close
1.

図書

図書
Maxim Ryadnov
出版情報: Cambridge : RSC Publishing, c2009  ix, 238 p. ; 24 cm
シリーズ名: RSC nanoscience & nanotechnology ; no.7
所蔵情報: loading…
目次情報: 続きを見る
Introductory Notes / Chapter 1:
Inspiring Hierarchical / 1.1:
Encoding Instructive / 1.2:
Starting Lowest / 1.3:
Picturing Biological / 1.4:
References
Recycling Hereditary / Chapter 2:
Coding Dual / 2.1:
Deoxyribonucleic / 2.1.1:
Building up in Two / 2.1.1.1:
Keeping in Shape / 2.1.1.2:
Priming Topological / 2.1.2:
Resequencing Basic / 2.1.2.1:
Choosing the Fittest / 2.1.2.1.1:
Evolving Diverse / 2.1.2.1.2:
Primary Motifs / 2.1.2.2:
Gluing Universal / 2.1.2.2.1:
Alienating Axial / 2.1.2.2.2:
Fixing Spatial / 2.2:
Hinting Geometric: Secondary Motifs / 2.2.1:
Crossing Double / 2.2.1.1:
Reporting Visible / 2.2.1.1.1:
Translating Symmetrical / 2.2.1.1.2:
Extending Cohesive / 2.2.1.2:
Sharing Mutual / 2.2.1.2.1:
Multiplying Traversal / 2.2.1.2.2:
Tiling Square / 2.2.1.2.3:
Scaffolding Algorithmic / 2.3:
Pursuing Autonomous / 2.3.1:
Lengthening to Shorten / 2.3.1.1:
Gathering to Limit / 2.3.1.2:
Assigning Arbitrary / 2.3.2:
Synchronising Local / 2.3.2.1:
Prescribing General / 2.3.2.2:
Adding up to Third / 2.3.3:
Wrapping to Shut / 2.3.3.1:
Framing to Classify / 2.3.3.2:
Outlook / 2.4:
Recaging Within / Chapter 3:
Enclosing to Deliver / 3.1:
Transporting Foreign / 3.1.1:
Fitting Flat and Straight / 3.1.1.1:
Spiralling Along / 3.1.1.2:
Packing Out and In / 3.1.2:
Spooling Around / 3.1.2.1:
Tunnelling Through
Escaping Walled / 3.1.3:
Capturing On and Off / 3.1.3.1:
Storing Exchangeable / 3.1.3.2:
Reacting Nano / 3.2:
Clustering Spherical / 3.2.1:
Contriving Consistent / 3.2.1.1:
Scaling Hosting / 3.2.1.2:
Following Linear / 3.2.2:
Channelling Inner
Converting Outer
Repairing from Inside / 3.3:
Uninviting Levy / 3.3.1:
Necessitating Exterior / 3.3.2:
Antagonising Dressing / 3.3.2.1:
Renting Occasional / 3.3.2.1.2:
Phasing West / 3.3.2.2:
Facing Concentric / 3.3.2.2.1:
Encircling Between / 3.3.2.2.2:
Singling Out Unique / 3.3.2.2.3:
Sharing the Balance / 3.3.3:
Driving Symmetrical / 3.3.3.1:
Sealing Annular / 3.3.3.2:
Reassembling Multiple / 3.4:
Keeping All in Touch / 4.1:
Unravelling the Essential / 4.1.1:
Winding Three in One / 4.1.1.1:
Aligning Stagger / 4.1.1.2:
Tapering Polar / 4.1.1.3:
Branching and Stretching / 4.1.1.4:
Replicating Apparent / 4.1.2:
Scraping Refusal / 4.1.2.1:
Tempting Compatible / 4.1.2.2:
Likening Synthetic / 4.1.2.3:
Recovering Intelligent / 4.1.2.4:
Restoring Available / 4.2:
Prompting Longitudinal / 4.2.1:
Invoking Granted / 4.2.1.1:
Reposing Modular / 4.3:
Displacing Coil / 4.3.1:
Settling Lateral / 4.3.2:
Bundling Exclusive / 4.3.2.1:
Permitting Distinctive / 4.3.2.2:
Inviting Captive / 4.3.2.3:
Clearing Limiting / 4.3.3:
Equilibrating Transitional / 4.3.3.1:
Extracting Minimal / 4.3.3.2:
Gambling Beyond / 4.4:
Guiding Proliferative / 4.4.1:
Feeding Proximate / 4.4.1.1:
Rooting Renewal / 4.4.1.2:
Accepting Inescapable / 4.4.2:
Patterning Positional / 4.4.2.1:
Relating Interfacial / 4.4.2.2:
Grafting Integral / 4.4.2.3:
Concluding Remarks / 4.5:
Learning Fluent / 5.1:
Parsing Semantic / 5.2:
Drawing Pragmatic / 5.3:
Revealing Contributory / Chapter 6:
Subject Index
Introductory Notes / Chapter 1:
Inspiring Hierarchical / 1.1:
Encoding Instructive / 1.2:
2.

図書

図書
Karl Pfleger, Hans H. Maurer, Armin Weber
出版情報: Weinheim : Wiley-VCH, c2007  2 v. ; 29 cm
所蔵情報: loading…
目次情報: 続きを見る
(Methods, Tables) / Volume 1:
Methods
Introduction / 1:
Experimental Section / 2:
Origin and choice of samples / 2.1:
Sample preparation / 2.2:
Standard extraction procedures / 2.2.1:
Standard liquid-liquid extraction (LLE) for plasma, urine or gastric contents (P, U, G) / 2.2.1.1:
STA procedure (hydrolysis, extraction and microwave-assisted acetylation) for urine (U+UHYAC) / 2.2.1.2:
Extraction of urine after cleavage of conjugates by glucuronidase and arylsulfatase (UGLUC) / 2.2.1.3:
Extractive methylation procedure for urine or plasma (UME, PME) / 2.2.1.4:
Solid-phase extraction for plasma or urine (PSPE, USPE) / 2.2.1.5:
LLE of plasma for determination of drugs for brain death diagnosis / 2.2.1.6:
Extraction of ethylene glycol and other glycols from plasma or urine followed by microwave-assisted pivalylation (PEGPIV or UEGPIV) / 2.2.1.7:
Derivatization procedures / 2.2.2:
Acetylation (AC) / 2.2.2.1:
Methylation (ME) / 2.2.2.2:
Ethylation (ET) / 2.2.2.3:
tert.-Butyldimethylsilylation (TBDMS) / 2.2.2.4:
Trimethylsilylation (TMS) / 2.2.2.5:
Trimethylsilylation followed by trifluoroacetylation (TMSTFA) / 2.2.2.6:
Trifluoroacetylation (TFA) / 2.2.2.7:
Pentafluoropropionylation (PFP) / 2.2.2.8:
Pentafluoropropylation (PFPOL) / 2.2.2.9:
Heptafluorobutyrylation (HFB) / 2.2.2.10:
Pivalylation (PIV) / 2.2.2.11:
Heptafluorobutyrylprolylation (HFBP) / 2.2.2.12:
GC-MS Apparatus / 2.3:
Apparatus and operation conditions / 2.3.1:
Quality assurance of the apparatus performance / 2.3.2:
Determination of retention indices / 2.4:
Systematic toxicological analysis (STA) of several classes of drugs and their metabolites by GC-MS / 2.5:
Screening for 200 drugs in blood plasma after LLE / 2.5.1:
Screening for most of the basic and neutral drugs in urine after acid hydrolysis, LLE and acetylation / 2.5.2:
Systematic toxicological analysis procedures for the detection of acidic drugs and/or their metabolites / 2.5.3:
General screening procedure for zwitterionic compounds after SPE and silylation / 2.5.4:
Application of the electronic version of this handbook / 2.6:
Quantitative determination / 2.7:
Correlation between Structure and Fragmentation / 3:
Principle of electron-ionization mass spectrometry (EI-MS) / 3.1:
Correlation between fundamental structures or side chains and fragment ions / 3.2:
Formation of Artifacts / 4:
Artifacts formed by oxidation during extraction with diethyl ether / 4.1:
N-Oxidation of tertiary amines / 4.1.1:
S-Oxidation of phenothiazines / 4.1.2:
Artifacts formed by thermolysis during GC (GC artifact) / 4.2:
Decarboxylation of carboxylic acids / 4.2.1:
Cope elimination of N-oxides (-(CH3)2NOH, -(C2H5)2NOH, -C6H14N2O2) / 4.2.2:
Rearrangement of bis-deethyl flurazepam (-H2O) / 4.2.3:
Elimination of various residues / 4.2.4:
Methylation of carboxylic acids in methanol ((ME), ME in methanol) / 4.2.5:
Formation of formaldehyde adducts using methanol as solvent (GC artifact in methanol) / 4.2.6:
Artifacts formed by thermolysis during GC and during acid hydrolysis (GC artifact, HY artifact) / 4.3:
Dehydration of alcohols (-H2O) / 4.3.1:
Decarbamoylation of carbamates / 4.3.2:
Cleavage of morazone to phenmetrazine / 4.3.3:
Artifacts formed during acid hydrolysis / 4.4:
Cleavage of the ether bridge in beta-blockers and alkanolamine antihistamines (HY) / 4.4.1:
Cleavage of 1,4-benzodiazepines to aminobenzoyl derivatives (HY) / 4.4.2:
Cleavage and rearrangement of N-demethyl metabolites of clobazam to benzimidazole derivatives (HY) / 4.4.3:
Cleavage and rearrangement of bis-deethyl flurazepam (HY -H2O) / 4.4.4:
Cleavage and rearrangement of tetrazepam / 4.4.5:
(Methods, Tables) / Volume 1:
Methods
Introduction / 1:
3.

図書

図書
authors, G. Guelachvili, K.Narahari Rao ; editor, G. Guelachvili
出版情報: Berlin ; Tokyo : Springer, c2000  LXXVII, 229 p. ; 28 cm
シリーズ名: Landolt-Börnstein Zahlenwerte und Funktionen aus Naturwissenschaften und Technik, Neue Serie / Gesamtherausgabe, K.-H. Hellwege ; New Series, Group 2 . Molecules and radicals ; v. 20 . Molecular constans : mostly from infrared spectroscopy ; subv. B5
所蔵情報: loading…
目次情報: 続きを見る
CS2 (SCS).
CS2+ (SCS+).
CS2++ (SCS++).
CSe2 (SeCSe).
C2N (CCN).
C2N (CNC).
C2N+ (CCN+).
C2N+ (CNC+).
CS2 (SCS).
CS2+ (SCS+).
CS2++ (SCS++).
4.

図書

図書
Corneliu Constantinescu
出版情報: Amsterdam : Elsevier, 2001  xxi, 597 p. ; 23 cm
シリーズ名: North-Holland mathematical library ; v. 59 . C*-algebras / Corneliu Constantinescu ; v. 2
所蔵情報: loading…
目次情報: 続きを見る
Introduction
Banach Algebras / 2:
Algebras / 2.1:
General Results / 2.1.1:
Invertible Elements / 2.1.2:
The Spectrum / 2.1.3:
Standard Examples / 2.1.4:
Complexification of Algebras / 2.1.5:
Exercises
Normed Algebras / 2.2:
The Standard Examples / 2.2.1:
The Exponential Function and the Neumann Series / 2.2.3:
Invertible Elements of Unital Banach Algebras / 2.2.4:
The Theorems of Riesz and Gelfand / 2.2.5:
Poles of Resolvents / 2.2.6:
Modules / 2.2.7:
Involutive Banach Algebras / 2.3:
Involutive Algebras / 2.3.1:
Sesquilinear Forms / 2.3.2:
Positive Linear Forms / 2.3.4:
The State Space / 2.3.5:
Involutive Modules / 2.3.6:
Gelfand Algebras / 2.4:
The Gelfand Transform / 2.4.1:
Involutive Gelfand Algebras / 2.4.2:
Examples / 2.4.3:
Locally Compact Additive Groups / 2.4.4:
The Fourier Transform / 2.4.5:
Compact Operators / 3:
The General Theory / 3.1:
Fredholm Operators / 3.1.1:
Point Spectrum / 3.1.4:
Spectrum of a Compact Operator / 3.1.5:
Integral Operators / 3.1.6:
Linear Differential Equations / 3.2:
Boundary Value Problems for Differential Equations / 3.2.1:
Supplementary Results / 3.2.2:
Linear Partial Differential Equations / 3.2.3:
Name
Index Subject
Index Symbol
Index
Introduction
Banach Algebras / 2:
Algebras / 2.1:
5.

電子ブック

EB
Kim-Kwang Raymond Choo
出版情報: Springer eBooks Computer Science , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
Computer Security Approach / 1.2.1:
Computational Complexity Approach / 1.2.2:
Research Objectives and Deliverables / 1.2.3:
Structure of Book and Contributions to Knowledge / 1.3:
References
Background Materials / 2:
Mathematical Background / 2.1:
Abstract Algebra and the Main Groups / 2.1.1:
Bilinear Maps from Elliptic Curve Pairings / 2.1.2:
Computational Problems and Assumptions / 2.1.3:
Cryptographic Tools / 2.1.4:
Encryption Schemes: Asymmetric Setting / 2.1.4.1:
Encryption Schemes: Symmetric Setting / 2.1.4.2:
Digital Signature Schemes / 2.1.4.3:
Message Authentication Codes / 2.1.4.4:
Cryptographic Hash Functions / 2.1.4.5:
Random Oracles / 2.1.4.6:
Key Establishment Protocols and their Basis / 2.2:
Protocol Architectures / 2.2.1:
Existing Cryptographic Keys / 2.2.1.1:
Method of Session Key Generation / 2.2.1.2:
Number of Entities / 2.2.1.3:
Protocol Goals and Attacks / 2.2.2:
Protocol Goals / 2.2.2.1:
Additional Security Attributes / 2.2.2.2:
Types of Attacks / 2.2.2.3:
A Need for Rigorous Treatment / 2.2.2.4:
The Computational Complexity Approach / 2.3:
Adversarial Powers / 2.3.1:
Definition of Freshness / 2.3.2:
Definition of Security / 2.3.3:
The Bellare-Rogaway Models / 2.3.4:
The BR93 Model / 2.3.4.1:
The BR95 Model / 2.3.4.2:
The BPR2000 Model / 2.3.4.3:
The Canetti-Krawczyk Model / 2.3.5:
Protocol Security / 2.3.6:
Summary / 2.4:
A Flawed BR95 Partnership Function / 3:
A Flaw in the Security Proof for 3PKD Protocol / 3.1:
The 3PKD Protocol / 3.1.1:
Key Replicating Attack on 3PKD Protocol / 3.1.2:
The Partner Function used in the BR95 Proof / 3.1.3:
A Revised 3PKD Protocol in Bellare-Rogaway Model / 3.2:
Defining SIDs in the 3PKD Protocol / 3.2.1:
An Improved Provably Secure 3PKD Protocol / 3.2.2:
Security Proof for the Improved 3PKD Protocol / 3.2.3:
Adaptive MAC Forger F / 3.2.3.1:
Multiple Eavesdropper Attacker ME / 3.2.3.2:
Conclusion of Proof / 3.2.3.3:
On The Key Sharing Requirement / 3.3:
Bellare-Rogaway 3PKD Protocol in CK2001 Model / 4.1:
New Attack on 3PKD Protocol / 4.1.1:
A New Provably-Secure 3PKD Protocol in CK2001 Model / 4.1.3:
Jeong-Katz-Lee Protocol JP2 / 4.2:
Protocol JP2 / 4.2.1:
New Attack on Protocol JP2 / 4.2.2:
An Improved Protocol JP2 / 4.2.3:
The Key Sharing Requirement / 4.3:
Comparison of Bellare-Rogaway and Canetti-Krawczyk Models / 4.4:
Relating The Notions of Security / 5.1:
Proving BR93 (EA+KE) to BPR2000 (EA+KE) / 5.1.1:
Proof for the key establishment goal / 5.1.1.1:
Proof for the entity authentication goal / 5.1.1.2:
Proving CK2001 to BPR2000 (KE) / 5.1.2:
Proving CK2001 to BR93 (KE) / 5.1.3:
BR93 (KE) to BR95 and BR93 (KE), CK2001 [not left arrow] BR95 / 5.1.4:
BR93 (KE)/CK2001 [not left arrow] BPR2000 (KE) / 5.1.5:
CK2001 [not left arrow] BR93 (EA+KE) / 5.1.6:
BR93 (KE) [not left arrow] CK2001 / 5.1.7:
BPR200 (KE) [not left arrow] BR95 / 5.1.8:
A Drawback in the BPR2000 Model / 5.2:
Case Study: Abdalla-Pointcheval 3PAKE / 5.2.1:
Unknown Key Share Attack on 3PAKE / 5.2.2:
An Extension to the Bellare-Rogaway Model / 5.3:
A Provably-Secure Revised Protocol of Boyd / 6.1:
Secure Authenticated Encryption Schemes / 6.1.1:
Revised Protocol of Boyd / 6.1.2:
Security Proof / 6.1.3:
Integrity attacker / 6.1.3.1:
Confidentiality attacker / 6.1.3.2:
Conclusion of Security Proof / 6.1.3.3:
An Extension to the BR93 Model / 6.2:
An Efficient Protocol in Extended Model / 6.3:
An Efficient Protocol / 6.3.1:
Integrity Breaker / 6.3.2:
Confidentiality Breaker / 6.3.2.2:
Comparative Security and Efficiency / 6.3.2.3:
A Proof of Revised Yahalom Protocol / 6.5:
The Yahalom Protocol and its Simplified Version / 7.1:
A New Provably-Secure Protocol / 7.2:
Proof for Protocol 7.2 / 7.2.1:
Conclusion of Proof for Theorem 7.2.1 / 7.2.1.1:
An Extension to Protocol 7.2 / 7.2.2:
Partnering Mechanism: A Brief Discussion / 7.3:
Errors in Computational Complexity Proofs for Protocols / 7.4:
Boyd-Gonzalez Nieto Protocol / 8.1:
Unknown Key Share Attack on Protocol / 8.1.1:
An Improved Conference Key Agreement Protocol / 8.1.2:
Limitations of Existing Proof / 8.1.3:
Jakobsson-Pointcheval MAKEP / 8.2:
Unknown Key Share Attack on JP-MAKEP / 8.2.1:
Flaws in Existing Security Proof for JP-MAKEP / 8.2.2:
Wong-Chan MAKEP / 8.3:
A New Attack on WC-MAKEP / 8.3.1:
Preventing the Attack / 8.3.2:
Flaws in Existing Security Proof for WC-MAKEP / 8.3.3:
An MT-Authenticator / 8.4:
Encryption-Based MT-Authenticator / 8.4.1:
Flaw in Existing Security Proof Revealed / 8.4.2:
Addressing the Flaw / 8.4.3:
An Example Protocol as a Case Study / 8.4.4:
On Session Key Construction / 8.5:
Chen-Kudla ID-Based Protocol / 9.1:
The ID-Based Protocol / 9.1.1:
Existing Arguments on Restriction of Reveal Query / 9.1.2:
Improved Chen-Kudla Protocol / 9.1.3:
Security Proof for Improved Chen-Kudla Protocol / 9.1.4:
McCullagh-Barreto 2P-IDAKA Protocol / 9.2:
The 2P-IDAKA Protocol / 9.2.1:
Why Reveal Query is Restricted / 9.2.2:
Errors in Existing Proof for 2P-IDAKA Protocol / 9.2.3:
Error 1 / 9.2.3.1:
Error 2 / 9.2.3.2:
Improved 2P-IDAKA Protocol / 9.2.4:
A Proposal for Session Key Construction / 9.3:
Another Case Study / 9.4:
Reflection Attack on Lee-Kim-Yoo Protocol / 9.4.1:
Complementing Computational Protocol Analysis / 9.4.2:
The Formal Framework / 10.1:
Analysing a Provably-Secure Protocol / 10.2:
Protocol Specification / 10.2.1:
Initial State of Protocol 10.1 / 10.2.1.1:
Step 1 of Protocol 10.1 / 10.2.1.2:
A Malicious State Transition / 10.2.1.3:
Protocol Analysis / 10.2.2:
Hijacking Attack / 10.2.2.1:
New Attack 1 / 10.2.2.2:
New Attack 2 / 10.2.2.3:
Analysing Another Two Protocols With Claimed Proofs of Security / 10.3:
Analysis of Protocol 10.2 / 10.3.1:
Analysis of Protocol 10.3 / 10.3.1.2:
Flaws in Refuted Proofs / 10.3.2:
A Possible Fix / 10.3.3:
Analysing Protocols with Heuristic Security Arguments / 10.4:
Case Studies / 10.4.1:
Jan-Chen Mutual Protocol / 10.4.1.1:
Yang-Shen-Shieh Protocol / 10.4.1.2:
Kim-Huh-Hwang-Lee Protocol / 10.4.1.3:
Lin-Sun-Hwang Key Protocols MDHEKE I and II / 10.4.1.4:
Yeh-Sun Key Protocol / 10.4.1.5:
Protocol Analyses / 10.4.2:
Protocol Analysis 1 / 10.4.2.1:
Protocol Analysis 2 / 10.4.2.2:
Protocol Analysis 3 / 10.4.2.3:
Protocol Analysis 4 / 10.4.2.4:
Protocol Analysis 5 / 10.4.2.5:
Protocol Analysis 6 / 10.4.2.6:
Protocol Analysis 7 / 10.4.2.7:
An Integrative Framework to Protocol Analysis and Repair / 10.5:
Case Study Protocol / 11.1:
Proposed Integrative Framework / 11.2:
Protocols Specification / 11.2.1:
Defining SIDs in Protocol 11.1 / 11.2.1.1:
Description of Goal State / 11.2.1.2:
Description of Possible Actions / 11.2.1.3:
Protocols Analysis / 11.2.2:
Protocol Repair / 11.2.3:
Conclusion and Future Work / 11.3:
Research Summary / 12.1:
Open Problems and Future Directions / 12.2:
Index
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
6.

