Cost-Benefit Analysis / 7.3.3:
Showcase Evaluation / 7.3.4:
Prototype Assessment / 7.4.1:
Analysis of Follow-up Costs / 7.4.2:
Summary - Benefits and Constraints / 7.4.3:
Conclusions and Outlook / 8:
Supply Network Event Management / 8.1:
Further Research Opportunities / 8.2:
Object Chips for Supply Network Event Management / 8.2.1:
Event Management in other Domains / 8.2.2:
Integration and Acceptance Issues / 8.2.3:
Appendices
References
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
5.

電子ブック

EB
Roland Zimmermann, Monique Calisti, Marius Walliser, Thomas Hempfling
出版情報: SpringerLink Books - AutoHoldings , Dordrecht : Birkhäuser Basel, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
Event-related Information Logistics / 2.1.1:
Supply Networks / 2.1.2:
Formal Specification of the Problem / 2.1.3:
Requirements of an Event Management Solution / 2.2:
General Requirements / 2.2.1:
Functional Requirements / 2.2.2:
Data Requirements / 2.2.3:
Implications / 2.2.4:
Potential Benefits / 2.3:
Benefits for Single Enterprises / 2.3.1:
Analysis of Supply Network Effects / 2.3.2:
Benefits for Supply Networks / 2.3.3:
Summary on Potential Benefits / 2.3.4:
Existing Approaches / 2.4:
Tracking Systems / 2.4.1:
SCEM Software / 2.4.2:
Conclusion on Existing Approaches / 2.4.3:
Information Base for Event Management / 3:
Data Model / 3.1:
Representation of the Supply Network Domain / 3.1.1:
Aggregation and Refinement of Status Data / 3.1.2:
Disruptive Event Data for Decision Support / 3.1.3:
Extendable Data Structures / 3.1.4:
Semantic Interoperability / 3.2:
Requirements for Semantic Interoperability / 3.2.1:
Ontology for Supply Network Event Management / 3.2.2:
Data Sources / 3.3:
Data Bases / 3.3.1:
Internet Sources and Web Services / 3.3.2:
Radio Frequency Identification Technologies / 3.3.3:
Event Management Functions / 4:
Information Gathering in Supply Networks / 4.1:
Trigger Events / 4.1.1:
Inter-organizational Information Gathering / 4.1.2:
Proactive and Flexible Monitoring / 4.2:
Critical Profiles / 4.2.1:
Discovery of Critical Profiles / 4.2.2:
Continuous Assessment of Critical Profiles / 4.2.3:
Analysis and Interpretation of Event Data / 4.3:
Basic Approach / 4.3.1:
Data Interpretation with Fuzzy Logic / 4.3.2:
Aggregated Order Status / 4.3.3:
Assessment of Disruptive Events / 4.3.4:
Adjustment of Milestone Plans / 4.3.5:
Distribution of Event Data / 4.4:
Alert Management Process / 4.4.1:
Alert Decision Management / 4.4.2:
Escalation Management / 4.4.3:
Selection of Recipient and Media Type / 4.4.4:
Selection of Content / 4.4.5:
Event Management Process / 4.5:
Distributed Event Management in Supply Networks / 4.5.1:
Agent-based Concept / 5:
Software Agents and Supply Network Event Management / 5.1:
Introduction to Software Agents / 5.1.1:
Benefits of Agent Technology for Event Management / 5.1.2:
Related Work in Agent Technologies / 5.1.3:
Agent Oriented Software Engineering / 5.2:
Approaches / 5.2.1:
AUML for Supply Network Event Management / 5.2.2:
Agent Society for Supply Network Event Management / 5.3:
Roles and Agent Types / 5.3.1:
Agent Interactions / 5.3.2:
Institutional Agreements / 5.3.3:
Coordination Agent / 5.4:
Structure / 5.4.1:
Behaviors / 5.4.2:
Interactions / 5.4.3:
Surveillance Agent / 5.5:
Discourse Agent / 5.5.1:
Wrapper Agent / 5.6.1:
Prototype Implementations / 5.7.1:
Generic Prototype / 6.1:
Overview / 6.1.1:
Ontology Integration / 6.1.2:
Supply Network Testbed / 6.1.3:
Simulated Enterprise Data Base / 6.2.1:
Simulator / 6.2.2:
Industry Showcase / 6.3:
Evaluation / 6.3.1:
Concept / 7.1:
Constraints to an Evaluation / 7.1.1:
Multi-dimensional Evaluation / 7.1.2:
Analytical Evaluation / 7.2:
Effects of SNEM Cycles / 7.2.1:
Costs of Event Management / 7.2.2:
Cost-Benefit-Model and Benchmarks / 7.2.3:
Supply Network Effects / 7.2.4:
Event Management with Profiles / 7.2.5:
Conclusions / 7.2.6:
Experimental Evaluation / 7.3:
Reaction Function / 7.3.1:
Experimental Results / 7.3.2:
Cost-Benefit Analysis / 7.3.3:
Showcase Evaluation / 7.3.4:
Prototype Assessment / 7.4.1:
Analysis of Follow-up Costs / 7.4.2:
Summary - Benefits and Constraints / 7.4.3:
Conclusions and Outlook / 8:
Supply Network Event Management / 8.1:
Further Research Opportunities / 8.2:
Object Chips for Supply Network Event Management / 8.2.1:
Event Management in other Domains / 8.2.2:
Integration and Acceptance Issues / 8.2.3:
Appendices
References
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
6.