電子ブック

EB
Kim-Kwang Raymond Choo
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
Computer Security Approach / 1.2.1:
Computational Complexity Approach / 1.2.2:
Research Objectives and Deliverables / 1.2.3:
Structure of Book and Contributions to Knowledge / 1.3:
References
Background Materials / 2:
Mathematical Background / 2.1:
Abstract Algebra and the Main Groups / 2.1.1:
Bilinear Maps from Elliptic Curve Pairings / 2.1.2:
Computational Problems and Assumptions / 2.1.3:
Cryptographic Tools / 2.1.4:
Encryption Schemes: Asymmetric Setting / 2.1.4.1:
Encryption Schemes: Symmetric Setting / 2.1.4.2:
Digital Signature Schemes / 2.1.4.3:
Message Authentication Codes / 2.1.4.4:
Cryptographic Hash Functions / 2.1.4.5:
Random Oracles / 2.1.4.6:
Key Establishment Protocols and their Basis / 2.2:
Protocol Architectures / 2.2.1:
Existing Cryptographic Keys / 2.2.1.1:
Method of Session Key Generation / 2.2.1.2:
Number of Entities / 2.2.1.3:
Protocol Goals and Attacks / 2.2.2:
Protocol Goals / 2.2.2.1:
Additional Security Attributes / 2.2.2.2:
Types of Attacks / 2.2.2.3:
A Need for Rigorous Treatment / 2.2.2.4:
The Computational Complexity Approach / 2.3:
Adversarial Powers / 2.3.1:
Definition of Freshness / 2.3.2:
Definition of Security / 2.3.3:
The Bellare-Rogaway Models / 2.3.4:
The BR93 Model / 2.3.4.1:
The BR95 Model / 2.3.4.2:
The BPR2000 Model / 2.3.4.3:
The Canetti-Krawczyk Model / 2.3.5:
Protocol Security / 2.3.6:
Summary / 2.4:
A Flawed BR95 Partnership Function / 3:
A Flaw in the Security Proof for 3PKD Protocol / 3.1:
The 3PKD Protocol / 3.1.1:
Key Replicating Attack on 3PKD Protocol / 3.1.2:
The Partner Function used in the BR95 Proof / 3.1.3:
A Revised 3PKD Protocol in Bellare-Rogaway Model / 3.2:
Defining SIDs in the 3PKD Protocol / 3.2.1:
An Improved Provably Secure 3PKD Protocol / 3.2.2:
Security Proof for the Improved 3PKD Protocol / 3.2.3:
Adaptive MAC Forger F / 3.2.3.1:
Multiple Eavesdropper Attacker ME / 3.2.3.2:
Conclusion of Proof / 3.2.3.3:
On The Key Sharing Requirement / 3.3:
Bellare-Rogaway 3PKD Protocol in CK2001 Model / 4.1:
New Attack on 3PKD Protocol / 4.1.1:
A New Provably-Secure 3PKD Protocol in CK2001 Model / 4.1.3:
Jeong-Katz-Lee Protocol JP2 / 4.2:
Protocol JP2 / 4.2.1:
New Attack on Protocol JP2 / 4.2.2:
An Improved Protocol JP2 / 4.2.3:
The Key Sharing Requirement / 4.3:
Comparison of Bellare-Rogaway and Canetti-Krawczyk Models / 4.4:
Relating The Notions of Security / 5.1:
Proving BR93 (EA+KE) to BPR2000 (EA+KE) / 5.1.1:
Proof for the key establishment goal / 5.1.1.1:
Proof for the entity authentication goal / 5.1.1.2:
Proving CK2001 to BPR2000 (KE) / 5.1.2:
Proving CK2001 to BR93 (KE) / 5.1.3:
BR93 (KE) to BR95 and BR93 (KE), CK2001 [not left arrow] BR95 / 5.1.4:
BR93 (KE)/CK2001 [not left arrow] BPR2000 (KE) / 5.1.5:
CK2001 [not left arrow] BR93 (EA+KE) / 5.1.6:
BR93 (KE) [not left arrow] CK2001 / 5.1.7:
BPR200 (KE) [not left arrow] BR95 / 5.1.8:
A Drawback in the BPR2000 Model / 5.2:
Case Study: Abdalla-Pointcheval 3PAKE / 5.2.1:
Unknown Key Share Attack on 3PAKE / 5.2.2:
An Extension to the Bellare-Rogaway Model / 5.3:
A Provably-Secure Revised Protocol of Boyd / 6.1:
Secure Authenticated Encryption Schemes / 6.1.1:
Revised Protocol of Boyd / 6.1.2:
Security Proof / 6.1.3:
Integrity attacker / 6.1.3.1:
Confidentiality attacker / 6.1.3.2:
Conclusion of Security Proof / 6.1.3.3:
An Extension to the BR93 Model / 6.2:
An Efficient Protocol in Extended Model / 6.3:
An Efficient Protocol / 6.3.1:
Integrity Breaker / 6.3.2:
Confidentiality Breaker / 6.3.2.2:
Comparative Security and Efficiency / 6.3.2.3:
A Proof of Revised Yahalom Protocol / 6.5:
The Yahalom Protocol and its Simplified Version / 7.1:
A New Provably-Secure Protocol / 7.2:
Proof for Protocol 7.2 / 7.2.1:
Conclusion of Proof for Theorem 7.2.1 / 7.2.1.1:
An Extension to Protocol 7.2 / 7.2.2:
Partnering Mechanism: A Brief Discussion / 7.3:
Errors in Computational Complexity Proofs for Protocols / 7.4:
Boyd-Gonzalez Nieto Protocol / 8.1:
Unknown Key Share Attack on Protocol / 8.1.1:
An Improved Conference Key Agreement Protocol / 8.1.2:
Limitations of Existing Proof / 8.1.3:
Jakobsson-Pointcheval MAKEP / 8.2:
Unknown Key Share Attack on JP-MAKEP / 8.2.1:
Flaws in Existing Security Proof for JP-MAKEP / 8.2.2:
Wong-Chan MAKEP / 8.3:
A New Attack on WC-MAKEP / 8.3.1:
Preventing the Attack / 8.3.2:
Flaws in Existing Security Proof for WC-MAKEP / 8.3.3:
An MT-Authenticator / 8.4:
Encryption-Based MT-Authenticator / 8.4.1:
Flaw in Existing Security Proof Revealed / 8.4.2:
Addressing the Flaw / 8.4.3:
An Example Protocol as a Case Study / 8.4.4:
On Session Key Construction / 8.5:
Chen-Kudla ID-Based Protocol / 9.1:
The ID-Based Protocol / 9.1.1:
Existing Arguments on Restriction of Reveal Query / 9.1.2:
Improved Chen-Kudla Protocol / 9.1.3:
Security Proof for Improved Chen-Kudla Protocol / 9.1.4:
McCullagh-Barreto 2P-IDAKA Protocol / 9.2:
The 2P-IDAKA Protocol / 9.2.1:
Why Reveal Query is Restricted / 9.2.2:
Errors in Existing Proof for 2P-IDAKA Protocol / 9.2.3:
Error 1 / 9.2.3.1:
Error 2 / 9.2.3.2:
Improved 2P-IDAKA Protocol / 9.2.4:
A Proposal for Session Key Construction / 9.3:
Another Case Study / 9.4:
Reflection Attack on Lee-Kim-Yoo Protocol / 9.4.1:
Complementing Computational Protocol Analysis / 9.4.2:
The Formal Framework / 10.1:
Analysing a Provably-Secure Protocol / 10.2:
Protocol Specification / 10.2.1:
Initial State of Protocol 10.1 / 10.2.1.1:
Step 1 of Protocol 10.1 / 10.2.1.2:
A Malicious State Transition / 10.2.1.3:
Protocol Analysis / 10.2.2:
Hijacking Attack / 10.2.2.1:
New Attack 1 / 10.2.2.2:
New Attack 2 / 10.2.2.3:
Analysing Another Two Protocols With Claimed Proofs of Security / 10.3:
Analysis of Protocol 10.2 / 10.3.1:
Analysis of Protocol 10.3 / 10.3.1.2:
Flaws in Refuted Proofs / 10.3.2:
A Possible Fix / 10.3.3:
Analysing Protocols with Heuristic Security Arguments / 10.4:
Case Studies / 10.4.1:
Jan-Chen Mutual Protocol / 10.4.1.1:
Yang-Shen-Shieh Protocol / 10.4.1.2:
Kim-Huh-Hwang-Lee Protocol / 10.4.1.3:
Lin-Sun-Hwang Key Protocols MDHEKE I and II / 10.4.1.4:
Yeh-Sun Key Protocol / 10.4.1.5:
Protocol Analyses / 10.4.2:
Protocol Analysis 1 / 10.4.2.1:
Protocol Analysis 2 / 10.4.2.2:
Protocol Analysis 3 / 10.4.2.3:
Protocol Analysis 4 / 10.4.2.4:
Protocol Analysis 5 / 10.4.2.5:
Protocol Analysis 6 / 10.4.2.6:
Protocol Analysis 7 / 10.4.2.7:
An Integrative Framework to Protocol Analysis and Repair / 10.5:
Case Study Protocol / 11.1:
Proposed Integrative Framework / 11.2:
Protocols Specification / 11.2.1:
Defining SIDs in Protocol 11.1 / 11.2.1.1:
Description of Goal State / 11.2.1.2:
Description of Possible Actions / 11.2.1.3:
Protocols Analysis / 11.2.2:
Protocol Repair / 11.2.3:
Conclusion and Future Work / 11.3:
Research Summary / 12.1:
Open Problems and Future Directions / 12.2:
Index
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
7.

電子ブック

EB
Isao Noda, Yukihiro Ozaki, Y Ozaki
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2004
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Introduction / 1:
Two-dimensional Spectroscopy / 1.1:
Overview of the Field / 1.2:
Generalized Two-dimensional Correlation / 1.3:
Types of Spectroscopic Probes / 1.3.1:
External Perturbations / 1.3.2:
Heterospectral Correlation / 1.4:
Universal Applicability / 1.5:
Principle of Two-dimensional Correlation Spectroscopy / 2:
Two-dimensional Correlation Spectroscopy / 2.1:
General Scheme / 2.1.1:
Type of External Perturbations / 2.1.2:
Dynamic Spectrum / 2.2:
Two-dimensional Correlation Concept / 2.2.2:
Generalized Two-dimensional Correlation Function / 2.2.3:
Properties of 2D Correlation Spectra / 2.2.4:
Synchronous 2D Correlation Spectrum / 2.3.1:
Asynchronous 2D Correlation Spectrum / 2.3.2:
Special Cases and Exceptions / 2.3.3:
Analytical Expressions for Certain 2D Spectra / 2.4:
Comparison of Linear Functions / 2.4.1:
2D Spectra Based on Sinusoidal Signals / 2.4.2:
Exponentially Decaying Intensities / 2.4.3:
Distributed Lorentzian Peaks / 2.4.4:
Signals with more Complex Waveforms / 2.4.5:
Cross-correlation Analysis and 2D Spectroscopy / 2.5:
Cross-correlation Function and Cross Spectrum / 2.5.1:
Cross-correlation Function and Synchronous Spectrum / 2.5.2:
Hilbert Transform / 2.5.3:
Orthogonal Correlation Function and Asynchronous Spectrum / 2.5.4:
Disrelation Spectrum / 2.5.5:
Practical Computation of Two-dimensional Correlation Spectra / 3:
Computation of 2D Spectra from Discrete Data / 3.1:
Synchronous Spectrum / 3.1.1:
Asynchronous Spectrum / 3.1.2:
Unevenly Spaced Data / 3.2:
Computational Efficiency / 3.3:
Generalized Two-dimensional Correlation Spectroscopy in Practice / 4:
Practical Example / 4.1:
Solvent Evaporation Study / 4.1.1:
2D Spectra Generated from Experimental Data / 4.1.2:
Sequential Order Analysis by Cross Peak Signs / 4.1.3:
Pretreatment of Data / 4.2:
Noise Reduction Methods / 4.2.1:
Baseline Correction Methods / 4.2.2:
Other Pretreatment Methods / 4.2.3:
Features Arising from Factors other than Band Intensity Changes / 4.3:
Effect of Band Position Shift and Line Shape Change / 4.3.1:
Simulation Studies / 4.3.2:
2D Spectral Features from Band Shift and Line Broadening / 4.3.3:
Further Expansion of Generalized Two-dimensional Correlation Spectroscopy - Sample-Sample Correlation and Hybrid Correlation / 5:
Sample-Sample Correlation Spectroscopy / 5.1:
Correlation in another Dimension / 5.1.1:
Matrix Algebra Outlook of 2D Correlation / 5.1.2:
Sample-Sample Correlation Spectra / 5.1.3:
Application of Sample-Sample Correlation / 5.1.4:
Hybrid 2D Correlation Spectroscopy / 5.2:
Multiple Perturbations / 5.2.1:
Correlation between Data Matrices / 5.2.2:
Case Studies / 5.2.3:
Additional Remarks / 5.3:
Additional Developments in Two-dimensional Correlation Spectroscopy - Statistical Treatments, Global Phase Maps, and Chemometrics / 6:
Classical Statistical Treatments and 2D Spectroscopy / 6.1:
Variance, Covariance, and Correlation Coefficient / 6.1.1:
Interpretation of 2D Disrelation Spectrum / 6.1.2:
Coherence and Correlation Phase Angle / 6.1.3:
Correlation Enhancement / 6.1.4:
Global 2D Phase Maps / 6.2:
Further Discussion on Global Phase / 6.2.1:
Phase Map with a Blinding Filter / 6.2.2:
Simulation Study / 6.2.3:
Chemometrics and 2D Correlation Spectroscopy / 6.3:
Comparison between Chemometrics and 2D Correlation / 6.3.1:
Factor Analysis / 6.3.2:
Principal Component Analysis (PCA) / 6.3.3:
Number of Principal Factors / 6.3.4:
PCA-reconstructed Spectra / 6.3.5:
Eigenvalue Manipulating Transformation (EMT) / 6.3.6:
Other Types of Two-dimensional Spectroscopy / 7:
Nonlinear Optical 2D Spectroscopy / 7.1:
Ultrafast Laser Pulses / 7.1.1:
Comparison with Generalized 2D Correlation Spectroscopy / 7.1.2:
Overlap Between Generalized 2D Correlation and Nonlinear Spectroscopy / 7.1.3:
Statistical 2D Correlation Spectroscopy / 7.2:
Statistical 2D Correlation by Barton II et al. / 7.2.1:
Statistical 2D Correlation by &Sa&sic and Ozaki / 7.2.2:
Other Statistical 2D Spectra / 7.2.3:
Link to Chemometrics / 7.2.4:
Other Developments in 2D Correlation Spectroscopy / 7.3:
Moving-window Correlation / 7.3.1:
Model-based 2D Correlation Spectroscopy / 7.3.2:
Dynamic Two-di / 8:
Preface
Acknowledgements
Introduction / 1:
8.

電子ブック

EB
Eric Setton, Bernd Girod
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 2:
Video Compression / 2.1:
H.264 Video Coding / 2.1.1:
Distortion Models / 2.1.2:
Video Streaming / 2.2:
Error Resilience / 2.2.1:
Congestion Control / 2.2.2:
Path Diversity / 2.2.3:
Multicast Architectures / 2.3:
IP Multicast / 2.3.1:
Content Delivery Networks / 2.3.2:
Peer-to-Peer Systems / 2.4:
Peer-to-Peer File Transfer, the Example of BitTorrent / 2.4.1:
Peer-to-Peer Streaming / 2.4.2:
Streaming over Throughput-Limited Paths / 3:
Video Encoding for Throughput-Limited Paths / 3.1:
End-to-End Rate-Distortion Performance Model / 3.1.1:
Experimental Results / 3.1.2:
Congestion-Distortion Optimized Scheduling / 3.2:
Channel Model / 3.2.1:
Evaluating a Schedule / 3.2.2:
Randomized Schedule Search / 3.2.3:
CoDiO Light / 3.2.4:
Chapter Summary / 3.2.5:
Peer-to-Peer Control Protocol / 4:
Protocol Description / 4.1:
Different Peer States / 4.1.1:
Different Tree Connection States / 4.1.2:
Multicast Source / 4.1.3:
Protocol Settings / 4.1.4:
Experimental Protocol Evaluation / 4.2:
Experimental Setup / 4.2.1:
Control Protocol Traffic Distribution / 4.2.2:
Join and Rejoin Latency / 4.2.3:
Scalability / 4.2.4:
Limiting Throughput / 4.2.5:
Video Streaming over a Peer-to-Peer Network / 4.3:
Video Streaming Protocol / 5.1:
Video Packet Transmission / 5.1.1:
Retransmissions / 5.1.2:
Peer-to-Peer CoDiO Scheduling / 5.2:
Sender-Driven Prioritization / 5.2.1:
Distortion-Optimized Retransmission Scheduling / 5.2.2:
Scheduler Evaluation / 5.2.3:
Video Sessions / 5.3:
Diversity / 5.3.2:
CoDiO P2P / 5.3.3:
Conclusions and Future Work / 5.4:
Conclusions / 6.1:
Future Work / 6.2:
Video Experiments / A:
Encoding Structures / A.1:
Latency-Constrained Video Streaming / A.1.2:
Error-Resilient Decoding / A.1.3:
Quality Metric / A.1.4:
Video Sequences / A.2:
Container / A.2.1:
Foreman / A.2.2:
Mobile / A.2.3:
Mother & Daughter / A.2.4:
News / A.2.5:
Salesman / A.2.6:
References
Index
Introduction / 1:
Background / 2:
Video Compression / 2.1:
9.

電子ブック

EB
Eric Setton, Bernd Girod
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 2:
Video Compression / 2.1:
H.264 Video Coding / 2.1.1:
Distortion Models / 2.1.2:
Video Streaming / 2.2:
Error Resilience / 2.2.1:
Congestion Control / 2.2.2:
Path Diversity / 2.2.3:
Multicast Architectures / 2.3:
IP Multicast / 2.3.1:
Content Delivery Networks / 2.3.2:
Peer-to-Peer Systems / 2.4:
Peer-to-Peer File Transfer, the Example of BitTorrent / 2.4.1:
Peer-to-Peer Streaming / 2.4.2:
Streaming over Throughput-Limited Paths / 3:
Video Encoding for Throughput-Limited Paths / 3.1:
End-to-End Rate-Distortion Performance Model / 3.1.1:
Experimental Results / 3.1.2:
Congestion-Distortion Optimized Scheduling / 3.2:
Channel Model / 3.2.1:
Evaluating a Schedule / 3.2.2:
Randomized Schedule Search / 3.2.3:
CoDiO Light / 3.2.4:
Chapter Summary / 3.2.5:
Peer-to-Peer Control Protocol / 4:
Protocol Description / 4.1:
Different Peer States / 4.1.1:
Different Tree Connection States / 4.1.2:
Multicast Source / 4.1.3:
Protocol Settings / 4.1.4:
Experimental Protocol Evaluation / 4.2:
Experimental Setup / 4.2.1:
Control Protocol Traffic Distribution / 4.2.2:
Join and Rejoin Latency / 4.2.3:
Scalability / 4.2.4:
Limiting Throughput / 4.2.5:
Video Streaming over a Peer-to-Peer Network / 4.3:
Video Streaming Protocol / 5.1:
Video Packet Transmission / 5.1.1:
Retransmissions / 5.1.2:
Peer-to-Peer CoDiO Scheduling / 5.2:
Sender-Driven Prioritization / 5.2.1:
Distortion-Optimized Retransmission Scheduling / 5.2.2:
Scheduler Evaluation / 5.2.3:
Video Sessions / 5.3:
Diversity / 5.3.2:
CoDiO P2P / 5.3.3:
Conclusions and Future Work / 5.4:
Conclusions / 6.1:
Future Work / 6.2:
Video Experiments / A:
Encoding Structures / A.1:
Latency-Constrained Video Streaming / A.1.2:
Error-Resilient Decoding / A.1.3:
Quality Metric / A.1.4:
Video Sequences / A.2:
Container / A.2.1:
Foreman / A.2.2:
Mobile / A.2.3:
Mother & Daughter / A.2.4:
News / A.2.5:
Salesman / A.2.6:
References
Index
Introduction / 1:
Background / 2:
Video Compression / 2.1:
10.

図書

図書
H. Haug ... [et al.] ; edited by C. Klingshirn
出版情報: Berlin : Springer-Verlag, c2001-2007  3 v. ; 28 cm.
シリーズ名: Landolt-Börnstein Zahlenwerte und Funktionen aus Naturwissenschaften und Technik, Neue Serie / Gesamtherausgabe, K.-H. Hellwege ; Group 3 . Condensed matter ; v. 34 . Semiconductor quantum structures ; subv. C
所蔵情報: loading…
目次情報: 続きを見る
Landolt-Börnstein
Group III: Condensed Matter
Semiconductor Quantum Structures / Volume 34:
Optical Properties (Part 2) / Subvolume C2:
Introductory material
Low-dimensional structures of II-VI compounds / 5:
General properties / H. Kalt5.1:
Introduction / 5.1.1:
Some basic properties of bulk II-VI compounds / 5.1.2:
Band-gap energies / 5.1.2.1:
Excitonic properties / 5.1.2.2:
Alignment of electronic bands / 5.1.3:
References for 5.1 / 5.1.4:
Quantum-well structures of II-VI compounds / 5.2:
(Hg,X)Te quantum wells / 5.2.1:
Low-density regime / 5.2.1.1:
Electronic states in quantum wells / 5.2.1.1.1:
Electron-hole and excitonic transitions / 5.2.1.1.2:
Modification of the optical properties by internal fields / 5.2.1.2:
Modification of the optical properties by external fields / 5.2.1.3:
High-density regime and nonlinear optics / 5.2.1.4:
References for 5.2.1 / 5.2.1.5:
CdTe quantum wells / 5.2.2:
Excitonic transitions / 5.2.2.1:
Localized excitons / 5.2.2.1.3:
Polariton effects / 5.2.2.1.4:
Strained quantum wells / 5.2.2.2:
Piezoelectric quantum wells / 5.2.2.2.2:
Hydrostatic pressure / 5.2.2.3:
External electric fields / 5.2.2.3.2:
External magnetic fields / 5.2.2.3.3:
The intermediate-density regime / 5.2.2.4:
Exciton-exciton interaction / 5.2.2.4.1:
Excitonic lasing and optical gain / 5.2.2.4.2:
Biexcitons / 5.2.2.4.3:
The high-density regime / 5.2.2.5:
One-component plasma (2DEG) / 5.2.2.5.1:
Electron-hole plasma / 5.2.2.5.2:
Coherent dynamics and relaxation of optical excitations / 5.2.2.6:
Coherent interactions / 5.2.2.6.1:
Dephasing mechanisms and homogeneous linewidth / 5.2.2.6.2:
Relaxation processes / 5.2.2.6.3:
Transport phenomena of excitons and trions / 5.2.2.6.4:
Radiative and nonradiative recombination / 5.2.2.6.5:
References for 5.2.2 / 5.2.2.7:
(Cd,Zn)Te, (Cd,Mn)Te, and (Cd,Mg)Te quantum wells / 5.2.3:
The intermediate and high-density regimes / 5.2.3.1:
References for 5.2.3 / 5.2.3.4:
ZnTe quantum wells / 5.2.4:
Excitons and polaritons / 5.2.4.1:
Optical nonlinearities and high-density effects / 5.2.4.3:
References for 5.2.4 / 5.2.4.4:
Telluride diluted-magnetic semiconductor quantum-well structures: (Hg,Mn)Te, (Cd,Mn)Te, and (Zn,Mn)Te QWs; Se/Te type-II QWs / 5.2.5:
Zeeman splitting and its applications / 5.2.5.1:
Giant Zeeman splitting / 5.2.5.1.1:
Magnetic-field induced type-I to type-II transition / 5.2.5.1.2:
Interface effects in non-DMS/DMS QW structures / 5.2.5.1.3:
Magnetic-field induced circular birefringence / 5.2.5.1.4:
Coulomb-bound electron-hole pairs and complexes (low-density regime) / 5.2.5.2:
Magnetic polarons / 5.2.5.2.1:
Donor-acceptor pair recombination / 5.2.5.2.3:
The intermediate and high-density regime / 5.2.5.3:
Spin-aligned excitons / 5.2.5.3.1:
Spin-aligned magnetoplasma / 5.2.5.3.2:
Two-dimensional electron or hole gas / 5.2.5.3.3:
Coherent spin dynamics and spin injection / 5.2.5.4:
Spin relaxation / 5.2.5.4.2:
Exciton dephasing and homogeneous broadening / 5.2.5.4.3:
Formation dynamics of magnetic polarons / 5.2.5.4.4:
Recombination processes / 5.2.5.4.5:
References for 5.2.5 / 5.2.5.5:
Telluride/Selenide quantum wells / 5.2.6:
High-density regime and dynamics / 5.2.6.1:
References for 5.2.6 / 5.2.6.3:
HgSe and (Hg,Cd)Se quantum wells / 5.2.7:
References for 5.2.7
CdSe quantum wells / 5.2.8:
High-density regime / 5.2.8.1:
Relaxation dynamics / 5.2.8.3:
References for 5.2.8 / 5.2.8.4:
(Cd,Zn)Se quantum wells / 5.2.9:
Modifications of the optical properties by internal fields / 5.2.9.1:
Piezoelectric fields / 5.2.9.2.1:
Modifications of the optical properties by external fields / 5.2.9.3:
Excitonic interactions and Pauli blocking / 5.2.9.3.1:
Two-photon absorption and second harmonic generation / 5.2.9.4.2:
Localized biexcitons / 5.2.9.4.3:
Excitonic and biexcitonic stimulated emission and optical gain / 5.2.9.4.4:
Fermi-edge singularity / 5.2.9.5:
Correlated electron-hole plasma / 5.2.9.5.2:
Coherent interactions and dephasing / 5.2.9.6:
Transport phenomena / 5.2.9.6.2:
Dynamics of gain and stimulated emission / 5.2.9.6.4:
Radiative and non-radiative recombination / 5.2.9.6.5:
References for 5.2.9 / 5.2.9.7:
ZnSe quantum wells / 5.2.10:
Strain and piezoelectric fields / 5.2.10.1:
Transient internal space charge fields / 5.2.10.2.2:
Electric fields / 5.2.10.3:
Magnetic fields / 5.2.10.3.3:
Excitonic gain and lasing / 5.2.10.4:
Nonlinear optical effects / 5.2.10.4.4:
Optical gain and lasing / 5.2.10.5:
Hot-exciton relaxation / 5.2.10.6:
Lateral transport / 5.2.10.6.4:
References for 5.2.10 / 5.2.10.6.6:
Selenide-based quantum wells containing Be, Mg, or S in the well / 5.2.11:
References for 5.2.11
Selenide diluted-magnetic semiconductor quantum-well structures: (Cd,Mn)Se, (Zn,Mn)Se, and (Zn,Fe)Se QWs / 5.2.12:
Two-dimensional electron gas / 5.2.12.1:
Spin dephasing and relaxation / 5.2.12.4:
Dynamics of magnetic polarons / 5.2.12.4.2:
References for 5.2.12 / 5.2.12.4.3:
Zincblende Sulphide/Selenide type-II quantum wells / 5.2.13:
References for 5.2.13
CdS/ZnS and (Cd,Zn)S/ZnS quantum wells / 5.2.14:
Intermediate and high-density regime / 5.2.14.1:
Exciton dynamics / 5.2.14.4:
References for 5.2.14 / 5.2.14.5:
ZnS/(Zn,Mg)S quantum wells / 5.2.15:
References for 5.2.15
ZnO and (Zn,Cd)O quantum wells / 5.2.16:
Dynamics of optical excitations / 5.2.16.1:
References for 5.2.16 / 5.2.16.5:
Superlattices and coupled quantum-well structures of II-VI compounds / 5.3:
(Hg,X)Te superlattices / 5.3.1:
Electronic states in superlattices / 5.3.1.1:
References for 5.3.1 / 5.3.1.1.2:
CdTe/(Cd,X)Te and (Cd,X)Te/ZnTe superlattices and coupled quantum wells / 5.3.2:
Transient effects and dynamics / 5.3.2.1:
References for 5.3.2 / 5.3.2.5:
Telluride diluted magnetic semiconductor superlattices and coupled quantum wells / 5.3.3:
Electronic states in DMS SLs / 5.3.3.1:
Spin states in DMS SLs / 5.3.3.2:
Polaritons / 5.3.3.3:
Dynamic processes / 5.3.3.5:
References for 5.3.3 / 5.3.3.6:
Telluride/Selenide and Telluride/Sulphide superlattices / 5.3.4:
Electronic states in type-II SLs / 5.3.4.1:
Excitons and isoelectronic traps / 5.3.4.2:
High-excitation regime / 5.3.4.3:
References for 5.3.4 / 5.3.4.5:
CdSe, ZnSe, (Cd,Zn)Se, and (Zn,Mg)(S,Se) superlattices and coupled quantum wells / 5.3.5:
Electronic states in strained-layer superlattices / 5.3.5.1:
Optical functions in superlattices and multiple quantum wells / 5.3.5.1.2:
Magnetic field / 5.3.5.1.3:
References for 5.3.5 / 5.3.5.4:
Selenide DMS superlattices and coupled quantum wells / 5.3.6:
Electronic states in diluted magnetic semiconductor superlattices (DMS SLs) / 5.3.6.1:
Spin-relaxation and spin injection / 5.3.6.1.2:
References for 5.3.6 / 5.3.6.3:
CdSe/CdS and CdS/ZnSe intrinsic Stark superlattices / 5.3.7:
References for 5.3.7 / 5.3.7.1:
Zincblende Sulphide/Selenide superlattices / 5.3.8:
References for 5.3.8
CdS/ZnS, CdS/(Cd,ZnS), and (Cd,Zn)S/ZnS superlattices / 5.3.9:
References for 5.3.9
Quantum-wire structures / 5.4:
Telluride quantum wires / 5.4.1:
Selenide quantum wires / 5.4.1.1:
Electron-phonon coupling / 5.4.2.1:
Optical gain / 5.4.2.1.3:
Exciton recombination / 5.4.2.3:
Sulfide quantum wires / 5.4.3:
Oxide quantum wires / 5.4.4:
Semimagnetic quantum wires / 5.4.5:
Mn-related transitions / 5.4.5.1:
Magneto-optics / 5.4.5.2:
References for 5.4 / 5.4.6:
II-VI Quantum dots I - Nanocrystals / U. Woggon ; S.V. Gaponenko5.5:
HgTe / 5.5.1:
CdTe / 5.5.2:
The low-density regime / 5.5.2.1:
Size-dependent energy states / 5.5.2.1.1:
Splitting of states / 5.5.2.1.2:
Interaction with phonons / 5.5.2.1.3:
Impurity states / 5.5.2.1.4:
Coherent dynamics, relaxation and recombination of optical excitations / 5.5.2.2:
Dot-dot interactions, quantum dot arrays / 5.5.2.5:
(Cd,Hg)Te / 5.5.3:
Cd(Te,Se) and Cd(Te,S) / 5.5.4:
ZnTe / 5.5.5:
HgSe / 5.5.6:
CdSe / 5.5.7:
Biexciton states / 5.5.7.1:
Nonlinear optical coefficients / 5.5.7.2.2:
Stimulated emission and optical gain / 5.5.7.2.3:
Dephasing times and homogeneous linewidth / 5.5.7.3:
Cd(Se,S) / 5.5.7.4.2:
(Cd,Mn)Se / 5.5.8.1:
(Cd,Zn)Se / 5.5.10:
ZnSe / 5.5.11:
HgS / 5.5.11.1:
CdS / 5.5.13:
Nonlinear-optical coefficients / 5.5.13.1:
(Zn,Cd)S / 5.5.13.2.3:
(Zn,Mn)S / 5.5.15:
ZnS / 5.5.16:
CdO / 5.5.16.1:
ZnO / 5.5.18:
References for 5.5 / 5.5.18.1:
II-VI Quantum dots II - Self-organized, epitaxially grown nanostructures / 5.6:
Excitonic states and their fine structure / 5.6.1:
Charged excitons / 5.6.2.1.2:
(Cd,Mn)Te, (Cd,Mg)Te / 5.6.2.1.3:
CdSe and ZnCdSe / 5.6.4:
References for 5.6 / 5.6.6.1:
Landolt-Börnstein
Group III: Condensed Matter
Semiconductor Quantum Structures / Volume 34:
11.

電子ブック

EB
John Impagliazzo
出版情報: Springer eBooks Computer Science , Springer US, 2006
所蔵情報: loading…
12.

電子ブック

EB
John Impagliazzo
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2006
所蔵情報: loading…
13.

図書

図書
Thomas Barkowsky
出版情報: Berlin ; Tokyo : Springer, c2002  x, 174 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2541 . Lecture notes in artificial intelligence
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Mental Processing of Geographic Knowledge / 1.1:
Cognitive Maps / 1.1.1:
Mental Construction of Spatial Knowledge: An Example / 1.1.2:
Theses and Assumptions / 1.2:
Knowledge Construction and Human Memory / 1.2.1:
Characteristics of Geographic Knowledge / 1.2.2:
Spatial Knowledge Organization in Long-Term Memory / 1.2.3:
Visual Mental Images and Diagrammatic Reasoning / 1.2.4:
Research Questions and Goals / 1.3:
Research Questions / 1.3.1:
Goals / 1.3.2:
Approach: Experimental Computational Modeling / 1.4:
Computational Cognition / 1.4.1:
Building Computational Models / 1.4.2:
Modeling as Experimental Approach / 1.4.3:
Organization of this Thesis / 1.5:
State of the Art / 2:
Spatial Knowledge Conceptions: Cognitive Maps and Other Metaphors / 2.1:
Rubber Sheet Maps, Cognitive Atlases, Collages, and Geographic Information Systems / 2.1.1:
Spatial Mental Models / 2.1.3:
Other Conceptions / 2.1.4:
Human Memory / 2.2:
Working Memory / 2.2.1:
Long-Term Memory / 2.2.2:
Interacting Memory Systems in Mental Imagery / 2.2.3:
Mental Imagery / 2.3:
The Imagery Debate / 2.3.1:
Psychological and Neuroscientific Foundations / 2.3.2:
The Kosslyn Models / 2.3.3:
The 1980 Model / 2.3.3.1:
The 1994 Model / 2.3.3.2:
Spatial Reasoning / 2.4:
Topology / 2.4.1:
Orientation / 2.4.2:
Distance / 2.4.3:
Shape / 2.4.4:
Computational Geometry / 2.4.5:
Diagrammatic Reasoning / 2.5:
Propositional vs. Analogical Knowledge Representation / 2.5.1:
Types of Diagrammatic Reasoning Systems / 2.5.2:
Examples for Diagrammatic Reasoning Architectures / 2.5.3:
DEPIC-2D / 2.5.3.1:
WHISPER / 2.5.3.2:
Computational Imagery / 2.5.3.3:
Summary / 2.6:
MIRAGE - Developing the Model / 3:
Characteristics of the Model / 3.1:
Evaluating the Working Memory Representation / 3.1.1:
MIRAGE - Outline of the Model / 3.2:
Types of Entities and Spatial Relations in MIRAGE / 3.3:
Entities / 3.3.1:
Relations / 3.3.2:
Subsystems, Structures, and Processes / 3.4:
Long-Term Memory Activation / 3.4.1:
Spatial Knowledge Fragments / 3.4.1.1:
The Hierarchical Long-Term Memory Representation / 3.4.1.2:
The Access Process / 3.4.1.3:
The Activated Long-Term Memory Representation / 3.4.1.4:
The Construction Process / 3.4.1.5:
Visual Mental Image Construction / 3.4.2:
The Enriched Representation / 3.4.2.1:
The Conversion Process / 3.4.2.2:
The Visual Buffer / 3.4.2.3:
The Visualization Process / 3.4.2.4:
Image Inspection / 3.4.3:
The Inspection Result / 3.4.3.1:
The Inspection Process / 3.4.3.2:
Visual Mental Image Construction in Detail / 4:
A More Demanding Scenario / 4.1:
Diagrammatic Representations of Lean Knowledge / 4.2:
Consequences for Image Construction / 4.3:
Relaxation of Spatial Constraints / 4.3.1:
Completion of Qualitative Spatial Relations / 4.3.2:
Interpretation of Qualitative Spatial Relations / 4.3.3:
Image Revision Strategies in MIRAGE / 4.4:
Unstable Images / 4.4.1:
Omission of Facts / 4.4.2:
Revision of Relational Completion / 4.4.3:
Variation of Relational Completion / 4.4.3.1:
Relaxation of Relational Completion / 4.4.3.2:
Revision of Image Specification / 4.4.4:
Depicting Qualitative Spatial Relations / 4.4.4.1:
Depicting Unspecified Spatial Relations / 4.4.4.2:
MIRAGE Implementation / 4.5:
Computational Tools for Modeling: SIMSIS / 5.1:
The Idea of SIMSIS / 5.1.1:
The Aspect Map Model / 5.1.1.1:
Modeling Aspect Maps in SIMSIS / 5.1.1.2:
Depictions, Scenarios, and Interpretations / 5.1.2:
SIMSIS Pictures / 5.1.2.1:
SIMSIS Facts and Scenarios / 5.1.2.2:
SIMSIS Interpretations and Meaning Systems / 5.1.2.3:
Realization of the Model / 5.2:
MIRAGE Structures / 5.2.1:
Entities, Relations, and Spatial Knowledge Fragments / 5.2.1.1:
The Long-Term Memory Representations / 5.2.1.2:
MIRAGE Processes / 5.2.1.3:
The Long-Term Memory Activation Processes / 5.2.2.1:
The Image Construction Processes / 5.2.2.2:
Operation and Behavior of MIRAGE / 5.2.2.3:
Conclusion and Outlook / 6:
Results and Discussion / 6.1:
Reflecting the Theses / 6.2.1:
Spatial Knowledge Construction / 6.2.1.1:
Underdeterminacy in Long-Term Memory / 6.2.1.2:
Fragmentation and Hierarchical Organization / 6.2.1.3:
Visual Mental Imagery / 6.2.1.4:
The Parameters of the Model / 6.2.2:
Explicit Parameters / 6.2.2.1:
Implicit Parameters / 6.2.2.2:
Conclusions / 6.2.3:
Future Work / 6.3:
Extending MIRAGE / 6.3.1:
Geographic Entities and Spatial Relations / 6.3.1.1:
Partially Aggregated Knowledge Structures / 6.3.1.2:
Mental Imagery Functionality / 6.3.1.3:
Parameters of MIRAGE / 6.3.1.4:
Empirical Investigations / 6.3.2:
Use of Default Knowledge / 6.3.2.1:
Control of Image Construction / 6.3.2.2:
Processing Capacity for Mental Images / 6.3.2.3:
Use of Chunking Facilities / 6.3.2.4:
Combination of Propositional and Image-Based Reasoning / 6.3.2.5:
Application Perspectives / 6.3.3:
Adequate Presentation of Visual Information / 6.3.3.1:
External Support of Reasoning in Mental Images / 6.3.3.2:
Bibliography
Index
Introduction / 1:
Mental Processing of Geographic Knowledge / 1.1:
Cognitive Maps / 1.1.1:
14.