電子ブック

EB
Zhaohui Wu, Hua-jun Chen, Huajun Chen, Zhao-hui Wu
出版情報: Springer eBooks Computer Science , Springer, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 1.1:
Grid Computing / 1.1.1:
Semantic Web / 1.1.2:
Semantic Grid / 1.2:
Basic Concepts / 1.2.1:
Brief History / 1.2.2:
Basic Issues / 1.3:
Knowledge Representation for the Semantic Grid / 1.3.1:
Semantic Data Integration / 1.3.2:
Semantic Service Composition and Process Coordination / 1.3.3:
Semantic Mining and Knowledge Discovery in the Semantic Grid / 1.3.4:
Trust and Security / 1.3.5:
Case Studies / 1.4:
myGrid / 1.4.1:
CombeChem / 1.4.2:
CoAKTinG / 1.4.3:
K-WF Grid / 1.4.4:
Semantic Grid Research and Development in China / 1.4.5:
Summary and Conclusion / 1.5:
References
Knowledge Representation / 2:
Mathematical Logic / 2.2.1:
Semantic Network / 2.2.2:
Frames / 2.2.3:
Ontology / 2.2.4:
Description Logic / 2.3:
Knowledge Representation Framework for the Semantic Grid / 2.4:
XML and XML Schema / 2.4.1:
RDF and RDF Schema / 2.4.2:
Web Ontology Language / 2.4.3:
Ontology Development and Application for TCM / 2.5:
Ontology Design and Development for UTCMLS / 2.5.1:
TCM Ontology / 2.5.2:
Dynamic Problem Solving in the Semantic Grid / 2.6:
Problem Solving / 3.1:
Cooperative Distributed Problem Solving / 3.1.2:
Multi-Agent System / 3.1.3:
Grid-based Problem Solving / 3.2:
Grid and Problem Solving / 3.2.1:
Problem Solving in the Semantic Grid / 3.2.2:
Ontology Management for Grid-based Problem Solving / 3.3:
Grid-based Ontology Management / 3.3.1:
Ontology Grid Node / 3.3.2:
Semantic View / 3.3.3:
Ontology Reuse for Grid-based Problem Solving / 3.4:
Dynamic Memory Model / 3.4.1:
Case-based Ontology Repository / 3.4.2:
Dynamic Problem Solving Based on SubO Evolution / 3.5:
Sub-Ontology Manipulations / 3.5.1:
Terminology / 3.5.2:
Problem-Solving Environment / 3.5.3:
Sub-Ontology Based Problem Solving / 3.5.4:
The Relationship between Problem Solving and the Semantic Grid / 3.6:
Related Works / 3.7:
Trust Computing in the Semantic Grid / 3.8:
Trust for the Semantic Grid / 4.1:
Characteristic Features of Trust / 4.2.1:
Cost and Utility / 4.2.2:
Distributed vs. Centralized / 4.2.3:
Semantics of Information / 4.2.4:
Closed Trust Model / 4.3:
Open Trust Model / 4.4:
Experiments / 4.5:
Related Work / 4.6:
Data Integration in the Semantic Grid / 4.7:
Preliminaries / 5.1:
Semantic Mapping in the Semantic Grid / 5.2:
The Mapping Issue / 5.2.1:
Basic Mapping System / 5.2.2:
Constraint Mapping / 5.2.3:
Semantic Query Processing in the Semantic Grid / 5.3:
Answering Queries Using SHIQ-RDM Views / 5.3.1:
Rewriting SPARQL Queries Using SHIQ-RDM Views / 5.3.2:
Service Flow Management in the Semantic Grid / 5.4:
Research Framework of Service Flow Management / 6.1:
Service Matchmaking and Discovery / 6.2.1:
Service Composition / 6.2.2:
Service Composition Verification / 6.2.3:
Service Matchmaking in DartFlow / 6.3:
An Extended Service Model / 6.3.1:
Service Matchmaking / 6.3.2:
Performance Evaluation / 6.3.3:
Service Composition in DartFlow / 6.4:
Service Composition Framework / 6.4.1:
Rules Types and Definitions / 6.4.2:
Automatic Service Composition Based on Rules / 6.4.3:
Service Flow Verification in DartFlow / 6.5:
Overview of [pi]-Calculus / 6.5.1:
Modeling Service Behavior Using [pi]-Calculus / 6.5.2:
Verification of Service Compatibility / 6.5.3:
Data Mining and Knowledge Discovery in the Semantic Grid / 6.6:
Development of KDD System Architecture / 7.1:
Single-computer-based Architecture / 7.2.1:
Parallelized Architecture / 7.2.2:
Distributed Architecture / 7.2.3:
Grid-based Architecture / 7.2.4:
A Summary of the Development of KDD System Architecture / 7.2.5:
Knowledge Discovery Based on the Semantic Grid / 7.3:
Virtual Organizations of Knowledge Discovery in the Semantic Grid / 7.3.1:
Architecture and Components of Knowledge Discovery in the Semantic Grid / 7.3.2:
Characteristics of Knowledge Discovery in the Semantic Grid / 7.3.3:
Drug Community Discovery Utilizing TCM Semantic Grid / 7.4:
Semantic Graph Mining Methodology / 7.4.1:
Use Case: TCM Formulae Interpretation and Herb-Drug Interaction Analysis / 7.4.2:
DartGrid: A Semantic Grid Implementation / 7.5:
DartDB-A Semantic Data Integration Toolkit / 8.1:
Overview / 8.2.1:
System Features / 8.2.2:
System Architecture / 8.2.3:
Mapping from Relational Data to Semantic Web Ontology / 8.2.4:
Semantic Browser and Query Tool / 8.2.5:
Semantic Search Engine / 8.2.6:
DartFlow-A Service Flow Management Prototype / 8.3:
Main Functions / 8.3.1:
Semantic Grid Applications for Traditional Chinese Medicine / 8.4:
Background, Status, and Problems of TCM Informatics / 9.1:
Background of TCM Informatics / 9.1.1:
Status of TCM Informatics / 9.1.2:
Problems of TCM Informatics / 9.1.3:
The Architecture of TCM e-Science Semantic Grid / 9.2:
Three Layers of TCM e-Science Environment / 9.2.1:
Application Platforms in TCM e-Science Environment / 9.2.3:
Collaborative TCM Ontology Engineering / 9.3:
Creating a Semantic Grid of TCM Databases / 9.4:
A Semantic Grid Environment for Database Construction / 9.5:
TCM Knowledge Discovery Platform / 9.6:
Summary / 9.7:
Semantic Grid Applications in Intelligent Transportation Systems / 10:
ITS System and Grid Computing / 10.1:
ITS System and Ontology / 10.1.2:
Layered Architecture for ITS-Grid / 10.2:
ITS Semantic Grid / 10.3:
The Development of an ITS Ontology / 10.3.1:
ITS-Grid Applications / 10.3.2:
Case Study / 10.4:
Index / 10.5:
Introduction / 1:
Background / 1.1:
Grid Computing / 1.1.1:
7.