電子ブック

EB
Thomas Barkowsky
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2002
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Mental Processing of Geographic Knowledge / 1.1:
Cognitive Maps / 1.1.1:
Mental Construction of Spatial Knowledge: An Example / 1.1.2:
Theses and Assumptions / 1.2:
Knowledge Construction and Human Memory / 1.2.1:
Characteristics of Geographic Knowledge / 1.2.2:
Spatial Knowledge Organization in Long-Term Memory / 1.2.3:
Visual Mental Images and Diagrammatic Reasoning / 1.2.4:
Research Questions and Goals / 1.3:
Research Questions / 1.3.1:
Goals / 1.3.2:
Approach: Experimental Computational Modeling / 1.4:
Computational Cognition / 1.4.1:
Building Computational Models / 1.4.2:
Modeling as Experimental Approach / 1.4.3:
Organization of this Thesis / 1.5:
State of the Art / 2:
Spatial Knowledge Conceptions: Cognitive Maps and Other Metaphors / 2.1:
Rubber Sheet Maps, Cognitive Atlases, Collages, and Geographic Information Systems / 2.1.1:
Spatial Mental Models / 2.1.3:
Other Conceptions / 2.1.4:
Human Memory / 2.2:
Working Memory / 2.2.1:
Long-Term Memory / 2.2.2:
Interacting Memory Systems in Mental Imagery / 2.2.3:
Mental Imagery / 2.3:
The Imagery Debate / 2.3.1:
Psychological and Neuroscientific Foundations / 2.3.2:
The Kosslyn Models / 2.3.3:
The 1980 Model / 2.3.3.1:
The 1994 Model / 2.3.3.2:
Spatial Reasoning / 2.4:
Topology / 2.4.1:
Orientation / 2.4.2:
Distance / 2.4.3:
Shape / 2.4.4:
Computational Geometry / 2.4.5:
Diagrammatic Reasoning / 2.5:
Propositional vs. Analogical Knowledge Representation / 2.5.1:
Types of Diagrammatic Reasoning Systems / 2.5.2:
Examples for Diagrammatic Reasoning Architectures / 2.5.3:
DEPIC-2D / 2.5.3.1:
WHISPER / 2.5.3.2:
Computational Imagery / 2.5.3.3:
Summary / 2.6:
MIRAGE - Developing the Model / 3:
Characteristics of the Model / 3.1:
Evaluating the Working Memory Representation / 3.1.1:
MIRAGE - Outline of the Model / 3.2:
Types of Entities and Spatial Relations in MIRAGE / 3.3:
Entities / 3.3.1:
Relations / 3.3.2:
Subsystems, Structures, and Processes / 3.4:
Long-Term Memory Activation / 3.4.1:
Spatial Knowledge Fragments / 3.4.1.1:
The Hierarchical Long-Term Memory Representation / 3.4.1.2:
The Access Process / 3.4.1.3:
The Activated Long-Term Memory Representation / 3.4.1.4:
The Construction Process / 3.4.1.5:
Visual Mental Image Construction / 3.4.2:
The Enriched Representation / 3.4.2.1:
The Conversion Process / 3.4.2.2:
The Visual Buffer / 3.4.2.3:
The Visualization Process / 3.4.2.4:
Image Inspection / 3.4.3:
The Inspection Result / 3.4.3.1:
The Inspection Process / 3.4.3.2:
Visual Mental Image Construction in Detail / 4:
A More Demanding Scenario / 4.1:
Diagrammatic Representations of Lean Knowledge / 4.2:
Consequences for Image Construction / 4.3:
Relaxation of Spatial Constraints / 4.3.1:
Completion of Qualitative Spatial Relations / 4.3.2:
Interpretation of Qualitative Spatial Relations / 4.3.3:
Image Revision Strategies in MIRAGE / 4.4:
Unstable Images / 4.4.1:
Omission of Facts / 4.4.2:
Revision of Relational Completion / 4.4.3:
Variation of Relational Completion / 4.4.3.1:
Relaxation of Relational Completion / 4.4.3.2:
Revision of Image Specification / 4.4.4:
Depicting Qualitative Spatial Relations / 4.4.4.1:
Depicting Unspecified Spatial Relations / 4.4.4.2:
MIRAGE Implementation / 4.5:
Computational Tools for Modeling: SIMSIS / 5.1:
The Idea of SIMSIS / 5.1.1:
The Aspect Map Model / 5.1.1.1:
Modeling Aspect Maps in SIMSIS / 5.1.1.2:
Depictions, Scenarios, and Interpretations / 5.1.2:
SIMSIS Pictures / 5.1.2.1:
SIMSIS Facts and Scenarios / 5.1.2.2:
SIMSIS Interpretations and Meaning Systems / 5.1.2.3:
Realization of the Model / 5.2:
MIRAGE Structures / 5.2.1:
Entities, Relations, and Spatial Knowledge Fragments / 5.2.1.1:
The Long-Term Memory Representations / 5.2.1.2:
MIRAGE Processes / 5.2.1.3:
The Long-Term Memory Activation Processes / 5.2.2.1:
The Image Construction Processes / 5.2.2.2:
Operation and Behavior of MIRAGE / 5.2.2.3:
Conclusion and Outlook / 6:
Results and Discussion / 6.1:
Reflecting the Theses / 6.2.1:
Spatial Knowledge Construction / 6.2.1.1:
Underdeterminacy in Long-Term Memory / 6.2.1.2:
Fragmentation and Hierarchical Organization / 6.2.1.3:
Visual Mental Imagery / 6.2.1.4:
The Parameters of the Model / 6.2.2:
Explicit Parameters / 6.2.2.1:
Implicit Parameters / 6.2.2.2:
Conclusions / 6.2.3:
Future Work / 6.3:
Extending MIRAGE / 6.3.1:
Geographic Entities and Spatial Relations / 6.3.1.1:
Partially Aggregated Knowledge Structures / 6.3.1.2:
Mental Imagery Functionality / 6.3.1.3:
Parameters of MIRAGE / 6.3.1.4:
Empirical Investigations / 6.3.2:
Use of Default Knowledge / 6.3.2.1:
Control of Image Construction / 6.3.2.2:
Processing Capacity for Mental Images / 6.3.2.3:
Use of Chunking Facilities / 6.3.2.4:
Combination of Propositional and Image-Based Reasoning / 6.3.2.5:
Application Perspectives / 6.3.3:
Adequate Presentation of Visual Information / 6.3.3.1:
External Support of Reasoning in Mental Images / 6.3.3.2:
Bibliography
Index
Introduction / 1:
Mental Processing of Geographic Knowledge / 1.1:
Cognitive Maps / 1.1.1:
15.

図書

図書
Robert Alicki and Mark Fannes
出版情報: Oxford : Oxford University Press, c2001  xiv, 278 p. ; 24 cm
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Basic tools for quantum mechanics / 2:
Hilbert spaces and operators / 2.1:
Vector spaces / 2.1.1:
Banach and Hilbert spaces / 2.1.2:
Geometrical properties of Hilbert spaces / 2.1.3:
Orthonormal bases / 2.1.4:
Subspaces and projectors / 2.1.5:
Linear maps between Banach spaces / 2.1.6:
Linear functionals and Dirac notation / 2.1.7:
Adjoints of bounded operators / 2.1.8:
Hermitian, unitary and normal operators / 2.1.9:
Partial isometries and polar decomposition / 2.1.10:
Spectra of operators / 2.1.11:
Unbounded operators / 2.1.12:
Measures / 2.2:
Measures and integration / 2.2.1:
Distributions / 2.2.2:
Hilbert spaces of functions / 2.2.3:
Spectral measures / 2.2.4:
Probability in quantum mechanics / 2.3:
Pure states / 2.3.1:
Mixed states, density matrices / 2.3.2:
Observables in quantum mechanics / 2.4:
Compact operators / 2.4.1:
Weyl quantization / 2.4.2:
Composed systems / 2.5:
Direct sums / 2.5.1:
Tensor products / 2.5.2:
Observables and states of composite systems / 2.5.3:
Notes / 2.6:
Deterministic dynamics / 3:
Deterministic quantum dynamics / 3.1:
Time-independent Hamiltonians / 3.1.1:
Perturbations of Hamiltonians / 3.1.2:
Time-dependent Hamiltonians / 3.1.3:
Periodic perturbations and Floquet operators / 3.1.4:
Kicked dynamics / 3.1.5:
Classical limits / 3.2:
Classical differentiable dynamics / 3.3:
Self-adjoint Laplacians on compact manifolds / 3.4:
Spin chains / 3.5:
Local observables / 4.1:
States of a spin system / 4.2:
Symmetries and dynamics / 4.3:
Algebraic tools / 5:
C*-algebras / 5.1:
Examples / 5.2:
States and representations / 5.3:
Dynamical systems and von Neumann algebras / 5.4:
Fermionic dynamical systems / 5.5:
Fermions in Fock space / 6.1:
Fock space / 6.1.1:
Creation and annihilation / 6.1.2:
Second quantization / 6.1.3:
The CAR-algebra / 6.2:
Canonical anticommutation relations / 6.2.1:
Quasi-free automorphisms / 6.2.2:
Quasi-free states / 6.2.3:
Ergodic theory / 6.3:
Ergodicity in classical systems / 7.1:
Ergodicity in quantum systems / 7.2:
Asymptotic Abelianness / 7.2.1:
Multitime correlations / 7.2.2:
Fluctuations around ergodic means / 7.2.3:
Lyapunov exponents / 7.3:
Classical dynamics / 7.3.1:
Quantum dynamics / 7.3.2:
Quantum irreversibility / 7.4:
Measurement theory / 8.1:
Open quantum systems / 8.2:
Complete positivity / 8.3:
Quantum dynamical semigroups / 8.4:
Quasi-free completely positive maps / 8.5:
Entropy / 8.6:
von Neumann entropy / 9.1:
Technical preliminaries / 9.1.1:
Properties of von Neumann's entropy / 9.1.2:
Mean entropy / 9.1.3:
Entropy of quasi-free states / 9.1.4:
Relative entropy / 9.2:
Finite-dimensional case / 9.2.1:
Maximum entropy principle / 9.2.2:
Algebraic setting / 9.2.3:
Dynamical entropy / 9.3:
Operational partitions / 10.1:
Symbolic dynamics / 10.2:
The entropy / 10.2.2:
Some technical results / 10.3:
The quantum shift / 10.4:
The free shift / 10.4.2:
Infinite entropy / 10.4.3:
Powers-Price shifts / 10.4.4:
Classical dynamical entropy / 10.5:
The Kolmogorov-Sinai invariant / 11.1:
H-density / 11.2:
Finite quantum systems / 12:
Quantum chaos / 12.1:
Time scales / 12.1.1:
Spectral statistics / 12.1.2:
Semi-classical limits / 12.1.3:
The kicked top / 12.2:
The model / 12.2.1:
The classical limit / 12.2.2:
Kicked mean-field Heisenberg model / 12.2.3:
Chaotic properties / 12.2.4:
Gram matrices / 12.3:
Entropy production / 12.4:
Model systems / 12.5:
Entropy of the quantum cat map / 13.1:
Ruelle's inequality / 13.2:
Non-commutative Riemannian structures / 13.2.1:
Non-commutative Lyapunov exponents / 13.2.2:
Quasi-free Fermion dynamics / 13.2.3:
Description of the model / 13.3.1:
Main result / 13.3.2:
Sketch of the proof / 13.3.3:
Epilogue / 13.4:
References
Index
Introduction / 1:
Basic tools for quantum mechanics / 2:
Hilbert spaces and operators / 2.1:
16.

図書

図書
Hans Bisswanger
出版情報: Weinheim : WILEY-VCH, c2008  xviii, 301 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface to the Second English Edition
Preface to the First English Edition
Symbols and Abbreviations
Introduction and Definitions
References
Multiple Equilibria / 1:
Diffusion / 1.1:
Interaction between Macromolecules and Ligands / 1.2:
Binding Constants / 1.2.1:
Macromolecules with One Binding Site / 1.2.2:
Macromolecules with Identical Independent Binding Sites / 1.3:
General Binding Equation / 1.3.1:
Graphic Representations of the Binding Equation / 1.3.2:
Direct and Linear Diagrams / 1.3.2.1:
Analysis of Binding Data from Spectroscopic Titrations / 1.3.2.2:
Binding of Different Ligands, Competition / 1.3.3:
Non-competitive Binding / 1.3.4:
Macromolecules with Non-identical, Independent Binding Sites / 1.4:
Macromolecules with Identical, Interacting Binding Sites, Cooperativity / 1.5:
The Hill Equation / 1.5.1:
The Adair Equation / 1.5.2:
The Pauling Model / 1.5.3:
Allosteric Enzymes / 1.5.4:
The Symmetry or Concerted Model / 1.5.5:
The Sequential Model and Negative Cooperativity / 1.5.6:
Analysis of Cooperativity / 1.5.7:
Physiological Aspects of Cooperativity / 1.5.8:
Examples of Allosteric Enzymes / 1.5.9:
Hemoglobin / 1.5.9.1:
Aspartate Transcarbamoylase / 1.5.9.2:
Aspartokinase / 1.5.9.3:
Phosphofructokinase / 1.5.9.4:
Allosteric Regulation of the Glycogen Metabolism / 1.5.9.5:
Membrane Bound Enzymes and Receptors / 1.5.9.6:
Non-identical, Interacting Binding Sites / 1.6:
Enzyme Kinetics / 2:
Reaction Order / 2.1:
First Order Reactions / 2.1.1:
Second Order Reactions / 2.1.2:
Zero Order Reactions / 2.1.3:
Steady-State Kinetics and the Michaelis-Menten Equation / 2.2:
Derivation of the Michaelis-Menten Equation / 2.2.1:
Analysis of Enzyme Kinetic Data / 2.3:
Graphical Representations of the Michaelis-Menten Equation / 2.3.1:
Direct and Semi-logarithmic Representations / 2.3.1.1:
Direct Linear Plots / 2.3.1.2:
Linearization Methods / 2.3.1.3:
Analysis of Progress Curves / 2.3.2:
Integrated Michaelis-Menten Equation / 2.3.2.1:
Determination of Reaction Rates / 2.3.2.2:
Graphic Methods for Rate Determination / 2.3.2.3:
Graphic Determination of True Initial Rates / 2.3.2.4:
Reversible Enzyme Reactions / 2.4:
Rate Equation for Reversible Enzyme Reactions / 2.4.1:
The Haldane Relationship / 2.4.2:
Product Inhibition / 2.4.3:
Enzyme Inhibition / 2.5:
Unspecific Enzyme Inhibition / 2.5.1:
Irreversible Enzyme Inhibition / 2.5.2:
General Features of Irreversible Enzyme Inhibition / 2.5.2.1:
Suicide Substrates / 2.5.2.2:
Transition State Analogs / 2.5.2.3:
Analysis of Irreversible Inhibitions / 2.5.2.4:
Reversible Enzyme Inhibition / 2.5.3:
General Rate Equation / 2.5.3.1:
Non-Competitive Inhibition and Graphic Representation of Inhibition Data / 2.5.3.2:
Competitive Inhibition / 2.5.3.3:
Uncompetitive Inhibition / 2.5.3.4:
Partially Non-competitive Inhibition / 2.5.3.5:
Partially Uncompetitive Inhibition / 2.5.3.6:
Partially Competitive Inhibition / 2.5.3.7:
Noncompetitive and Uncompetitive Product Inhibition / 2.5.3.8:
Substrate Inhibition / 2.5.3.9:
Enzyme Reactions with Two Competing Substrates / 2.5.4:
Different Enzymes Catalyzing the Same Reaction / 2.5.5:
Multi-substrate Reactions / 2.6:
Nomenclature / 2.6.1:
Random Mechanism / 2.6.2:
Ordered Mechanism / 2.6.3:
Ping-pong Mechanism / 2.6.4:
Product Inhibition in Multi-substrate Reactions / 2.6.5:
Haldane Relationships in Multi-substrate Reactions / 2.6.6:
Mechanisms with more than Two Substrates / 2.6.7:
Other Nomenclatures for Multi-substrate Reactions / 2.6.8:
Derivation of Rate Equations of Complex Enzyme Mechanisms / 2.7:
King-Altmann Method / 2.7.1:
Simplified Derivations Applying Graph Theory / 2.7.2:
Combination of Equilibrium and Steady State Approach / 2.7.3:
Kinetic Treatment of Allosteric Enzymes / 2.8:
Hysteretic Enzymes / 2.8.1:
Kinetic Cooperativity, the Slow Transition Model / 2.8.2:
pH and Temperature Dependence of Enzymes / 2.9:
pH Optimum and Determination of pK Values / 2.9.1:
pH Stability / 2.9.2:
Temperature Dependence / 2.9.3:
Isotope Exchange / 2.10:
Isotope Exchange Kinetics / 2.10.1:
Isotope Effects / 2.10.2:
Primary Kinetic Isotope Effect / 2.10.2.1:
Influence of the Kinetic Isotope Effect on V and Km / 2.10.2.2:
Other Isotope Effects / 2.10.2.3:
Special Enzyme Mechanisms / 2.11:
Ribozymes / 2.11.1:
Polymer Substrates / 2.11.2:
Kinetics of Immobilized Enzymes / 2.11.3:
External Diffusion Limitation / 2.11.3.1:
Internal Diffusion Limitation / 2.11.3.2:
Inhibition of Immobilized Enzymes / 2.11.3.3:
pH and Temperature Behavior of Immobilized Enzymes / 2.11.3.4:
Transport Processes / 2.11.4:
Enzyme Reactions at Membrane Interfaces / 2.11.5:
Application of Statistical Methods in Enzyme Kinetics / 2.12:
General Remarks / 2.12.1:
Statistical Terms Used in Enzyme Kinetics / 2.12.2:
Methods / 3:
Methods for Investigation of Multiple Equilibria / 3.1:
Equilibrium Dialysis and General Aspects of Binding Measurements / 3.1.1:
Equilibrium Dialysis / 3.1.1.1:
Control Experiments and Sources of Error / 3.1.1.2:
Continuous Equilibrium Dialysis / 3.1.1.3:
Ultrafiltration / 3.1.2:
Gel Filtration / 3.1.3:
Batch Method / 3.1.3.1:
The Method of Hummel and Dreyer / 3.1.3.2:
Other Gel Filtration Methods / 3.1.3.3:
Ultracentrifugation / 3.1.4:
Fixed Angle Ultracentrifugation Methods / 3.1.4.1:
Sucrose Gradient Centrifugation / 3.1.4.2:
Surface Plasmon Resonance / 3.1.5:
Electrochemical Methods / 3.2:
The Oxygen Electrode / 3.2.1:
The CO2 Electrode / 3.2.2:
Potentiometry, Redox Potentials / 3.2.3:
The pH-stat / 3.2.4:
Polarography / 3.2.5:
Calorimetry / 3.3:
Spectroscopic Methods / 3.4:
Absorption Spectroscopy / 3.4.1:
The Lambert-Beer Law / 3.4.1.1:
Spectral Properties of Enzymes and Ligands / 3.4.1.2:
Structure of Spectrophotometers / 3.4.1.3:
Double Beam Spectrophotometer / 3.4.1.4:
Difference Spectroscopy / 3.4.1.5:
The Dual Wavelength Spectrophotometer / 3.4.1.6:
Photochemical Action Spectra / 3.4.1.7:
Bioluminescence / 3.4.2:
Fluorescence / 3.4.3:
Quantum Yield / 3.4.3.1:
Structure of Spectrofluorimeters / 3.4.3.2:
Perturbations of Fluorescence Measurements / 3.4.3.3:
Fluorescent Compounds (Fluorophores) / 3.4.3.4:
Radiationless Energy Transfer / 3.4.3.5:
Fluorescence Polarization / 3.4.3.6:
Pulse Fluorimetry / 3.4.3.7:
Circular Dichroism and Optical Rotation Dispersion / 3.4.4:
Infrared and Raman Spectroscopy / 3.4.5:
IR Spectroscopy / 3.4.5.1:
Raman Spectroscopy / 3.4.5.2:
Applications / 3.4.5.3:
Electron Paramagnetic Resonance Spectroscopy / 3.4.6:
Measurement of Fast Reactions / 3.5:
Flow Methods / 3.5.1:
The Continuous Flow Method / 3.5.1.1:
The Stopped-flow Method / 3.5.1.2:
Measurement of Enzyme Reactions by Flow Methods / 3.5.1.3:
Determination of the Dead Time / 3.5.1.4:
Relaxation Methods / 3.5.2:
The Temperature Jump Method / 3.5.2.1:
The Pressure Jump Method / 3.5.2.2:
The Electric Field Method / 3.5.2.3:
Flash Photolysis, Pico- and Femto-second Spectroscopy / 3.5.3:
Evaluation of Rapid Kinetic Reactions (Transient Kinetics) / 3.5.4:
Subject Index
Preface to the Second English Edition
Preface to the First English Edition
Symbols and Abbreviations
17.

図書

図書
editors, Hisham Z. Massoud ... [et al.]
出版情報: Pennington, N.J. : Electrochemical Society, c2000  xiv, 539 p. ; 27 cm
シリーズ名: Proceedings / [Electrochemical Society] ; v. 2000-2
所蔵情報: loading…
18.

電子ブック

EB
Abhishek Singh., Abhishek Singh, Baibhav Singh
出版情報: Springer eBooks Computer Science , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Assembly Language
Introduction / 1.0:
Registers / 1.1:
General Purpose Register / 1.1.1:
FLAGS Register / 1.1.2:
80x86 Instruction Format / 1.2:
Instruction Prefix / 1.2.1:
Lock and Repeat Prefixes / 1.2.2:
Segment Override Prefixes / 1.2.3:
Opcode / 1.2.4:
Instructions / 1.3:
Basic Instructions / 1.3.1:
Floating Point Instruction / 1.3.2:
Stack Setup / 1.4:
Passing Parameters in C to the Procedure / 1.4.1:
Local Data Space on the Stack / 1.4.2:
Calling Conventions / 1.5:
cdecl calling convention / 1.5.1:
fastcall calling convention / 1.5.2:
stdcall calling convention / 1.5.3:
thiscall / 1.5.4:
Data Constructs / 1.6:
Global Variables / 1.6.1:
Local Variables / 1.6.2:
Imported Variables / 1.6.3:
Thread Local Storage (TLS) / 1.6.5:
Executable Data Section / 1.6.6:
Representation of Arithmetic Operations in Assembly / 1.7:
Multiplication / 1.7.1:
Division / 1.7.2:
Modulo / 1.7.3:
Representation of Data Structure in Assembly / 1.8:
Representation of Array in Assembly / 1.8.1:
Representation of Linked List in Assembly / 1.8.2:
Virtual Function Call in Assembly / 1.9:
Representation of classes in Assembly / 1.9.1:
Conclusion / 1.10:
Fundamental of Windows
Memory Management / 2.0:
Virtual Memory Management / 2.1.1:
Virtual Memory Management in Windows NT / 2.1.1.1:
Impact of Hooking / 2.1.1.2:
Segmented Memory Management / 2.1.2:
Paged Memory Management / 2.1.3:
Kernel Memory and User Memory / 2.2:
Kernel Memory Space / 2.2.1:
Section Object / 2.2.2:
Virtual Address Descriptor / 2.3:
User Mode Address Space / 2.3.1:
Memory Management in Windows / 2.3.2:
Objects and Handles / 2.3.3:
Named Objects / 2.3.4:
Processes and Threads / 2.4:
Context Switching / 2.4.1:
Context Switches and Mode Switches / 2.4.1.1:
Synchronization Objects / 2.4.2:
Critical Section / 2.4.2.1:
Mutex / 2.4.2.2:
Semaphore / 2.4.2.3:
Event / 2.4.2.4:
Metered Section / 2.4.2.5:
Process Initialization Sequence / 2.5:
Application Programming Interface / 2.5.1:
Reversing Windows NT / 2.6:
ExpEchoPoolCalls / 2.6.1:
ObpShowAllocAndFree / 2.6.2:
LpcpTraceMessages / 2.6.3:
MmDebug / 2.6.4:
NtGlobalFlag / 2.6.5:
SepDumpSD / 2.6.6:
CmLogLevel and CmLogSelect / 2.6.7:
Security Features in Vista / 2.7:
Address Space Layout Randomization (ASLR) / 2.7.1:
Stack Randomization / 2.7.2:
Heap Defenses / 2.7.3:
NX / 2.7.4:
/GS / 2.7.5:
Pointer Encoding / 2.7.6:
Cryptographic API in Windows Vista / 2.7.7:
Crypto-Agility / 2.7.8:
CryptoAgility in CNG / 2.7.9:
Algorithm Providers / 2.7.10:
Random Number Generator / 2.7.11:
Hash Functions / 2.7.12:
Symmetric Encryption / 2.7.13:
Asymmetric Encryption / 2.7.14:
Signatures and Verification / 2.7.15:
Portable Executable File Format / 2.8:
PE file Format / 3.0:
Import Address Table / 3.2:
Executable and Linking Format / 3.3:
ELF Header / 3.3.1:
The Program Header Table / 3.3.2:
Reversing Binaries for Identifying Vulnerabilities / 3.4:
Stack Overflow / 4.0:
CAN-2002-1123 Microsoft SQL Server 'Hello' Authentication Buffer Overflow" / 4.1.1:
CAN-2004-0399 Exim Buffer Overflow / 4.1.2:
Stack Checking / 4.1.3:
Off-by-One Overflow / 4.2:
OpenBSD 2.7 FTP Daemon Off-by-One / 4.2.1:
Non-Executable Memory / 4.2.3:
Heap Overflows / 4.3:
Heap Based Overflows / 4.3.1:
Integer Overflows / 4.4:
Types Integer Overflow / 4.4.1:
CAN-2004-0417 CVS Max dotdot Protocol Command Integer Overflow / 4.4.2:
Format String / 4.5:
Format String Vulnerability / 4.5.1:
Format String Denial of Service Attack / 4.5.2:
Format String Vulnerability Reading Attack / 4.5.3:
SEH Structure Exception Handler / 4.6:
Exploiting the SEH / 4.6.1:
Writing Exploits General Concepts / 4.7:
Stack Overflow Exploits / 4.7.1:
Injection Techniques / 4.7.2:
Optimizing the Injection Vector / 4.7.3:
The Location of the Payload / 4.8:
Direct Jump (Guessing Offsets) / 4.8.1:
Blind Return / 4.8.2:
Pop Return / 4.8.3:
No Operation Sled / 4.8.4:
Call Register / 4.8.5:
Push Return / 4.8.6:
Calculating Offset / 4.8.7:
Fundamental of Reverse Engineering / 4.9:
Anti-Reversing Method / 5.0:
Anti Disassembly / 5.2.1:
Linear Sweep Disassembler / 5.2.1.1:
Recursive Traversal Disassembler / 5.2.1.2:
Evasion of Disassemble / 5.2.1.3:
Self Modifying Code / 5.2.2:
Virtual Machine Obfuscation / 5.2.3:
Anti Debugging Techniques / 5.3:
BreakPoints / 5.3.1:
Software Breakpoint / 5.3.1.1:
Hardware Breakpoint / 5.3.1.2:
Detecting Hardware BreakPoint / 5.3.1.3:
Virtual Machine Detection / 5.4:
Checking Fingerprint Inside Memory, File System and Registry / 5.4.1:
Checking System Tables / 5.4.2:
Checking Processor Instruction Set / 5.4.3:
Unpacking / 5.5:
Manual Unpacking of Software / 5.5.1:
Finding an Original Entry Point of an Executable / 5.5.1.1:
Taking Memory Dump / 5.5.1.2:
Import Table Reconstruction / 5.5.1.3:
Import Redirection and Code emulation / 5.5.1.4:
Appendix / 5.6:
Index
Assembly Language
Introduction / 1.0:
Registers / 1.1:
19.

電子ブック

EB
Abhishek Singh., Abhishek Singh, Baibhav Singh
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Assembly Language
Introduction / 1.0:
Registers / 1.1:
General Purpose Register / 1.1.1:
FLAGS Register / 1.1.2:
80x86 Instruction Format / 1.2:
Instruction Prefix / 1.2.1:
Lock and Repeat Prefixes / 1.2.2:
Segment Override Prefixes / 1.2.3:
Opcode / 1.2.4:
Instructions / 1.3:
Basic Instructions / 1.3.1:
Floating Point Instruction / 1.3.2:
Stack Setup / 1.4:
Passing Parameters in C to the Procedure / 1.4.1:
Local Data Space on the Stack / 1.4.2:
Calling Conventions / 1.5:
cdecl calling convention / 1.5.1:
fastcall calling convention / 1.5.2:
stdcall calling convention / 1.5.3:
thiscall / 1.5.4:
Data Constructs / 1.6:
Global Variables / 1.6.1:
Local Variables / 1.6.2:
Imported Variables / 1.6.3:
Thread Local Storage (TLS) / 1.6.5:
Executable Data Section / 1.6.6:
Representation of Arithmetic Operations in Assembly / 1.7:
Multiplication / 1.7.1:
Division / 1.7.2:
Modulo / 1.7.3:
Representation of Data Structure in Assembly / 1.8:
Representation of Array in Assembly / 1.8.1:
Representation of Linked List in Assembly / 1.8.2:
Virtual Function Call in Assembly / 1.9:
Representation of classes in Assembly / 1.9.1:
Conclusion / 1.10:
Fundamental of Windows
Memory Management / 2.0:
Virtual Memory Management / 2.1.1:
Virtual Memory Management in Windows NT / 2.1.1.1:
Impact of Hooking / 2.1.1.2:
Segmented Memory Management / 2.1.2:
Paged Memory Management / 2.1.3:
Kernel Memory and User Memory / 2.2:
Kernel Memory Space / 2.2.1:
Section Object / 2.2.2:
Virtual Address Descriptor / 2.3:
User Mode Address Space / 2.3.1:
Memory Management in Windows / 2.3.2:
Objects and Handles / 2.3.3:
Named Objects / 2.3.4:
Processes and Threads / 2.4:
Context Switching / 2.4.1:
Context Switches and Mode Switches / 2.4.1.1:
Synchronization Objects / 2.4.2:
Critical Section / 2.4.2.1:
Mutex / 2.4.2.2:
Semaphore / 2.4.2.3:
Event / 2.4.2.4:
Metered Section / 2.4.2.5:
Process Initialization Sequence / 2.5:
Application Programming Interface / 2.5.1:
Reversing Windows NT / 2.6:
ExpEchoPoolCalls / 2.6.1:
ObpShowAllocAndFree / 2.6.2:
LpcpTraceMessages / 2.6.3:
MmDebug / 2.6.4:
NtGlobalFlag / 2.6.5:
SepDumpSD / 2.6.6:
CmLogLevel and CmLogSelect / 2.6.7:
Security Features in Vista / 2.7:
Address Space Layout Randomization (ASLR) / 2.7.1:
Stack Randomization / 2.7.2:
Heap Defenses / 2.7.3:
NX / 2.7.4:
/GS / 2.7.5:
Pointer Encoding / 2.7.6:
Cryptographic API in Windows Vista / 2.7.7:
Crypto-Agility / 2.7.8:
CryptoAgility in CNG / 2.7.9:
Algorithm Providers / 2.7.10:
Random Number Generator / 2.7.11:
Hash Functions / 2.7.12:
Symmetric Encryption / 2.7.13:
Asymmetric Encryption / 2.7.14:
Signatures and Verification / 2.7.15:
Portable Executable File Format / 2.8:
PE file Format / 3.0:
Import Address Table / 3.2:
Executable and Linking Format / 3.3:
ELF Header / 3.3.1:
The Program Header Table / 3.3.2:
Reversing Binaries for Identifying Vulnerabilities / 3.4:
Stack Overflow / 4.0:
CAN-2002-1123 Microsoft SQL Server 'Hello' Authentication Buffer Overflow" / 4.1.1:
CAN-2004-0399 Exim Buffer Overflow / 4.1.2:
Stack Checking / 4.1.3:
Off-by-One Overflow / 4.2:
OpenBSD 2.7 FTP Daemon Off-by-One / 4.2.1:
Non-Executable Memory / 4.2.3:
Heap Overflows / 4.3:
Heap Based Overflows / 4.3.1:
Integer Overflows / 4.4:
Types Integer Overflow / 4.4.1:
CAN-2004-0417 CVS Max dotdot Protocol Command Integer Overflow / 4.4.2:
Format String / 4.5:
Format String Vulnerability / 4.5.1:
Format String Denial of Service Attack / 4.5.2:
Format String Vulnerability Reading Attack / 4.5.3:
SEH Structure Exception Handler / 4.6:
Exploiting the SEH / 4.6.1:
Writing Exploits General Concepts / 4.7:
Stack Overflow Exploits / 4.7.1:
Injection Techniques / 4.7.2:
Optimizing the Injection Vector / 4.7.3:
The Location of the Payload / 4.8:
Direct Jump (Guessing Offsets) / 4.8.1:
Blind Return / 4.8.2:
Pop Return / 4.8.3:
No Operation Sled / 4.8.4:
Call Register / 4.8.5:
Push Return / 4.8.6:
Calculating Offset / 4.8.7:
Fundamental of Reverse Engineering / 4.9:
Anti-Reversing Method / 5.0:
Anti Disassembly / 5.2.1:
Linear Sweep Disassembler / 5.2.1.1:
Recursive Traversal Disassembler / 5.2.1.2:
Evasion of Disassemble / 5.2.1.3:
Self Modifying Code / 5.2.2:
Virtual Machine Obfuscation / 5.2.3:
Anti Debugging Techniques / 5.3:
BreakPoints / 5.3.1:
Software Breakpoint / 5.3.1.1:
Hardware Breakpoint / 5.3.1.2:
Detecting Hardware BreakPoint / 5.3.1.3:
Virtual Machine Detection / 5.4:
Checking Fingerprint Inside Memory, File System and Registry / 5.4.1:
Checking System Tables / 5.4.2:
Checking Processor Instruction Set / 5.4.3:
Unpacking / 5.5:
Manual Unpacking of Software / 5.5.1:
Finding an Original Entry Point of an Executable / 5.5.1.1:
Taking Memory Dump / 5.5.1.2:
Import Table Reconstruction / 5.5.1.3:
Import Redirection and Code emulation / 5.5.1.4:
Appendix / 5.6:
Index
Assembly Language
Introduction / 1.0:
Registers / 1.1:
20.

電子ブック

EB
Joakim Nivre
出版情報: SpringerLink Books - AutoHoldings , Springer Netherlands, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Inductive Dependency Parsing / 1.1:
The Need for Robust Disambiguation / 1.2:
Outline of the Book / 1.3:
Natural Language Parsing / 2:
Syntactic Representations / 2.1:
Two Notions of Parsing / 2.2:
Grammar Parsing / 2.2.1:
Text Parsing / 2.2.2:
Competence and Performance / 2.2.3:
Methods for Text Parsing / 2.3:
Grammar-Driven Text Parsing / 2.3.1:
Data-Driven Text Parsing / 2.3.2:
Converging Approaches / 2.3.3:
Evaluation Criteria / 2.3.4:
Robustness / 2.4.1:
Disambiguation / 2.4.2:
Accuracy / 2.4.3:
Efficiency / 2.4.4:
Dependency Parsing / 3:
Dependency Grammar / 3.1:
The Notion of Dependency / 3.1.1:
Varieties of Dependency Grammar / 3.1.2:
Parsing with Dependency Representations / 3.2:
Grammar-Driven Dependency Parsing / 3.2.1:
Data-Driven Dependency Parsing / 3.2.2:
The Case for Dependency Parsing / 3.2.3:
A Framework for Dependency Parsing / 3.3:
Texts, Sentences and Tokens / 3.3.1:
Dependency Graphs / 3.3.2:
Parsing Algorithm / 3.3.3:
Configurations / 3.4.1:
Transitions / 3.4.2:
Deterministic Parsing / 3.4.3:
Algorithm Analysis / 3.4.4:
Evaluation Criteria Revisited / 3.4.5:
A Framework for Inductive Dependency Parsing / 4:
Inductive Inference / 4.1.1:
History-Based Models / 4.1.3:
Parsing Methods / 4.1.4:
Learning Methods / 4.1.5:
Oracle Parsing / 4.1.6:
Features and Models / 4.2:
Feature Functions / 4.2.1:
Static Features / 4.2.2:
Dynamic Features / 4.2.3:
Feature Models / 4.2.4:
Memory-Based Learning / 4.3:
Memory-Based Learning and Classification / 4.3.1:
Learning Algorithm Parameters / 4.3.2:
Memory-Based Language Processing / 4.3.3:
MaltParser / 4.4:
Architecture / 4.4.1:
Implementation / 4.4.2:
Treebank Parsing / 5:
Treebanks and Parsing / 5.1:
Treebank Evaluation / 5.1.1:
Treebank Learning / 5.1.2:
Treebanks for Dependency Parsing / 5.1.3:
Experimental Methodology / 5.2:
Treebank Data / 5.2.1:
Models and Algorithms / 5.2.2:
Evaluation / 5.2.3:
Feature Model Parameters / 5.3:
Part-of-Speech Context / 5.3.1:
Dependency Structure / 5.3.2:
Lexicalization / 5.3.3:
Learning Curves / 5.3.4:
Neighbor Space and Distance Metric / 5.4:
Weighting Schemes / 5.4.2:
Final Evaluation / 5.5:
Accuracy and Efficiency / 5.5.1:
Related Work / 5.5.2:
Error Analysis / 5.5.3:
Conclusion / 6:
Main Contributions / 6.1:
Future Directions / 6.2:
References
Index
Introduction / 1:
Inductive Dependency Parsing / 1.1:
The Need for Robust Disambiguation / 1.2:
21.

電子ブック

EB
Jin Zhang
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
Scientific visualization and information visualization / 1.1.2:
Information retrieval / 1.2:
Browsing vs. query searching / 1.2.1:
Information at micro-level and macro-level / 1.2.2:
Spatial Characteristics of information space / 1.2.3:
Spatial characteristics of browsing / 1.2.4:
Perceptual and cognitive perspectives of visualization / 1.3:
Perceptual perspective / 1.3.1:
Cognitive perspective / 1.3.2:
Visualization for information retrieval / 1.4:
Rationale / 1.4.1:
Three information retrieval visualization paradigms / 1.4.2:
Procedures of establishing an information retrieval visualization model / 1.4.3:
Summary / 1.5:
Information Retrieval Preliminaries / Chapter 2:
Vector space model / 2.1:
Term weighting methods / 2.2:
Stop words / 2.2.1:
Inverse document frequency / 2.2.2:
The Salton term weighting method / 2.2.3:
Another term weighting method / 2.2.4:
Probability term weighting method / 2.2.5:
Similarity measures / 2.3:
Inner product similarity measure / 2.3.1:
Dice co-efficient similarity measure / 2.3.2:
The Jaccard co-efficient similarity measure / 2.3.3:
Overlap co-efficient similarity measure / 2.3.4:
Cosine similarity measure / 2.3.5:
Distance similarity measure / 2.3.6:
Angle-distance integrated similarity measure / 2.3.7:
The Pearson r correlation measure / 2.3.8:
Information retrieval (evaluation) models / 2.4:
Direction-based retrieval (evaluation) model / 2.4.1:
Distance-based retrieval (evaluation) model / 2.4.2:
Ellipse retrieval (evaluation) model / 2.4.3:
Conjunction retrieval (evaluation) model / 2.4.4:
Disjunction evaluation model / 2.4.5:
The Cassini oval retrieval (evaluation) model / 2.4.6:
Clustering algorithms / 2.5:
Non-hierarchical clustering algorithm / 2.5.1:
Hierarchical clustering algorithm / 2.5.2:
Evaluation of retrieval results / 2.6:
Visualization Models for Multiple Reference Points / 2.7:
Multiple references points / 3.1:
Model for fixed multiple reference points / 3.2:
Models for movable multiple reference points / 3.3:
Description of the original VIBE algorithm / 3.3.1:
Discussions about the model / 3.3.2:
Model for automatic reference point rotation / 3.4:
Definition of the visual space / 3.4.1:
Rotation of a reference point / 3.4.2:
Implication of information retrieval / 3.5:
Euclidean Spatial Characteristic Based Visualization Models / 3.6:
Euclidean space and its characteristics / 4.1:
Introduction to the information retrieval evaluation models / 4.2:
The distance-angel-based visualization model / 4.3:
The visual space definition / 4.3.1:
Visualization for information retrieval evaluation models / 4.3.2:
The angle-angle-based visualization model / 4.4:
The distance-distance-based visualization model / 4.4.1:
Kohonen Self-Organizing Map-An Artificial Neural Network / 4.5.1:
Introduction to neural networks / 5.1:
Definition of neural network / 5.1.1:
Characteristics and structures of neuron network / 5.1.2:
Kohonen self-organizing maps / 5.2:
Kohonen self-organizing map structures / 5.2.1:
Learning processing of the SOM algorithm / 5.2.2:
Feature map labeling / 5.2.3:
The SOM algorithm description / 5.2.4:
Implication of the SOM in information retrieval / 5.3:
Pathfinder Associative Network / 5.4:
Pathfinder associative network properties and descriptions / 6.1:
Definitions of concepts and explanations / 6.1.1:
The algorithm description / 6.1.2:
Graph layout method / 6.1.3:
Implications on information retrieval / 6.2:
Author co-citation analysis / 6.2.1:
Term associative network / 6.2.2:
Hyperlink / 6.2.3:
Search in Pathfinder associative networks / 6.2.4:
Multidimensional Scaling / 6.3:
MDS analysis method descriptions / 7.1:
Classical MDS / 7.1.1:
Non-metric MDS / 7.1.2:
Metric MDS / 7.1.3:
Implications of MDS techniques for information retrieval / 7.2:
Definitions of displayed objects and proximity between objects / 7.2.1:
Exploration in a MDS display space / 7.2.2:
Discussion / 7.2.3:
Internet Information Visualization / 7.3:
Introduction / 8.1:
Internet characteristics / 8.1.1:
Internet information organization and presentation methods / 8.1.2:
Internet information utilization / 8.1.3:
Challenges of the internet / 8.1.4:
Internet information visualization / 8.2:
Visualization of internet information structure / 8.2.1:
Internet information seeking visualization / 8.2.2:
Visualization of web traffic information / 8.2.3:
Discussion history visualization / 8.2.4:
Ambiguity in Information Visualization / 8.3:
Ambiguity and its implication in information visualization / 9.1:
Reason of ambiguity in information visualization / 9.1.1:
Implication of ambiguity for information visualization / 9.1.2:
Ambiguity analysis in information retrieval visualization models / 9.2:
Ambiguity in the Euclidean spatial characteristic based information models / 9.2.1:
Ambiguity in the multiple reference point based information visualization models / 9.2.2:
Ambiguity in the Pathfinder network / 9.2.3:
Ambiguity in SOM / 9.2.4:
Ambiguity in MDS / 9.2.5:
The Implication of Metaphors in Information Visualization / 9.3:
Definition, basic elements, and characteristics of a metaphor / 10.1:
Cognitive foundation of metaphors / 10.2:
Mental models, metaphors, and human computer interaction / 10.3:
Metaphors in human computer interaction / 10.3.1:
Mental models / 10.3.2:
Mental models in HCI / 10.3.3:
Metaphors in information visualization retrieval / 10.4:
Rationales for using metaphors / 10.4.1:
Metaphorical information retrieval visualization environments / 10.4.2:
Procedures and principles for metaphor application / 10.5:
Procedure for metaphor application / 10.5.1:
Guides for designing a good metaphorical visual information retrieval environment / 10.5.2:
Benchmarks and Evaluation Criteria for Information Retrieval Visualization / 10.6:
Information retrieval visualization evaluation / 11.1:
Benchmarks and evaluation standards / 11.2:
Factors affecting evaluation standards / 11.2.1:
Principles for developing evaluation benchmarks / 11.2.2:
Four proposed categories for evaluation criteria / 11.2.3:
Descriptions of proposed benchmarks / 11.2.4:
Afterthoughts / 11.3:
Comparisons of the introduced visualization models / 12.1:
Issues and challenges / 12.3:
Bibliography / 12.4:
Index
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
22.