電子ブック

EB
Zhaohui Wu, Hua-jun Chen, Huajun Chen, Zhao-hui Wu
出版情報: SpringerLink Books - AutoHoldings , Springer, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 1.1:
Grid Computing / 1.1.1:
Semantic Web / 1.1.2:
Semantic Grid / 1.2:
Basic Concepts / 1.2.1:
Brief History / 1.2.2:
Basic Issues / 1.3:
Knowledge Representation for the Semantic Grid / 1.3.1:
Semantic Data Integration / 1.3.2:
Semantic Service Composition and Process Coordination / 1.3.3:
Semantic Mining and Knowledge Discovery in the Semantic Grid / 1.3.4:
Trust and Security / 1.3.5:
Case Studies / 1.4:
myGrid / 1.4.1:
CombeChem / 1.4.2:
CoAKTinG / 1.4.3:
K-WF Grid / 1.4.4:
Semantic Grid Research and Development in China / 1.4.5:
Summary and Conclusion / 1.5:
References
Knowledge Representation / 2:
Mathematical Logic / 2.2.1:
Semantic Network / 2.2.2:
Frames / 2.2.3:
Ontology / 2.2.4:
Description Logic / 2.3:
Knowledge Representation Framework for the Semantic Grid / 2.4:
XML and XML Schema / 2.4.1:
RDF and RDF Schema / 2.4.2:
Web Ontology Language / 2.4.3:
Ontology Development and Application for TCM / 2.5:
Ontology Design and Development for UTCMLS / 2.5.1:
TCM Ontology / 2.5.2:
Dynamic Problem Solving in the Semantic Grid / 2.6:
Problem Solving / 3.1:
Cooperative Distributed Problem Solving / 3.1.2:
Multi-Agent System / 3.1.3:
Grid-based Problem Solving / 3.2:
Grid and Problem Solving / 3.2.1:
Problem Solving in the Semantic Grid / 3.2.2:
Ontology Management for Grid-based Problem Solving / 3.3:
Grid-based Ontology Management / 3.3.1:
Ontology Grid Node / 3.3.2:
Semantic View / 3.3.3:
Ontology Reuse for Grid-based Problem Solving / 3.4:
Dynamic Memory Model / 3.4.1:
Case-based Ontology Repository / 3.4.2:
Dynamic Problem Solving Based on SubO Evolution / 3.5:
Sub-Ontology Manipulations / 3.5.1:
Terminology / 3.5.2:
Problem-Solving Environment / 3.5.3:
Sub-Ontology Based Problem Solving / 3.5.4:
The Relationship between Problem Solving and the Semantic Grid / 3.6:
Related Works / 3.7:
Trust Computing in the Semantic Grid / 3.8:
Trust for the Semantic Grid / 4.1:
Characteristic Features of Trust / 4.2.1:
Cost and Utility / 4.2.2:
Distributed vs. Centralized / 4.2.3:
Semantics of Information / 4.2.4:
Closed Trust Model / 4.3:
Open Trust Model / 4.4:
Experiments / 4.5:
Related Work / 4.6:
Data Integration in the Semantic Grid / 4.7:
Preliminaries / 5.1:
Semantic Mapping in the Semantic Grid / 5.2:
The Mapping Issue / 5.2.1:
Basic Mapping System / 5.2.2:
Constraint Mapping / 5.2.3:
Semantic Query Processing in the Semantic Grid / 5.3:
Answering Queries Using SHIQ-RDM Views / 5.3.1:
Rewriting SPARQL Queries Using SHIQ-RDM Views / 5.3.2:
Service Flow Management in the Semantic Grid / 5.4:
Research Framework of Service Flow Management / 6.1:
Service Matchmaking and Discovery / 6.2.1:
Service Composition / 6.2.2:
Service Composition Verification / 6.2.3:
Service Matchmaking in DartFlow / 6.3:
An Extended Service Model / 6.3.1:
Service Matchmaking / 6.3.2:
Performance Evaluation / 6.3.3:
Service Composition in DartFlow / 6.4:
Service Composition Framework / 6.4.1:
Rules Types and Definitions / 6.4.2:
Automatic Service Composition Based on Rules / 6.4.3:
Service Flow Verification in DartFlow / 6.5:
Overview of [pi]-Calculus / 6.5.1:
Modeling Service Behavior Using [pi]-Calculus / 6.5.2:
Verification of Service Compatibility / 6.5.3:
Data Mining and Knowledge Discovery in the Semantic Grid / 6.6:
Development of KDD System Architecture / 7.1:
Single-computer-based Architecture / 7.2.1:
Parallelized Architecture / 7.2.2:
Distributed Architecture / 7.2.3:
Grid-based Architecture / 7.2.4:
A Summary of the Development of KDD System Architecture / 7.2.5:
Knowledge Discovery Based on the Semantic Grid / 7.3:
Virtual Organizations of Knowledge Discovery in the Semantic Grid / 7.3.1:
Architecture and Components of Knowledge Discovery in the Semantic Grid / 7.3.2:
Characteristics of Knowledge Discovery in the Semantic Grid / 7.3.3:
Drug Community Discovery Utilizing TCM Semantic Grid / 7.4:
Semantic Graph Mining Methodology / 7.4.1:
Use Case: TCM Formulae Interpretation and Herb-Drug Interaction Analysis / 7.4.2:
DartGrid: A Semantic Grid Implementation / 7.5:
DartDB-A Semantic Data Integration Toolkit / 8.1:
Overview / 8.2.1:
System Features / 8.2.2:
System Architecture / 8.2.3:
Mapping from Relational Data to Semantic Web Ontology / 8.2.4:
Semantic Browser and Query Tool / 8.2.5:
Semantic Search Engine / 8.2.6:
DartFlow-A Service Flow Management Prototype / 8.3:
Main Functions / 8.3.1:
Semantic Grid Applications for Traditional Chinese Medicine / 8.4:
Background, Status, and Problems of TCM Informatics / 9.1:
Background of TCM Informatics / 9.1.1:
Status of TCM Informatics / 9.1.2:
Problems of TCM Informatics / 9.1.3:
The Architecture of TCM e-Science Semantic Grid / 9.2:
Three Layers of TCM e-Science Environment / 9.2.1:
Application Platforms in TCM e-Science Environment / 9.2.3:
Collaborative TCM Ontology Engineering / 9.3:
Creating a Semantic Grid of TCM Databases / 9.4:
A Semantic Grid Environment for Database Construction / 9.5:
TCM Knowledge Discovery Platform / 9.6:
Summary / 9.7:
Semantic Grid Applications in Intelligent Transportation Systems / 10:
ITS System and Grid Computing / 10.1:
ITS System and Ontology / 10.1.2:
Layered Architecture for ITS-Grid / 10.2:
ITS Semantic Grid / 10.3:
The Development of an ITS Ontology / 10.3.1:
ITS-Grid Applications / 10.3.2:
Case Study / 10.4:
Index / 10.5:
Introduction / 1:
Background / 1.1:
Grid Computing / 1.1.1:
8.

電子ブック

EB
Qingfeng Chen, Takeo Kanade, Chengqi Zhang, Shichao Zhang
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
What Is Security Protocol? / 1.1:
Needs of Formal Analysis for Secure Transaction Protocols / 1.2:
Formal Methods and Related Areas / 1.3:
Emerging Issues and Trends / 1.4:
A Brief Discussion on the Chapters / 1.5:
Summary / 1.6:
Overview of Security Protocol Analysis / 2:
The Formalism / 2.1:
Basic Notations and Terminology / 2.1.1:
Inference Rules / 2.1.2:
Security Protocols / 2.2:
SET Protocol / 2.2.1:
Netbill Protocol / 2.2.2:
Security Services / 2.2.3:
Principles of Cryptography / 2.2.4:
Threats in Security Protocols / 2.2.5:
Research into Analysis of Security Protocols / 2.3:
A Discussion of Formal Methods and Security Protocols / 2.3.1:
A Brief Introduction to Protocol Abstraction / 2.3.2:
A Classification of Approaches for Protocol Analysis / 2.3.3:
Attack-Construction Approach / 2.4:
Approaches by Dolev and Yao / 2.4.1:
NRL Protocol Analyser / 2.4.2:
Inference-Construction Approach / 2.5:
BAN Logic / 2.5.1:
Extensions to BAN Logic / 2.5.2:
Proof-Construction Approach / 2.6:
Approaches Using Formal Tools and Specification Languages / 2.7:
Formal Analysis of Secure Transaction Protocols / 2.8:
Research into Verifying Electronic Transaction Protocols / 3.1:
Formalism for Protocol Analysis Using Process Calculi / 3.2.1:
Formal Analysis Using an Observational Transition System / 3.2.2:
Formal Analysis of Card-Based Payment Systems in Mobile Devices / 3.2.3:
A Computational Model / 3.3:
Basic Terms and Statements / 3.4:
Logical Framework and Statement of ENDL / 3.5:
Axiom / 3.5.1:
Inference Format / 3.5.2:
Verification Instances of Security Protocols in ENDL / 3.5.4:
Model Checking in Security Protocol Analysis / 3.6:
An Overview of Model Checking in Analysing E-Commerce Protocols / 4.1:
Model Checking for Failure Analysis of Protocols / 4.1.1:
Automatic Analysis of E-commerce Protocols Using UML / 4.1.2:
An ENDL-Based Verification Model / 4.2:
Components / 4.2.1:
Designing the Model / 4.2.2:
Handling the Knowledge and Facts / 4.2.3:
Recognition / 4.2.4:
Comparison with Theorem Proving / 4.3:
Discussion / 4.4:
Uncertainty Issues in Secure Messages / 4.5:
Estimation of Inconsistency of Secure Messages / 5.1:
Related Work / 5.2.1:
Semantics Description / 5.2.2:
Measuring Inconsistency in Secure Messages / 5.2.3:
Examples of Measuring Inconsistency / 5.2.4:
Experiments / 5.2.5:
Integration of Conflicting Beliefs in Secure Messages / 5.3:
Basic Concepts / 5.3.1:
Handling Inconsistent Beliefs in Secure Messages / 5.3.3:
Applications of Data Mining in Protocol Analysis / 5.3.4:
Association Rule Mining for Inconsistent Secure Messages / 6.1:
The Basics of Association Rule Mining / 6.4.1:
Data Preparation / 6.4.2:
Identifying Association Rules of Interest / 6.4.3:
Algorithms and Experiments / 6.5:
Algorithms / 6.5.1:
Detection Models of Collusion Attacks / 6.5.2:
Identification of Frequent Patterns for Collusion Attack Detection / 7.1:
A Framework to Detect Collusion Attacks / 7.3.1:
Dealing with Knowledge and Facts / 7.3.3:
A Case Study / 7.3.4:
Estimation of the Probability of Collusion Attacks / 7.4:
Motivations / 7.4.1:
Preliminaries / 7.4.2:
Identifying Collusion Attack Using Bayesian Network / 7.4.3:
Conclusion and Future Works / 7.4.4:
Conclusion / 8.1:
Future Work / 8.2:
References
Index
Introduction / 1:
What Is Security Protocol? / 1.1:
Needs of Formal Analysis for Secure Transaction Protocols / 1.2:
9.

電子ブック

EB
Qingfeng Chen, Takeo Kanade, Chengqi Zhang, Shichao Zhang
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
What Is Security Protocol? / 1.1:
Needs of Formal Analysis for Secure Transaction Protocols / 1.2:
Formal Methods and Related Areas / 1.3:
Emerging Issues and Trends / 1.4:
A Brief Discussion on the Chapters / 1.5:
Summary / 1.6:
Overview of Security Protocol Analysis / 2:
The Formalism / 2.1:
Basic Notations and Terminology / 2.1.1:
Inference Rules / 2.1.2:
Security Protocols / 2.2:
SET Protocol / 2.2.1:
Netbill Protocol / 2.2.2:
Security Services / 2.2.3:
Principles of Cryptography / 2.2.4:
Threats in Security Protocols / 2.2.5:
Research into Analysis of Security Protocols / 2.3:
A Discussion of Formal Methods and Security Protocols / 2.3.1:
A Brief Introduction to Protocol Abstraction / 2.3.2:
A Classification of Approaches for Protocol Analysis / 2.3.3:
Attack-Construction Approach / 2.4:
Approaches by Dolev and Yao / 2.4.1:
NRL Protocol Analyser / 2.4.2:
Inference-Construction Approach / 2.5:
BAN Logic / 2.5.1:
Extensions to BAN Logic / 2.5.2:
Proof-Construction Approach / 2.6:
Approaches Using Formal Tools and Specification Languages / 2.7:
Formal Analysis of Secure Transaction Protocols / 2.8:
Research into Verifying Electronic Transaction Protocols / 3.1:
Formalism for Protocol Analysis Using Process Calculi / 3.2.1:
Formal Analysis Using an Observational Transition System / 3.2.2:
Formal Analysis of Card-Based Payment Systems in Mobile Devices / 3.2.3:
A Computational Model / 3.3:
Basic Terms and Statements / 3.4:
Logical Framework and Statement of ENDL / 3.5:
Axiom / 3.5.1:
Inference Format / 3.5.2:
Verification Instances of Security Protocols in ENDL / 3.5.4:
Model Checking in Security Protocol Analysis / 3.6:
An Overview of Model Checking in Analysing E-Commerce Protocols / 4.1:
Model Checking for Failure Analysis of Protocols / 4.1.1:
Automatic Analysis of E-commerce Protocols Using UML / 4.1.2:
An ENDL-Based Verification Model / 4.2:
Components / 4.2.1:
Designing the Model / 4.2.2:
Handling the Knowledge and Facts / 4.2.3:
Recognition / 4.2.4:
Comparison with Theorem Proving / 4.3:
Discussion / 4.4:
Uncertainty Issues in Secure Messages / 4.5:
Estimation of Inconsistency of Secure Messages / 5.1:
Related Work / 5.2.1:
Semantics Description / 5.2.2:
Measuring Inconsistency in Secure Messages / 5.2.3:
Examples of Measuring Inconsistency / 5.2.4:
Experiments / 5.2.5:
Integration of Conflicting Beliefs in Secure Messages / 5.3:
Basic Concepts / 5.3.1:
Handling Inconsistent Beliefs in Secure Messages / 5.3.3:
Applications of Data Mining in Protocol Analysis / 5.3.4:
Association Rule Mining for Inconsistent Secure Messages / 6.1:
The Basics of Association Rule Mining / 6.4.1:
Data Preparation / 6.4.2:
Identifying Association Rules of Interest / 6.4.3:
Algorithms and Experiments / 6.5:
Algorithms / 6.5.1:
Detection Models of Collusion Attacks / 6.5.2:
Identification of Frequent Patterns for Collusion Attack Detection / 7.1:
A Framework to Detect Collusion Attacks / 7.3.1:
Dealing with Knowledge and Facts / 7.3.3:
A Case Study / 7.3.4:
Estimation of the Probability of Collusion Attacks / 7.4:
Motivations / 7.4.1:
Preliminaries / 7.4.2:
Identifying Collusion Attack Using Bayesian Network / 7.4.3:
Conclusion and Future Works / 7.4.4:
Conclusion / 8.1:
Future Work / 8.2:
References
Index
Introduction / 1:
What Is Security Protocol? / 1.1:
Needs of Formal Analysis for Secure Transaction Protocols / 1.2:
10.

電子ブック

EB
Gero M?hl, Ludger Fiege, Gero M?hl, Peter Pietzuch
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Networked Computing / 1.1:
Middleware / 1.2:
Event-Based Systems / 1.3:
Application Scenarios / 1.4:
Information Dissemination / 1.4.1:
Network Monitoring / 1.4.2:
Enterprise Application Integration / 1.4.3:
Mobile Systems / 1.4.4:
Ubiquitous systems / 1.4.5:
Putting Event-Based Systems Into Context / 1.5:
From Centralized to Internet-Scale Event Systems / 1.6:
Structure of the Book / 1.7:
Basics / 2:
Terminology / 2.1:
Events and Notifications / 2.1.1:
Producers and Consumers / 2.1.2:
Subscriptions and Filters / 2.1.3:
Event Notification Service / 2.1.4:
Models of Interaction / 2.2:
Request/Reply / 2.2.1:
Anonymous Request/Reply / 2.2.2:
Callback / 2.2.3:
Event-Based / 2.2.4:
Comparison / 2.2.5:
Interaction vs. Implementation / 2.2.6:
Notification Filtering Mechanisms / 2.3:
Channels / 2.3.1:
Subject-Based Filtering / 2.3.2:
Type-Based Filtering / 2.3.3:
Content-Based Filtering / 2.3.4:
A Model Distributed Notification Service / 2.4:
System Model / 2.4.1:
Architecture / 2.4.2:
Distributed Notification Routing / 2.4.3:
Specification of Event Systems / 2.5:
Formal Background / 2.5.1:
A Simple Event System / 2.5.2:
A Simple Event System With Ordering Requirements / 2.5.3:
Simple Event System With Advertisements / 2.5.4:
Further Reading / 2.6:
Content-Based Models and Matching / 3:
Content-Based Data and Filter Models / 3.1:
Tuples / 3.1.1:
Structured Records / 3.1.2:
Semistructured Records / 3.1.3:
Objects / 3.1.4:
Matching Algorithms / 3.2:
Brute Force / 3.2.1:
Counting Algorithm / 3.2.2:
Decision Trees / 3.2.3:
Binary Decision Diagrams / 3.2.4:
Efficient XML Matching / 3.2.5:
Routing Algorithm Framework / 3.3:
Atomic Steps of the Implementation / 4.2.1:
Notification Forwarding and Delivery / 4.2.2:
Avoidance of Duplicate and Spurious Notifications / 4.2.3:
Routing Table Updates / 4.2.4:
Valid and Monotone Valid Routing Algorithms / 4.3:
Valid Routing Algorithms / 4.3.1:
Monotone Valid Routing Algorithms / 4.3.2:
Valid Framework Instantiations / 4.4:
Content-Based Routing Algorithms / 4.5:
Flooding / 4.5.1:
Simple Routing / 4.5.2:
Identity-Based Routing / 4.5.3:
Covering-Based Routing / 4.5.4:
Merging-Based Routing / 4.5.5:
Discussion / 4.5.6:
Extensions of the Basic Routing Framework / 4.6:
Routing With Advertisements / 4.6.1:
Hierarchical Routing Algorithms / 4.6.2:
Rendezvous-Based Routing / 4.6.3:
Topology Changes / 4.6.4:
Joining and Leaving Clients / 4.6.5:
Routing in Cyclic Topologies / 4.6.6:
Exploiting IP Multicast / 4.6.7:
Topology Maintenance / 4.6.8:
Engineering of Event-Based Systems / 4.7:
Engineering Requirements / 5.1:
Application Examples / 5.1.1:
Requirements / 5.1.2:
Existing Support / 5.1.3:
Accessing Publish/Subscribe Functionality / 5.2:
Generic APIs / 5.2.1:
Domain-Specific APIs / 5.2.2:
Using the API / 5.3:
Patterns and Idioms / 5.3.1:
Emitting Notifications / 5.3.2:
Scoping / 5.4:
Controlling Cooperation / 6.1:
Implicit Coordination and Visibility / 6.1.1:
Explicit Control of Visibility / 6.1.2:
The Role of Administrators / 6.1.3:
Event-Based Systems With Scopes / 6.2:
Visibility and Scopes / 6.2.1:
Specification / 6.2.2:
Notification Dissemination / 6.2.3:
Duplicate Notifications / 6.2.4:
Dynamic Scopes / 6.2.5:
Attributes and Abstract Scopes / 6.2.6:
A Correct Implementation / 6.2.7:
Event-Based Components / 6.3:
Component Interfaces / 6.3.1:
Scope Interfaces / 6.3.2:
Example / 6.3.3:
Notification Mappings / 6.4:
Transmission Policies / 6.4.1:
Publishing Policy / 6.5.1:
Delivery Policy / 6.5.2:
Traverse Policy / 6.5.3:
Influencing Notification Dissemination / 6.5.4:
Engineering With Scopes / 6.6:
Development Process / 6.6.1:
Scope Graph Handling / 6.6.2:
Scope Graph Language / 6.6.3:
Implementation Strategies for Scoping / 6.7:
Scope Architectures / 6.7.1:
Comparing Architectures / 6.7.2:
Implement Scopes as Event Brokers / 6.7.3:
Integrate Scoping and Routing / 6.7.4:
Combining Different Implementations / 6.8:
Architectures and Scope Graphs / 6.8.1:
Bridging Architectures / 6.8.2:
Integration With Other Notification Services / 6.8.3:
Composite Events / 6.9:
Composite Event Detection / 7.1:
Composite Event Detectors / 7.4.1:
Composite Event Language / 7.4.2:
Detection Architectures / 7.5:
Centralized Detection / 7.5.1:
Distributed Detection / 7.5.2:
Advanced Topics / 7.6:
Security / 8.1:
Access Control Techniques / 8.1.1:
Secure Publish/Subscribe Model / 8.1.4:
Fault Tolerance / 8.1.5:
Fault Masking / 8.2.1:
Self-Stabilizing Publish/Subscribe Systems / 8.2.2:
Self-Stabilizing Content-Based Routing / 8.2.3:
Generic Self-Stabilization Through Periodic Rebuild / 8.2.4:
Congestion Control / 8.2.5:
The Congestion Problem / 8.3.1:
Congestion Control Algorithms / 8.3.2:
Mobility / 8.3.4:
Mobility Issues in Publish/Subscribe Middleware / 8.4.1:
Physical Mobility / 8.4.2:
Logical Mobility / 8.4.3:
Existing Notification Services / 8.4.4:
Standards / 9.1:
Corba Event and Notification Service / 9.1.1:
Jini / 9.1.2:
Java Message Service (JMS) / 9.1.3:
Data Distribution for Real-Time Systems (DDS) / 9.1.4:
WS Eventing and WS Notification / 9.1.5:
The High-Level Architecture (HLA) / 9.1.6:
Commercial Systems / 9.2:
IBM WebSphere MQ / 9.2.1:
TIBCO Rendezvous / 9.2.2:
Oracle Streams Advanced Queuing / 9.2.3:
Research Prototypes / 9.3:
Gryphon / 9.3.1:
Siena / 9.3.2:
JEDI / 9.3.3:
Rebeca / 9.3.4:
Hermes / 9.3.5:
Cambridge Event Architecture (CEA) / 9.3.6:
Elvin / 9.3.7:
READY / 9.3.8:
Narada Brokering / 9.3.9:
Outlook / 10:
References
Index
Introduction / 1:
Networked Computing / 1.1:
Middleware / 1.2:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