電子ブック

EB
Jin Zhang
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
Scientific visualization and information visualization / 1.1.2:
Information retrieval / 1.2:
Browsing vs. query searching / 1.2.1:
Information at micro-level and macro-level / 1.2.2:
Spatial Characteristics of information space / 1.2.3:
Spatial characteristics of browsing / 1.2.4:
Perceptual and cognitive perspectives of visualization / 1.3:
Perceptual perspective / 1.3.1:
Cognitive perspective / 1.3.2:
Visualization for information retrieval / 1.4:
Rationale / 1.4.1:
Three information retrieval visualization paradigms / 1.4.2:
Procedures of establishing an information retrieval visualization model / 1.4.3:
Summary / 1.5:
Information Retrieval Preliminaries / Chapter 2:
Vector space model / 2.1:
Term weighting methods / 2.2:
Stop words / 2.2.1:
Inverse document frequency / 2.2.2:
The Salton term weighting method / 2.2.3:
Another term weighting method / 2.2.4:
Probability term weighting method / 2.2.5:
Similarity measures / 2.3:
Inner product similarity measure / 2.3.1:
Dice co-efficient similarity measure / 2.3.2:
The Jaccard co-efficient similarity measure / 2.3.3:
Overlap co-efficient similarity measure / 2.3.4:
Cosine similarity measure / 2.3.5:
Distance similarity measure / 2.3.6:
Angle-distance integrated similarity measure / 2.3.7:
The Pearson r correlation measure / 2.3.8:
Information retrieval (evaluation) models / 2.4:
Direction-based retrieval (evaluation) model / 2.4.1:
Distance-based retrieval (evaluation) model / 2.4.2:
Ellipse retrieval (evaluation) model / 2.4.3:
Conjunction retrieval (evaluation) model / 2.4.4:
Disjunction evaluation model / 2.4.5:
The Cassini oval retrieval (evaluation) model / 2.4.6:
Clustering algorithms / 2.5:
Non-hierarchical clustering algorithm / 2.5.1:
Hierarchical clustering algorithm / 2.5.2:
Evaluation of retrieval results / 2.6:
Visualization Models for Multiple Reference Points / 2.7:
Multiple references points / 3.1:
Model for fixed multiple reference points / 3.2:
Models for movable multiple reference points / 3.3:
Description of the original VIBE algorithm / 3.3.1:
Discussions about the model / 3.3.2:
Model for automatic reference point rotation / 3.4:
Definition of the visual space / 3.4.1:
Rotation of a reference point / 3.4.2:
Implication of information retrieval / 3.5:
Euclidean Spatial Characteristic Based Visualization Models / 3.6:
Euclidean space and its characteristics / 4.1:
Introduction to the information retrieval evaluation models / 4.2:
The distance-angel-based visualization model / 4.3:
The visual space definition / 4.3.1:
Visualization for information retrieval evaluation models / 4.3.2:
The angle-angle-based visualization model / 4.4:
The distance-distance-based visualization model / 4.4.1:
Kohonen Self-Organizing Map-An Artificial Neural Network / 4.5.1:
Introduction to neural networks / 5.1:
Definition of neural network / 5.1.1:
Characteristics and structures of neuron network / 5.1.2:
Kohonen self-organizing maps / 5.2:
Kohonen self-organizing map structures / 5.2.1:
Learning processing of the SOM algorithm / 5.2.2:
Feature map labeling / 5.2.3:
The SOM algorithm description / 5.2.4:
Implication of the SOM in information retrieval / 5.3:
Pathfinder Associative Network / 5.4:
Pathfinder associative network properties and descriptions / 6.1:
Definitions of concepts and explanations / 6.1.1:
The algorithm description / 6.1.2:
Graph layout method / 6.1.3:
Implications on information retrieval / 6.2:
Author co-citation analysis / 6.2.1:
Term associative network / 6.2.2:
Hyperlink / 6.2.3:
Search in Pathfinder associative networks / 6.2.4:
Multidimensional Scaling / 6.3:
MDS analysis method descriptions / 7.1:
Classical MDS / 7.1.1:
Non-metric MDS / 7.1.2:
Metric MDS / 7.1.3:
Implications of MDS techniques for information retrieval / 7.2:
Definitions of displayed objects and proximity between objects / 7.2.1:
Exploration in a MDS display space / 7.2.2:
Discussion / 7.2.3:
Internet Information Visualization / 7.3:
Introduction / 8.1:
Internet characteristics / 8.1.1:
Internet information organization and presentation methods / 8.1.2:
Internet information utilization / 8.1.3:
Challenges of the internet / 8.1.4:
Internet information visualization / 8.2:
Visualization of internet information structure / 8.2.1:
Internet information seeking visualization / 8.2.2:
Visualization of web traffic information / 8.2.3:
Discussion history visualization / 8.2.4:
Ambiguity in Information Visualization / 8.3:
Ambiguity and its implication in information visualization / 9.1:
Reason of ambiguity in information visualization / 9.1.1:
Implication of ambiguity for information visualization / 9.1.2:
Ambiguity analysis in information retrieval visualization models / 9.2:
Ambiguity in the Euclidean spatial characteristic based information models / 9.2.1:
Ambiguity in the multiple reference point based information visualization models / 9.2.2:
Ambiguity in the Pathfinder network / 9.2.3:
Ambiguity in SOM / 9.2.4:
Ambiguity in MDS / 9.2.5:
The Implication of Metaphors in Information Visualization / 9.3:
Definition, basic elements, and characteristics of a metaphor / 10.1:
Cognitive foundation of metaphors / 10.2:
Mental models, metaphors, and human computer interaction / 10.3:
Metaphors in human computer interaction / 10.3.1:
Mental models / 10.3.2:
Mental models in HCI / 10.3.3:
Metaphors in information visualization retrieval / 10.4:
Rationales for using metaphors / 10.4.1:
Metaphorical information retrieval visualization environments / 10.4.2:
Procedures and principles for metaphor application / 10.5:
Procedure for metaphor application / 10.5.1:
Guides for designing a good metaphorical visual information retrieval environment / 10.5.2:
Benchmarks and Evaluation Criteria for Information Retrieval Visualization / 10.6:
Information retrieval visualization evaluation / 11.1:
Benchmarks and evaluation standards / 11.2:
Factors affecting evaluation standards / 11.2.1:
Principles for developing evaluation benchmarks / 11.2.2:
Four proposed categories for evaluation criteria / 11.2.3:
Descriptions of proposed benchmarks / 11.2.4:
Afterthoughts / 11.3:
Comparisons of the introduced visualization models / 12.1:
Issues and challenges / 12.3:
Bibliography / 12.4:
Index
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
23.

電子ブック

EB
Masao Nagasaki, Atsushi Doi, Andreas Dress, Hiroshi Matsuno, Satoru Miyano, Ayumu Saito, Martin Vingron, Martin Vingron, Gene Myers, Robert Giegerich, Walter Fitch, Pavel A. Pevzner. edited by Andreas Dress
出版情報: Springer eBooks Computer Science , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Introduction / 1:
Intracellular Events / 1.1:
Transcription, Translation, and Regulation / 1.1.1:
Signaling Pathways and Proteins / 1.1.2:
Metabolism and Genes / 1.1.3:
Intracellular Reactions and Pathways / 1.2:
Pathway Databases / 2:
Major Pathway Databases / 2.1:
KEGG / 2.1.1:
BioCyc / 2.1.2:
Ingenuity Pathways Knowledge Base / 2.1.3:
TRANSPATH / 2.1.4:
ResNet / 2.1.5:
Signal Transduction Knowledge Environment (STKE): Database of Cell Signaling / 2.1.6:
Reactome / 2.1.7:
Metabolome.jp / 2.1.8:
Summary and Conclusion / 2.1.9:
Software for Pathway Display / 2.2:
Ingenuity Pathway Analysis (IPA) / 2.2.1:
Pathway Builder / 2.2.2:
Pathway Studio / 2.2.3:
Connections Maps / 2.2.4:
Cytoscape / 2.2.5:
File Formats for Pathways / 2.3:
Gene Ontology / 2.3.1:
PSI MI / 2.3.2:
CellML / 2.3.3:
SBML / 2.3.4:
BioPAX / 2.3.5:
CSML/CSO / 2.3.6:
Pathway Simulation Software / 3:
Simulation Software Backend / 3.1:
Architecture: Deterministic, Probabilistic, or Hybrid? / 3.1.1:
Methods of Pathway Modeling / 3.1.2:
Major Simulation Software Tools / 3.2:
Gepasi/COPASI / 3.2.1:
Virtual Cell / 3.2.2:
Systems Biology Workbench (SBW), Cell Designer, JDesigner / 3.2.3:
Dizzy / 3.2.4:
E-Cell / 3.2.5:
Cell Illustrator / 3.2.6:
Summary / 3.2.7:
Starting Cell Illustrator / 4:
Installing Cell Illustrator / 4.1:
Operating Systems and Hardware Requirements / 4.1.1:
Cell Illustrator Lineup / 4.1.2:
Installing and Running Cell Illustrator / 4.1.3:
License Install / 4.1.4:
Basic Concepts in Cell Illustrator / 4.2:
Basic Concepts / 4.2.1:
Entity / 4.2.2:
Process / 4.2.3:
Connector / 4.2.4:
Rules for Connecting Elements / 4.2.5:
Icons for Elements / 4.2.6:
Editing a Model on Cell Illustrator / 4.3:
Adding Elements / 4.3.1:
Model Editing and Canvas Controls / 4.3.2:
Simulating Models / 4.4:
Simulation Settings / 4.4.1:
Graph Settings / 4.4.2:
Executing Simulation / 4.4.3:
Simulation Parameters and Rules / 4.5:
Creating a Model with Discrete Entity and Process / 4.5.1:
Creating a Model with Continuous Entity and Process / 4.5.2:
Concepts of Discrete and Continuous / 4.5.3:
Pathway Modeling Using Illustrated Elements / 4.6:
Creating Pathway Models Using Cell Illustrator / 4.7:
Degradation / 4.7.1:
Translocation / 4.7.2:
Transcription / 4.7.3:
Binding / 4.7.4:
Dissociation / 4.7.5:
Inhibition / 4.7.6:
Phosphorylation by Enzyme Reaction / 4.7.7:
Conclusion / 4.8:
Pathway Modeling and Simulation / 5:
Modeling Signaling Pathway / 5.1:
Main Players: Ligand and Receptor / 5.1.1:
Modeling EGFR Signaling with EGF Stimulation / 5.1.2:
Modeling Metabolic Pathways / 5.2:
Chemical Equations and Pathway Representations / 5.2.1:
Michaelis-Menten Kinetics and Cell Illustrator Pathway Representation / 5.2.2:
Creating Glycolysis Pathway Model / 5.2.3:
Simulation of Glycolysis Pathway / 5.2.4:
Improving the Model / 5.2.5:
Modeling Gene Regulatory Networks / 5.3:
Biological Clocks and Circadian Rhythms / 5.3.1:
Gene Regulatory Network for Circadian Rhythms in Mice / 5.3.2:
Modeling Circadian Rhythms in Mice / 5.3.3:
Creating Hypothesis by Simulation / 5.3.4:
Computational Platform for Systems Biology / 5.4:
Gene Network of Yeast / 6.1:
Computational Analysis of Gene Network / 6.2:
Displaying Gene Network / 6.2.1:
Layout of Gene Networks / 6.2.2:
Pathway Search Function / 6.2.3:
Extracting Subnetworks / 6.2.4:
Comparing Two Subnetworks / 6.2.5:
Further Functionalities for Systems Biology / 6.3:
Languages for Pathways: CSML 3.0 and CSO / 6.3.1:
SaaS Technology / 6.3.2:
Pathway Parameter Search / 6.3.3:
Much Faster Simulation / 6.3.4:
Exporting Pathway Models to Programming Languages / 6.3.5:
Pathway Layout Algorithms / 6.3.6:
Pathway Database Management System / 6.3.7:
More Visually: Automatic Generation of Icons / 6.3.8:
Bibliographic Notes
Index
Foreword
Preface
Introduction / 1:
24.

電子ブック

EB
Masao Nagasaki, Atsushi Doi, Andreas Dress, Hiroshi Matsuno, Satoru Miyano, Ayumu Saito, Martin Vingron, Martin Vingron, Gene Myers, Robert Giegerich, Walter Fitch, Pavel A. Pevzner. edited by Andreas Dress, Gene Myers
出版情報: SpringerLink Books - AutoHoldings , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Introduction / 1:
Intracellular Events / 1.1:
Transcription, Translation, and Regulation / 1.1.1:
Signaling Pathways and Proteins / 1.1.2:
Metabolism and Genes / 1.1.3:
Intracellular Reactions and Pathways / 1.2:
Pathway Databases / 2:
Major Pathway Databases / 2.1:
KEGG / 2.1.1:
BioCyc / 2.1.2:
Ingenuity Pathways Knowledge Base / 2.1.3:
TRANSPATH / 2.1.4:
ResNet / 2.1.5:
Signal Transduction Knowledge Environment (STKE): Database of Cell Signaling / 2.1.6:
Reactome / 2.1.7:
Metabolome.jp / 2.1.8:
Summary and Conclusion / 2.1.9:
Software for Pathway Display / 2.2:
Ingenuity Pathway Analysis (IPA) / 2.2.1:
Pathway Builder / 2.2.2:
Pathway Studio / 2.2.3:
Connections Maps / 2.2.4:
Cytoscape / 2.2.5:
File Formats for Pathways / 2.3:
Gene Ontology / 2.3.1:
PSI MI / 2.3.2:
CellML / 2.3.3:
SBML / 2.3.4:
BioPAX / 2.3.5:
CSML/CSO / 2.3.6:
Pathway Simulation Software / 3:
Simulation Software Backend / 3.1:
Architecture: Deterministic, Probabilistic, or Hybrid? / 3.1.1:
Methods of Pathway Modeling / 3.1.2:
Major Simulation Software Tools / 3.2:
Gepasi/COPASI / 3.2.1:
Virtual Cell / 3.2.2:
Systems Biology Workbench (SBW), Cell Designer, JDesigner / 3.2.3:
Dizzy / 3.2.4:
E-Cell / 3.2.5:
Cell Illustrator / 3.2.6:
Summary / 3.2.7:
Starting Cell Illustrator / 4:
Installing Cell Illustrator / 4.1:
Operating Systems and Hardware Requirements / 4.1.1:
Cell Illustrator Lineup / 4.1.2:
Installing and Running Cell Illustrator / 4.1.3:
License Install / 4.1.4:
Basic Concepts in Cell Illustrator / 4.2:
Basic Concepts / 4.2.1:
Entity / 4.2.2:
Process / 4.2.3:
Connector / 4.2.4:
Rules for Connecting Elements / 4.2.5:
Icons for Elements / 4.2.6:
Editing a Model on Cell Illustrator / 4.3:
Adding Elements / 4.3.1:
Model Editing and Canvas Controls / 4.3.2:
Simulating Models / 4.4:
Simulation Settings / 4.4.1:
Graph Settings / 4.4.2:
Executing Simulation / 4.4.3:
Simulation Parameters and Rules / 4.5:
Creating a Model with Discrete Entity and Process / 4.5.1:
Creating a Model with Continuous Entity and Process / 4.5.2:
Concepts of Discrete and Continuous / 4.5.3:
Pathway Modeling Using Illustrated Elements / 4.6:
Creating Pathway Models Using Cell Illustrator / 4.7:
Degradation / 4.7.1:
Translocation / 4.7.2:
Transcription / 4.7.3:
Binding / 4.7.4:
Dissociation / 4.7.5:
Inhibition / 4.7.6:
Phosphorylation by Enzyme Reaction / 4.7.7:
Conclusion / 4.8:
Pathway Modeling and Simulation / 5:
Modeling Signaling Pathway / 5.1:
Main Players: Ligand and Receptor / 5.1.1:
Modeling EGFR Signaling with EGF Stimulation / 5.1.2:
Modeling Metabolic Pathways / 5.2:
Chemical Equations and Pathway Representations / 5.2.1:
Michaelis-Menten Kinetics and Cell Illustrator Pathway Representation / 5.2.2:
Creating Glycolysis Pathway Model / 5.2.3:
Simulation of Glycolysis Pathway / 5.2.4:
Improving the Model / 5.2.5:
Modeling Gene Regulatory Networks / 5.3:
Biological Clocks and Circadian Rhythms / 5.3.1:
Gene Regulatory Network for Circadian Rhythms in Mice / 5.3.2:
Modeling Circadian Rhythms in Mice / 5.3.3:
Creating Hypothesis by Simulation / 5.3.4:
Computational Platform for Systems Biology / 5.4:
Gene Network of Yeast / 6.1:
Computational Analysis of Gene Network / 6.2:
Displaying Gene Network / 6.2.1:
Layout of Gene Networks / 6.2.2:
Pathway Search Function / 6.2.3:
Extracting Subnetworks / 6.2.4:
Comparing Two Subnetworks / 6.2.5:
Further Functionalities for Systems Biology / 6.3:
Languages for Pathways: CSML 3.0 and CSO / 6.3.1:
SaaS Technology / 6.3.2:
Pathway Parameter Search / 6.3.3:
Much Faster Simulation / 6.3.4:
Exporting Pathway Models to Programming Languages / 6.3.5:
Pathway Layout Algorithms / 6.3.6:
Pathway Database Management System / 6.3.7:
More Visually: Automatic Generation of Icons / 6.3.8:
Bibliographic Notes
Index
Foreword
Preface
Introduction / 1:
25.

電子ブック

EB
Ben Liblit, David Hutchison, Takeo Kanade, Association for Computing Machinery.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Perfect, or Close Enough / 1.1:
Automatic Failure Reporting / 1.2:
The Next Step Forward / 1.3:
Cooperative Bug Isolation / 1.4:
Instrumentation Framework / 2:
Basic Instrumentation Strategy / 2.1:
Sampling the Bernoulli Way / 2.1.1:
From Blocks to Functions / 2.1.2:
Interprocedural Issues / 2.1.3:
Instrumentation Schemes for Distributed Debugging / 2.2:
Issues in Remote Sampling / 2.2.1:
Counter-Based Instrumentation Schemes / 2.2.2:
Additional Instrumentation Schemes / 2.2.3:
Performance and Optimizations / 2.3:
Static Branch Prediction / 2.3.1:
Weightless Functions / 2.3.2:
Empty and Singleton Regions / 2.3.3:
Local Countdown Caching / 2.3.4:
Random Countdown Generation / 2.3.5:
Path Balancing / 2.3.6:
Statically Selective Sampling / 2.3.7:
Optimization Recap / 2.3.8:
Adaptive Sampling / 2.4:
Nonuniformity Via Multiple Countdowns / 2.4.1:
Nonuniformity Via Non-Unit Site Weights / 2.4.2:
Policy Notes / 2.4.3:
Realistic Sampling Rates / 2.5:
Practical Considerations / 3:
Native Compiler Integration / 3.1:
Static Site Information / 3.1.1:
Libraries and Plugins / 3.2:
Threads / 3.3:
Next-Sample Countdown / 3.3.1:
Predicate Counters / 3.3.2:
Compilation Unit Registry and Report File / 3.3.3:
Time Stamp Clock / 3.3.4:
Performance Evaluation / 3.3.5:
Privacy and Security / 3.4:
User Interaction / 3.5:
Status of the Public Deployment / 3.6:
Resource Requirements / 3.6.1:
Reporting Trends / 3.6.2:
Techniques for Statistical Debugging / 4:
Notation and Terminology / 4.1:
Predicate Elimination / 4.2:
Instrumentation Strategy / 4.2.1:
Elimination Strategies / 4.2.2:
Data Collection and Analysis / 4.2.3:
Refinement over time / 4.2.4:
Performance Impact / 4.2.5:
Limitations and Insights / 4.2.6:
Regularized Logistic Regression / 4.3:
Crash Prediction Using Logistic Regression / 4.3.1:
Moss: A Multiple-Bug Challenge / 4.3.2:
Nonuniform Sampling / 4.4.1:
Analysis Results / 4.4.2:
Iterative Bug Isolation and Elimination / 4.5:
Increase Scores / 4.5.1:
Statistical Interpretation / 4.5.2:
Balancing Specificity and Sensitivity / 4.5.3:
Redundancy Elimination / 4.5.4:
Case Studies / 4.6:
Moss / 4.6.1:
CCRYPT / 4.6.2:
BC / 4.6.3:
EXIF / 4.6.4:
Rhythmbox / 4.6.5:
Related Work / 5:
Static Analysis / 5.1:
Profiling and Tracing / 5.2:
Dynamic Analysis / 5.3:
Conclusion / 6:
References
Introduction / 1:
Perfect, or Close Enough / 1.1:
Automatic Failure Reporting / 1.2:
26.

電子ブック

EB
Ben Liblit, David Hutchison, Takeo Kanade, Association for Computing Machinery.
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Perfect, or Close Enough / 1.1:
Automatic Failure Reporting / 1.2:
The Next Step Forward / 1.3:
Cooperative Bug Isolation / 1.4:
Instrumentation Framework / 2:
Basic Instrumentation Strategy / 2.1:
Sampling the Bernoulli Way / 2.1.1:
From Blocks to Functions / 2.1.2:
Interprocedural Issues / 2.1.3:
Instrumentation Schemes for Distributed Debugging / 2.2:
Issues in Remote Sampling / 2.2.1:
Counter-Based Instrumentation Schemes / 2.2.2:
Additional Instrumentation Schemes / 2.2.3:
Performance and Optimizations / 2.3:
Static Branch Prediction / 2.3.1:
Weightless Functions / 2.3.2:
Empty and Singleton Regions / 2.3.3:
Local Countdown Caching / 2.3.4:
Random Countdown Generation / 2.3.5:
Path Balancing / 2.3.6:
Statically Selective Sampling / 2.3.7:
Optimization Recap / 2.3.8:
Adaptive Sampling / 2.4:
Nonuniformity Via Multiple Countdowns / 2.4.1:
Nonuniformity Via Non-Unit Site Weights / 2.4.2:
Policy Notes / 2.4.3:
Realistic Sampling Rates / 2.5:
Practical Considerations / 3:
Native Compiler Integration / 3.1:
Static Site Information / 3.1.1:
Libraries and Plugins / 3.2:
Threads / 3.3:
Next-Sample Countdown / 3.3.1:
Predicate Counters / 3.3.2:
Compilation Unit Registry and Report File / 3.3.3:
Time Stamp Clock / 3.3.4:
Performance Evaluation / 3.3.5:
Privacy and Security / 3.4:
User Interaction / 3.5:
Status of the Public Deployment / 3.6:
Resource Requirements / 3.6.1:
Reporting Trends / 3.6.2:
Techniques for Statistical Debugging / 4:
Notation and Terminology / 4.1:
Predicate Elimination / 4.2:
Instrumentation Strategy / 4.2.1:
Elimination Strategies / 4.2.2:
Data Collection and Analysis / 4.2.3:
Refinement over time / 4.2.4:
Performance Impact / 4.2.5:
Limitations and Insights / 4.2.6:
Regularized Logistic Regression / 4.3:
Crash Prediction Using Logistic Regression / 4.3.1:
Moss: A Multiple-Bug Challenge / 4.3.2:
Nonuniform Sampling / 4.4.1:
Analysis Results / 4.4.2:
Iterative Bug Isolation and Elimination / 4.5:
Increase Scores / 4.5.1:
Statistical Interpretation / 4.5.2:
Balancing Specificity and Sensitivity / 4.5.3:
Redundancy Elimination / 4.5.4:
Case Studies / 4.6:
Moss / 4.6.1:
CCRYPT / 4.6.2:
BC / 4.6.3:
EXIF / 4.6.4:
Rhythmbox / 4.6.5:
Related Work / 5:
Static Analysis / 5.1:
Profiling and Tracing / 5.2:
Dynamic Analysis / 5.3:
Conclusion / 6:
References
Introduction / 1:
Perfect, or Close Enough / 1.1:
Automatic Failure Reporting / 1.2:
27.

電子ブック

EB
Gian Piero Zarri
出版情報: Springer eBooks Computer Science , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Basic Principles / 1:
Narrative Information in an NKRL Context / 1.1:
Narratology and NKRL / 1.1.1:
The Notion of "Event" in an NKRL Context / 1.1.2:
Knowledge Representation and NKRL / 1.2:
"Standard" Ontologies and the "n-ary" Problem / 1.2.1:
A Plain "n-ary" Solution and Some Related Problems / 1.2.2:
In the Guise of Winding Up / 1.3:
The Knowledge Representation Strategy / 2:
Architecture of NKRL: the Four "Components" / 2.1:
The Data Structures of the Four Components / 2.2:
Definitional/Enumerative Data Structures / 2.2.1:
Descriptive/Factual Data Structures / 2.2.2:
Second-order Structures / 2.3:
The Completive Construction / 2.3.1:
Binding Occurrences / 2.3.2:
The Semantic and Ontological Contents / 2.4:
The Organization of the HClass Hierarchy / 3.1:
General Notions about Ontologies / 3.1.1:
HClass Architecture / 3.1.2:
The Organization of the HTemp Hierarchy / 3.2:
Recent Examples of "Structured" Ontological Systems / 3.2.1:
Main Features of Some Specific HTemp Structures / 3.2.2:
The Query and Inference Procedures / 3.3:
"Search Patterns" and Low-level Inferences / 4.1:
The Algorithmic Structure of Fum / 4.1.1:
Temporal Information and Indexing / 4.1.2:
High-level Inference Procedures / 4.2:
General Remarks about Some Reasoning Paradigms / 4.2.1:
Hypothesis Rules / 4.2.2:
Transformation Rules / 4.2.3:
Integrating the Two Main Inferencing Modes of NKRL / 4.2.4:
Inference Rules and Internet Filtering / 4.2.5:
Conclusion / 4.3:
Technological Enhancements / 5.1:
Theoretical Enhancements / 5.2:
Appendix A
Appendix B
References
Index
Basic Principles / 1:
Narrative Information in an NKRL Context / 1.1:
Narratology and NKRL / 1.1.1:
28.

電子ブック

EB
Gian Piero Zarri
出版情報: SpringerLink Books - AutoHoldings , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Basic Principles / 1:
Narrative Information in an NKRL Context / 1.1:
Narratology and NKRL / 1.1.1:
The Notion of "Event" in an NKRL Context / 1.1.2:
Knowledge Representation and NKRL / 1.2:
"Standard" Ontologies and the "n-ary" Problem / 1.2.1:
A Plain "n-ary" Solution and Some Related Problems / 1.2.2:
In the Guise of Winding Up / 1.3:
The Knowledge Representation Strategy / 2:
Architecture of NKRL: the Four "Components" / 2.1:
The Data Structures of the Four Components / 2.2:
Definitional/Enumerative Data Structures / 2.2.1:
Descriptive/Factual Data Structures / 2.2.2:
Second-order Structures / 2.3:
The Completive Construction / 2.3.1:
Binding Occurrences / 2.3.2:
The Semantic and Ontological Contents / 2.4:
The Organization of the HClass Hierarchy / 3.1:
General Notions about Ontologies / 3.1.1:
HClass Architecture / 3.1.2:
The Organization of the HTemp Hierarchy / 3.2:
Recent Examples of "Structured" Ontological Systems / 3.2.1:
Main Features of Some Specific HTemp Structures / 3.2.2:
The Query and Inference Procedures / 3.3:
"Search Patterns" and Low-level Inferences / 4.1:
The Algorithmic Structure of Fum / 4.1.1:
Temporal Information and Indexing / 4.1.2:
High-level Inference Procedures / 4.2:
General Remarks about Some Reasoning Paradigms / 4.2.1:
Hypothesis Rules / 4.2.2:
Transformation Rules / 4.2.3:
Integrating the Two Main Inferencing Modes of NKRL / 4.2.4:
Inference Rules and Internet Filtering / 4.2.5:
Conclusion / 4.3:
Technological Enhancements / 5.1:
Theoretical Enhancements / 5.2:
Appendix A
Appendix B
References
Index
Basic Principles / 1:
Narrative Information in an NKRL Context / 1.1:
Narratology and NKRL / 1.1.1:
29.

電子ブック

EB
Kathryn E. Merrick, Mary Lou Maher
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Non-Player Characters and Reinforcement Learning / Part I:
Non-Player Characters in Multiuser Games / 1:
Types of Multiuser Games / 1.1:
Massively Multiplayer Online Role-Playing Games / 1.1.1:
Multiuser Simulation Games / 1.1.2:
Open-Ended Virtual Worlds / 1.1.3:
Character Roles in Multiuser Games / 1.2:
Existing Artificial Intelligence Techniques for Non-Player Characters in Multiuser Games / 1.3:
Reflexive Agents / 1.3.1:
Learning Agents / 1.3.2:
Evolutionary Agents / 1.3.3:
Smart Terrain / 1.3.4:
Summary / 1.4:
References / 1.5:
Motivation in Natural and Artificial Agents / 2:
Defining Motivation / 2.1:
Biological Theories of Motivation / 2.2:
Drive Theory / 2.2.1:
Motivational State Theory / 2.2.2:
Arousal / 2.2.3:
Cognitive Theories of Motivation / 2.3:
Curiosity / 2.3.1:
Operant Theory / 2.3.2:
Incentive / 2.3.3:
Achievement Motivation / 2.3.4:
Attribution Theory / 2.3.5:
Intrinsic Motivation / 2.3.6:
Social Theories of Motivation / 2.4:
Conformity / 2.4.1:
Cultural Effect / 2.4.2:
Evolution / 2.4.3:
Combined Motivation Theories / 2.5:
Maslow's Hierarchy of Needs / 2.5.1:
Existence Relatedness Growth Theory / 2.5.2:
Towards Motivated Reinforcement Learning / 2.6:
Defining Reinforcement Learning / 3.1:
Dynamic Programming / 3.1.1:
Monte Carlo Methods / 3.1.2:
Temporal Difference Learning / 3.1.3:
Reinforcement Learning in Complex Environments / 3.2:
Partially Observable Environments / 3.2.1:
Function Approximation / 3.2.2:
Hierarchical Reinforcement Learning / 3.2.3:
Motivated Reinforcement Learning / 3.3:
Using a Motivation Signal in Addition to a Reward Signal / 3.3.1:
Using a Motivation Signal Instead of a Reward Signal / 3.3.2:
Comparing the Behaviour of Learning Agents / 3.4:
Player Satisfaction / 4.1:
Psychological Flow / 4.1.1:
Structural Flow / 4.1.2:
Formalising Non-Player Character Behaviour / 4.2:
Models of Optimality for Reinforcement Learning / 4.2.1:
Characteristics of Motivated Reinforcement Learning / 4.2.2:
Comparing Motivated Reinforcement Learning Agents / 4.3:
Statistical Model for Identifying Learned Tasks / 4.3.1:
Behavioural Variety / 4.3.2:
Behavioural Complexity / 4.3.3:
Developing Curious Characters Using Motivated Reinforcement Learning / 4.4:
Curiosity, Motivation and Attention Focus / 5:
Agents in Complex, Dynamic Environments / 5.1:
States / 5.1.1:
Actions / 5.1.2:
Reward and Motivation / 5.1.3:
Motivation and Attention Focus / 5.2:
Observations / 5.2.1:
Events / 5.2.2:
Tasks and Task Selection / 5.2.3:
Experience-Based Reward as Cognitive Motivation / 5.2.4:
Arbitration Functions / 5.2.5:
A General Experience-Based Motivation Function / 5.2.6:
Curiosity as Motivation for Support Characters / 5.3:
Curiosity as Interesting Events / 5.3.1:
Curiosity as Interesting and Competence / 5.3.2:
Motivated Reinforcement Learning Agents / 5.4:
A General Motivated Reinforcement Learning Model / 6.1:
Algorithms for Motivated Reinforcement Learning / 6.2:
Motivated Flat Reinforcement Learning / 6.2.1:
Motivated Multioption Reinforcement Learning / 6.2.2:
Motivated Hierarchical Reinforcement Learning / 6.2.3:
Curious Characters in Games / 6.3:
Curious Characters for Multiuser Games / 7:
Motivated Reinforcement Learning for Support Characters in Massively Multiplayer Online Role-Playing Games / 7.1:
Character Behaviour in Small-Scale, Isolated Games Locations / 7.2:
Case Studies of Individual Characters / 7.2.1:
General Trends in Character Behaviour / 7.2.2:
Curious Characters for Games in Complex, Dynamic Environments / 7.3:
Designing Characters That Can Multitask / 8.1:
Designing Characters for Complex Tasks / 8.1.1:
Games That Change While Characters Are Learning / 8.2.1:
Curious Characters for Games in Second Life / 8.3.1:
Motivated Reinforcement Learning in Open-Ended Simulation Games / 9.1:
Game Design / 9.1.1:
Character Design / 9.1.2:
Evaluating Character Behaviour in Response to Game Play Sequences / 9.2:
Discussion / 9.2.1:
Future / 9.3:
Towards the Future / 10:
Using Motivated Reinforcement Learning in Non-Player Characters / 10.1:
Other Gaming Applications for Motivated Reinforcement Learning / 10.2:
Dynamic Difficulty Adjustment / 10.2.1:
Procedural Content Generation / 10.2.2:
Beyond Curiosity / 10.3:
Biological Models of Motivation / 10.3.1:
Cognitive Models of Motivation / 10.3.2:
Social Models of Motivation / 10.3.3:
Combined Models of Motivation / 10.3.4:
New Models of Motivated Learning / 10.4:
Motivated Supervised Learning / 10.4.1:
Motivated Unsupervised Learning / 10.4.2:
Evaluating the Behaviour of Motivated Learning Agents / 10.5:
Concluding Remarks / 10.6:
Index / 10.7:
Non-Player Characters and Reinforcement Learning / Part I:
Non-Player Characters in Multiuser Games / 1:
Types of Multiuser Games / 1.1:
30.

電子ブック

EB
Kathryn E. Merrick, Mary Lou Maher
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Non-Player Characters and Reinforcement Learning / Part I:
Non-Player Characters in Multiuser Games / 1:
Types of Multiuser Games / 1.1:
Massively Multiplayer Online Role-Playing Games / 1.1.1:
Multiuser Simulation Games / 1.1.2:
Open-Ended Virtual Worlds / 1.1.3:
Character Roles in Multiuser Games / 1.2:
Existing Artificial Intelligence Techniques for Non-Player Characters in Multiuser Games / 1.3:
Reflexive Agents / 1.3.1:
Learning Agents / 1.3.2:
Evolutionary Agents / 1.3.3:
Smart Terrain / 1.3.4:
Summary / 1.4:
References / 1.5:
Motivation in Natural and Artificial Agents / 2:
Defining Motivation / 2.1:
Biological Theories of Motivation / 2.2:
Drive Theory / 2.2.1:
Motivational State Theory / 2.2.2:
Arousal / 2.2.3:
Cognitive Theories of Motivation / 2.3:
Curiosity / 2.3.1:
Operant Theory / 2.3.2:
Incentive / 2.3.3:
Achievement Motivation / 2.3.4:
Attribution Theory / 2.3.5:
Intrinsic Motivation / 2.3.6:
Social Theories of Motivation / 2.4:
Conformity / 2.4.1:
Cultural Effect / 2.4.2:
Evolution / 2.4.3:
Combined Motivation Theories / 2.5:
Maslow's Hierarchy of Needs / 2.5.1:
Existence Relatedness Growth Theory / 2.5.2:
Towards Motivated Reinforcement Learning / 2.6:
Defining Reinforcement Learning / 3.1:
Dynamic Programming / 3.1.1:
Monte Carlo Methods / 3.1.2:
Temporal Difference Learning / 3.1.3:
Reinforcement Learning in Complex Environments / 3.2:
Partially Observable Environments / 3.2.1:
Function Approximation / 3.2.2:
Hierarchical Reinforcement Learning / 3.2.3:
Motivated Reinforcement Learning / 3.3:
Using a Motivation Signal in Addition to a Reward Signal / 3.3.1:
Using a Motivation Signal Instead of a Reward Signal / 3.3.2:
Comparing the Behaviour of Learning Agents / 3.4:
Player Satisfaction / 4.1:
Psychological Flow / 4.1.1:
Structural Flow / 4.1.2:
Formalising Non-Player Character Behaviour / 4.2:
Models of Optimality for Reinforcement Learning / 4.2.1:
Characteristics of Motivated Reinforcement Learning / 4.2.2:
Comparing Motivated Reinforcement Learning Agents / 4.3:
Statistical Model for Identifying Learned Tasks / 4.3.1:
Behavioural Variety / 4.3.2:
Behavioural Complexity / 4.3.3:
Developing Curious Characters Using Motivated Reinforcement Learning / 4.4:
Curiosity, Motivation and Attention Focus / 5:
Agents in Complex, Dynamic Environments / 5.1:
States / 5.1.1:
Actions / 5.1.2:
Reward and Motivation / 5.1.3:
Motivation and Attention Focus / 5.2:
Observations / 5.2.1:
Events / 5.2.2:
Tasks and Task Selection / 5.2.3:
Experience-Based Reward as Cognitive Motivation / 5.2.4:
Arbitration Functions / 5.2.5:
A General Experience-Based Motivation Function / 5.2.6:
Curiosity as Motivation for Support Characters / 5.3:
Curiosity as Interesting Events / 5.3.1:
Curiosity as Interesting and Competence / 5.3.2:
Motivated Reinforcement Learning Agents / 5.4:
A General Motivated Reinforcement Learning Model / 6.1:
Algorithms for Motivated Reinforcement Learning / 6.2:
Motivated Flat Reinforcement Learning / 6.2.1:
Motivated Multioption Reinforcement Learning / 6.2.2:
Motivated Hierarchical Reinforcement Learning / 6.2.3:
Curious Characters in Games / 6.3:
Curious Characters for Multiuser Games / 7:
Motivated Reinforcement Learning for Support Characters in Massively Multiplayer Online Role-Playing Games / 7.1:
Character Behaviour in Small-Scale, Isolated Games Locations / 7.2:
Case Studies of Individual Characters / 7.2.1:
General Trends in Character Behaviour / 7.2.2:
Curious Characters for Games in Complex, Dynamic Environments / 7.3:
Designing Characters That Can Multitask / 8.1:
Designing Characters for Complex Tasks / 8.1.1:
Games That Change While Characters Are Learning / 8.2.1:
Curious Characters for Games in Second Life / 8.3.1:
Motivated Reinforcement Learning in Open-Ended Simulation Games / 9.1:
Game Design / 9.1.1:
Character Design / 9.1.2:
Evaluating Character Behaviour in Response to Game Play Sequences / 9.2:
Discussion / 9.2.1:
Future / 9.3:
Towards the Future / 10:
Using Motivated Reinforcement Learning in Non-Player Characters / 10.1:
Other Gaming Applications for Motivated Reinforcement Learning / 10.2:
Dynamic Difficulty Adjustment / 10.2.1:
Procedural Content Generation / 10.2.2:
Beyond Curiosity / 10.3:
Biological Models of Motivation / 10.3.1:
Cognitive Models of Motivation / 10.3.2:
Social Models of Motivation / 10.3.3:
Combined Models of Motivation / 10.3.4:
New Models of Motivated Learning / 10.4:
Motivated Supervised Learning / 10.4.1:
Motivated Unsupervised Learning / 10.4.2:
Evaluating the Behaviour of Motivated Learning Agents / 10.5:
Concluding Remarks / 10.6:
Index / 10.7:
Non-Player Characters and Reinforcement Learning / Part I:
Non-Player Characters in Multiuser Games / 1:
Types of Multiuser Games / 1.1:
31.

電子ブック

EB
Marcus S. Fisher
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Chapter 1:
Managing Verification and Validation / Chapter 2:
The Axioms of Leadership / Section 2.1:
Planning / Section 2.2:
Establishing the V&V Requirements / Section 2.2.1:
Establishing the V&V Plan / Section 2.2.2:
Managing the Plan / Section 2.3:
Effectiveness Measures / Section 2.3.2:
Control Gates / Section 2.3.3:
Risk Management / Section 2.4:
Identify / Section 2.4.1:
Analyze / Section 2.4.2:
Plan / Section 2.4.3:
Track / Section 2.4.4:
Control / Section 2.4.5:
Risk Management Plan / Section 2.4.6:
Communication Structures / Section 2.5:
References
The Verification and Validation Life Cycle / Chapter 3:
Traceability Analysis / Section 3.1:
Interface Analysis / Section 3.2:
Phase Dependent Analysis / Section 3.3:
Requirements Analysis / Section 3.3.1:
Design Analysis / Section 3.3.2:
Code Analysis / Section 3.3.3:
Test Analysis / Section 3.3.4:
V&V Testing / Section 3.4:
Systems V&V / Chapter 4:
Appendix A
Index
Introduction / Chapter 1:
Managing Verification and Validation / Chapter 2:
The Axioms of Leadership / Section 2.1:
32.

図書

図書
Gabriel A. Pall ; forewords by A. Blantin [i.e. Blanton] Godfrey, Stephan H. Haeckelsa
出版情報: Boca Raton : St. Lucie Press, c2000  xxix, 325 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
The Case for Process Centering / Part I:
Doing Business in the Face of Change / Chapter 1.:
The Changing Business Environment / 1.1:
The Fundamental Success Factors / 1.1.1:
The New Challenge: Accelerated and Unpredictable Change / 1.1.2:
The Results of Change: What Is Really Happening? / 1.1.3:
The History of Change / 1.1.4:
Where Are We Today? / 1.2:
Problems with Today's Corporation / 1.2.1:
Today's Challenge / 1.2.2:
Summary / 1.3:
Traditional Ways of Coping with Change / Chapter 2.:
The Nature and Sources of Change / 2.1:
The Ping-Pong Response of Organizations to Change / 2.1.1:
Today's Customer-Driven Environment / 2.1.2:
Competition in the 21st Century / 2.1.3:
Traditional Responses to Change / 2.2:
Total Quality Management / 2.2.1:
Business Process Reengineering / 2.2.2:
Limitations of Traditional Reengineering / 2.2.3:
Limitations of the Traditional Approaches to Process Change / 2.3:
The Imperfection of Customer Needs / 2.3.1:
The Process Paradox / 2.3.2:
What Now? A Change in Managerial Attitudes / 2.4:
The Economic Value in Process Centering / 2.5:
Managing Work for Value Enhancement / 3.1:
The Value Contribution of Work / 3.1.1:
The Questionable Value Contribution of Downsizing / 3.1.2:
Investment in Business Processes for Economic Value Added / 3.2:
Impact on the Customer / 3.2.1:
Relevance to Overall Strategic Direction / 3.2.2:
The Viability of the Process / 3.2.3:
The Worth of the Process / 3.2.4:
Process Cost / 3.3:
The Cost of Conformance / 3.3.1:
The Cost of Nonconformance / 3.3.2:
The Cost of Quality as Management Tool / 3.3.3:
Productivity and Value / 3.3.4:
The Intellectual Value in Process Centering / 3.4:
The Emergence of Intellectual Assets / 4.1:
Intellectual Value Added / 4.2:
Customer Capital / 4.2.1:
Intellectual Capital / 4.2.2:
Net Added Value of Information Processed / 4.2.3:
The Role of Knowledge Management in Process Design / 4.3:
Process Centering Fundamentals / 4.4:
Understanding Processes / Chapter 5.:
Process Fundamentals / 5.1:
Classic Definitions / 5.1.1:
Process Control / 5.1.2:
Process Capability / 5.1.3:
Core Concepts of Process Thinking / 5.2:
Subject Process / 5.2.1:
Example for Subject Processes / 5.2.2:
Process Feedback / 5.2.3:
Process Quality / 5.2.4:
The Concept of Social Processes: The Human Element / 5.3:
Open Systems / 5.3.1:
Business Processes / 5.3.2:
Process Centering: The Basic Approach / 5.4:
Process Centering as the Prerequisite for Change / 6.1:
Definition of Process Centering / 6.1.1:
Commitment Management / 6.1.2:
Process Reengineering / 6.1.3:
Organizational Adaptability / 6.1.4:
Process Performance and Adaptability / 6.2:
Definitions / 6.2.1:
Adaptive Loops in Processes / 6.2.2:
The Superiority of Process Centering / 6.2.3:
Commitment Coordination and Process Alignment / 6.2.4:
What Needs To Be Done / 6.2.5:
Process Centering: The Response to Change / 6.3:
Response to Change / 7.1:
Upsizing and Growth / 7.1.1:
The Nature of Change / 7.1.2:
Response Characteristics / 7.2:
Information Intensity and Process Adaptability / 7.2.1:
Process Robustness / 7.2.2:
The Economics of Increasing Returns / 7.2.3:
Response Strategies for Growth / 7.3:
Processes as Product Offerings / 7.3.1:
Market Preempting / 7.3.2:
Process Investment Strategies for Growth / 7.3.3:
Process Centering: Role of the Individual / 7.4:
Process People / 8.1:
Empowerment, Commitment and Accountability / 8.1.1:
The Process Professional / 8.1.2:
The Process Team / 8.1.3:
Process Work / 8.2:
Multifunctional Work / 8.2.1:
Multidimensional Work / 8.2.2:
Valuable Work / 8.2.3:
Productive Work / 8.2.4:
Knowledge-Based Work / 8.2.5:
Rewarding Work / 8.2.6:
Work-Driven Shift in Personal Characteristics and Skills / 8.2.7:
Process-Related Roles and Responsibilities / 8.3:
Process Centering: The Management Team / 8.4:
Overseers and Implementers / 9.1:
Enterprise Transformation Executive / 9.1.1:
Enterprise Transformation Council / 9.1.2:
Business Process Management Executive / 9.1.3:
Business Process Owner / 9.1.4:
Business Process Management Team / 9.1.5:
Business Process Management Team Leader / 9.1.6:
Business Process Stakeholders / 9.1.7:
Process Management Resources / 9.2:
Process Contract / 9.2.1:
Process Training / 9.2.2:
Information Technology: The Response Integrator / 9.3:
Change and Information Intensity / 10.1:
Information Technology / 10.1.1:
Information Management for Adaptability / 10.2:
Two Key Process Components / 10.2.1:
Basic Functional Capabilities / 10.2.2:
Technology Assessment / 10.2.3:
Networked Collaborative Systems / 10.3:
Employee Training / 10.3.1:
Collaborative Work Practices / 10.3.2:
Wide-Area Networks / 10.3.3:
Groupware and Collaborative Computing / 10.3.4:
Fundamentals of Online Collaborative Systems / 10.3.5:
Collaborative System Architecture / 10.3.6:
Information Technology as Integrator / 10.4:
Deductive Thinking / 10.4.1:
Inductive Thinking / 10.4.2:
The Need Paradox / 10.4.3:
Process-Centered Management / 10.5:
Basics of Business Process Management / Chapter 11.:
Process Management Overview / 11.1:
The Process Management Roadmap / 11.1.1:
Classification of Business Processes / 11.1.2:
Process Planning / 11.2:
Process Identification and Mapping / 11.2.1:
Process Selection for Reengineering / 11.2.2:
Process Definition / 11.2.3:
Customer Requirements / 11.2.4:
Effective Process-Centered Management / 11.3:
The Operational View / 12.1:
The Two Dimensions of Process Management / 12.1.1:
Commitment Management and Communications / 12.1.2:
Process Resources / 12.1.3:
Process Measurements and Controls / 12.1.4:
Process Adaptability / 12.1.5:
Process Centering / 12.2:
Process Structure: The Holistic View / 12.3:
The Dynamic Business Process / 13.1:
The Holistic Process Model / 13.1.1:
The Workflow and Adaptive Loops / 13.1.3:
Alignment Engineering / 13.2:
Process Performance and Resources / 13.3:
Performance Measurement and Control / 14.1:
Process Measurement / 14.1.1:
Cycle-Time Reduction / 14.1.2:
Cycle-Time Basics / 14.2.1:
Business Cycle Time / 14.2.2:
Time To Respond / 14.2.3:
Time to Commitment / 14.2.4:
Performance Cycle Time / 14.2.5:
Human Resources and Adaptive Management Organization / 14.3:
Groupware / 14.4:
Enterprise Applications / 14.4.2:
Business Processes as Assets / 14.4.3:
Design for Adaptability / 14.5:
Traditional Design Approach to Adaptability / 15.1:
The Holistic Design Approach / 15.2:
Process Design Concepts / 15.2.1:
Design of New Process Structure / 15.2.2:
Redesign of Existing Process Structure / 15.2.3:
Design for Robust Commitments / 15.3:
Design for Process Adaptability / 16.1:
Backbone Network of Commitments / 16.1.1:
Workflow Reconfiguration / 16.1.2:
Design for Accountability / 16.2:
Culture of Accountability / 16.3:
Continuous Improvement and Planning / 16.4:
Process Improvement / 16.4.1:
Launching the Process / 16.4.2:
Process Implementation Planning / 17.1:
Integrated Implementation Planning / 17.1.1:
The Three Steps of Implementation Planning / 17.1.2:
Planning for Implementation Problems / 17.2:
Company-Wide Constraints / 17.2.1:
Process-Level Impediments / 17.2.2:
Cultural Resistance / 17.2.3:
Technology Constraints / 17.2.4:
Planning for Action / 17.3:
Process Deployment / 17.4:
The Process-Centered Organization in Operation / 17.5:
The Business Process Level / 18.1:
Process Ownership / 18.1.1:
Accountability Framework / 18.1.2:
Process Stakeholders / 18.1.3:
Continuous Process Assessment / 18.1.4:
The Enterprise Level / 18.2:
Operational Responsibilities / 18.2.1:
The Millennium Enterprise / 18.2.2:
Appendixes / 18.3:
The Tools of Process Centering / Appendix 1.:
Stand-Alone Software Tools / A1.1:
Process Modeling Tools / A1.1.1:
Process Documentation Tools / A1.1.2:
Process Simulation Tools / A1.1.3:
Process Mapping-Related Activity-Based Costing Tools / A1.1.4:
Project Management Tools / A1.1.5:
Groupware/Software Tools for Team Effectiveness / A1.1.6:
ERP-Based Software Tools / A1.2:
SAP / A1.2.1:
Oracle / A1.2.2:
Abbreviations and Acronyms / Appendix 2.:
Glossary
Endnotes
Bibliography
Index
The Case for Process Centering / Part I:
Doing Business in the Face of Change / Chapter 1.:
The Changing Business Environment / 1.1:
33.

電子ブック

EB
Rhodri H. Davies, Chris Taylor, Christopher J. Taylor, Carole Twining
出版情報: Springer eBooks Computer Science , Springer, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
Detecting Vertebral Fractures / 1.1.2:
Face Identification, Tracking, and Simulation of Ageing / 1.1.3:
Overview / 1.2:
Statistical Models of Shape and Appearance / 2:
Finite-Dimensional Representations of Shape / 2.1:
Shape Alignment / 2.1.1:
Statistics of Shapes / 2.1.2:
Principal Component Analysis / 2.1.3:
Modelling Distributions of Sets of Shapes / 2.2:
Gaussian Models / 2.2.1:
Kernel Density Estimation / 2.2.2:
Kernel Principal Component Analysis / 2.2.3:
Using Principal Components to Constrain Shape / 2.2.4:
Infinite-Dimensional Representations of Shape / 2.3:
Parameterised Representations of Shape / 2.3.1:
Applications of Shape Models / 2.4:
Active Shape Models / 2.4.1:
Active Appearance Models / 2.4.2:
Establishing Correspondence / 3:
The Correspondence Problem / 3.1:
Approaches to Establishing Correspondence / 3.2:
Manual Landmarking / 3.2.1:
Automatic Methods of Establishing Correspondence / 3.2.2:
Correspondence by Parameterisation / 3.2.2.1:
Distance-Based Correspondence / 3.2.2.2:
Feature-Based Correspondence / 3.2.2.3:
Correspondence Based on Physical Properties / 3.2.2.4:
Image-Based Correspondence / 3.2.2.5:
Summary / 3.2.3:
Correspondence by Optimisation / 3.3:
Objective Function / 3.3.1:
Manipulating Correspondence / 3.3.2:
Optimisation / 3.3.3:
Objective Functions / 4:
Shape-Based Objective Functions / 4.1:
Euclidian Distance and the Trace of the Model Covariance / 4.1.1:
Bending Energy / 4.1.2:
Curvature / 4.1.3:
Shape Context / 4.1.4:
Model-Based Objective Functions / 4.2:
The Determinant of the Model Covariance / 4.2.1:
Measuring Model Properties by Bootstrapping / 4.2.2:
Specificity / 4.2.2.1:
Generalization Ability / 4.2.2.2:
An Information Theoretic Objective Function / 4.3:
Shannon Codeword Length and Shannon Entropy / 4.3.1:
Description Length for a Multivariate Gaussian Model / 4.3.2:
Approximations to MDL / 4.3.3:
Gradient of Simplified MDL Objective Functions / 4.3.4:
Concluding Remarks / 4.4:
Re-parameterisation of Open and Closed Curves / 5:
Open Curves / 5.1:
Piecewise-Linear Re-parameterisation / 5.1.1:
Recursive Piecewise-Linear Re-parameterisation / 5.1.2:
Localized Re-parameterisation / 5.1.3:
Kernel-Based Representation of Re-parameterisation / 5.1.4:
Cauchy Kernels / 5.1.4.1:
Polynomial Re-parameterisation / 5.1.4.2:
Differentiable Re-parameterisations for Closed Curves / 5.2:
Wrapped Kernel Re-parameterisation for Closed Curves / 5.2.1:
Use in Optimisation / 5.3:
Parameterisation and Re-parameterisation of Surfaces / 6:
Surface Parameterisation / 6.1:
Initial Parameterisation for Open Surfaces / 6.1.1:
Initial Parameterisation for Closed Surfaces / 6.1.2:
Defining a Continuous Parameterisation / 6.1.3:
Removing Area Distortion / 6.1.4:
Consistent Parameterisation / 6.1.5:
Re-parameterisation of Surfaces / 6.2:
Re-parameterisation of Open Surfaces / 6.2.1:
Recursive Piecewise Linear Re-parameterisation / 6.2.1.1:
Re-parameterisation of Closed Surfaces / 6.2.1.2:
Recursive Piecewise-Linear Reparameterisation / 6.2.2.1:
Cauchy Kernel Re-parameterisation / 6.2.2.2:
Symmetric Theta Transformation / 6.2.2.4:
Asymmetric Theta Transformations / 6.2.2.5:
Shear Transformations / 6.2.2.6:
Re-parameterisation of Other Topologies / 6.2.3:
A Tractable Optimisation Approach / 6.3:
Optimising One Example at a Time / 7.1.1:
Stochastic Selection of Values for Auxiliary Parameters / 7.1.2:
Gradient Descent Optimisation / 7.1.3:
Optimising Pose / 7.1.4:
Tailoring Optimisation / 7.2:
Closed Curves and Surfaces / 7.2.1:
Open Surfaces / 7.2.2:
Multi-part Objects / 7.2.3:
Implementation Issues / 7.3:
Calculating the Covariance Matrix by Numerical Integration / 7.3.1:
Numerical Estimation of the Gradient / 7.3.2:
Sampling the Set of Shapes / 7.3.3:
Detecting Singularities in the Re-parameterisations / 7.3.4:
Example Optimisation Routines / 7.4:
Example 1: Open Curves / 7.4.1:
Example 2: Open Surfaces / 7.4.2:
Non-parametric Regularization / 8:
Regularization / 8.1:
Fluid Regularization / 8.1.1:
The Shape Manifold / 8.3:
The Induced Metric / 8.3.1:
Tangent Space / 8.3.2:
Covariant Derivatives / 8.3.3:
Shape Images / 8.4:
Iterative Updating of Shape Images / 8.5:
Dealing with Shapes with Spherical Topology / 8.5.2:
Avoiding Singularities by Re-gridding / 8.5.3:
Example Implementation of Non-parametric Regularization / 8.6:
Example Optimisation Routines Using Iterative Updating of Shape Images / 8.7:
Example 3: Open Surfaces Using Shape Images / 8.7.1:
Example 4: Optimisation of Closed Surfaces Using Shape Images / 8.7.2:
Evaluation of Statistical Models / 9:
Evaluation Using Ground Truth / 9.1:
Evaluation in the Absence of Ground Truth / 9.2:
Specificity and Generalization: Quantitative Measures / 9.2.1:
Specificity and Generalization as Graph-Based Estimators / 9.3:
Evaluating the Coefficients [beta subscript n, gamma] / 9.3.1:
Generalized Specificity / 9.3.2:
Specificity and Generalization in Practice / 9.4:
Discussion / 9.5:
Thin-Plate and Clamped-Plate Splines / Appendix A:
Curvature and Bending Energy / A.1:
Variational Formulation / A.2:
Green's Functions / A.3:
Green's Functions for the Thin-Plate Spline / A.3.1:
Green's Functions for the Clamped-Plate Spline / A.3.2:
Differentiating the Objective Function / Appendix B:
Finite-Dimensional Shape Representations / B.1:
The Pseudo-Inverse / B.1.1:
Varying the Shape / B.1.2:
From PCA to Singular Value Decomposition / B.1.3:
Infinite Dimensional Shape Representations / B.2:
Glossary
References
Index
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
34.

電子ブック

EB
Rhodri H. Davies, Chris Taylor, Christopher J. Taylor, Carole Twining
出版情報: SpringerLink Books - AutoHoldings , Springer, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
Detecting Vertebral Fractures / 1.1.2:
Face Identification, Tracking, and Simulation of Ageing / 1.1.3:
Overview / 1.2:
Statistical Models of Shape and Appearance / 2:
Finite-Dimensional Representations of Shape / 2.1:
Shape Alignment / 2.1.1:
Statistics of Shapes / 2.1.2:
Principal Component Analysis / 2.1.3:
Modelling Distributions of Sets of Shapes / 2.2:
Gaussian Models / 2.2.1:
Kernel Density Estimation / 2.2.2:
Kernel Principal Component Analysis / 2.2.3:
Using Principal Components to Constrain Shape / 2.2.4:
Infinite-Dimensional Representations of Shape / 2.3:
Parameterised Representations of Shape / 2.3.1:
Applications of Shape Models / 2.4:
Active Shape Models / 2.4.1:
Active Appearance Models / 2.4.2:
Establishing Correspondence / 3:
The Correspondence Problem / 3.1:
Approaches to Establishing Correspondence / 3.2:
Manual Landmarking / 3.2.1:
Automatic Methods of Establishing Correspondence / 3.2.2:
Correspondence by Parameterisation / 3.2.2.1:
Distance-Based Correspondence / 3.2.2.2:
Feature-Based Correspondence / 3.2.2.3:
Correspondence Based on Physical Properties / 3.2.2.4:
Image-Based Correspondence / 3.2.2.5:
Summary / 3.2.3:
Correspondence by Optimisation / 3.3:
Objective Function / 3.3.1:
Manipulating Correspondence / 3.3.2:
Optimisation / 3.3.3:
Objective Functions / 4:
Shape-Based Objective Functions / 4.1:
Euclidian Distance and the Trace of the Model Covariance / 4.1.1:
Bending Energy / 4.1.2:
Curvature / 4.1.3:
Shape Context / 4.1.4:
Model-Based Objective Functions / 4.2:
The Determinant of the Model Covariance / 4.2.1:
Measuring Model Properties by Bootstrapping / 4.2.2:
Specificity / 4.2.2.1:
Generalization Ability / 4.2.2.2:
An Information Theoretic Objective Function / 4.3:
Shannon Codeword Length and Shannon Entropy / 4.3.1:
Description Length for a Multivariate Gaussian Model / 4.3.2:
Approximations to MDL / 4.3.3:
Gradient of Simplified MDL Objective Functions / 4.3.4:
Concluding Remarks / 4.4:
Re-parameterisation of Open and Closed Curves / 5:
Open Curves / 5.1:
Piecewise-Linear Re-parameterisation / 5.1.1:
Recursive Piecewise-Linear Re-parameterisation / 5.1.2:
Localized Re-parameterisation / 5.1.3:
Kernel-Based Representation of Re-parameterisation / 5.1.4:
Cauchy Kernels / 5.1.4.1:
Polynomial Re-parameterisation / 5.1.4.2:
Differentiable Re-parameterisations for Closed Curves / 5.2:
Wrapped Kernel Re-parameterisation for Closed Curves / 5.2.1:
Use in Optimisation / 5.3:
Parameterisation and Re-parameterisation of Surfaces / 6:
Surface Parameterisation / 6.1:
Initial Parameterisation for Open Surfaces / 6.1.1:
Initial Parameterisation for Closed Surfaces / 6.1.2:
Defining a Continuous Parameterisation / 6.1.3:
Removing Area Distortion / 6.1.4:
Consistent Parameterisation / 6.1.5:
Re-parameterisation of Surfaces / 6.2:
Re-parameterisation of Open Surfaces / 6.2.1:
Recursive Piecewise Linear Re-parameterisation / 6.2.1.1:
Re-parameterisation of Closed Surfaces / 6.2.1.2:
Recursive Piecewise-Linear Reparameterisation / 6.2.2.1:
Cauchy Kernel Re-parameterisation / 6.2.2.2:
Symmetric Theta Transformation / 6.2.2.4:
Asymmetric Theta Transformations / 6.2.2.5:
Shear Transformations / 6.2.2.6:
Re-parameterisation of Other Topologies / 6.2.3:
A Tractable Optimisation Approach / 6.3:
Optimising One Example at a Time / 7.1.1:
Stochastic Selection of Values for Auxiliary Parameters / 7.1.2:
Gradient Descent Optimisation / 7.1.3:
Optimising Pose / 7.1.4:
Tailoring Optimisation / 7.2:
Closed Curves and Surfaces / 7.2.1:
Open Surfaces / 7.2.2:
Multi-part Objects / 7.2.3:
Implementation Issues / 7.3:
Calculating the Covariance Matrix by Numerical Integration / 7.3.1:
Numerical Estimation of the Gradient / 7.3.2:
Sampling the Set of Shapes / 7.3.3:
Detecting Singularities in the Re-parameterisations / 7.3.4:
Example Optimisation Routines / 7.4:
Example 1: Open Curves / 7.4.1:
Example 2: Open Surfaces / 7.4.2:
Non-parametric Regularization / 8:
Regularization / 8.1:
Fluid Regularization / 8.1.1:
The Shape Manifold / 8.3:
The Induced Metric / 8.3.1:
Tangent Space / 8.3.2:
Covariant Derivatives / 8.3.3:
Shape Images / 8.4:
Iterative Updating of Shape Images / 8.5:
Dealing with Shapes with Spherical Topology / 8.5.2:
Avoiding Singularities by Re-gridding / 8.5.3:
Example Implementation of Non-parametric Regularization / 8.6:
Example Optimisation Routines Using Iterative Updating of Shape Images / 8.7:
Example 3: Open Surfaces Using Shape Images / 8.7.1:
Example 4: Optimisation of Closed Surfaces Using Shape Images / 8.7.2:
Evaluation of Statistical Models / 9:
Evaluation Using Ground Truth / 9.1:
Evaluation in the Absence of Ground Truth / 9.2:
Specificity and Generalization: Quantitative Measures / 9.2.1:
Specificity and Generalization as Graph-Based Estimators / 9.3:
Evaluating the Coefficients [beta subscript n, gamma] / 9.3.1:
Generalized Specificity / 9.3.2:
Specificity and Generalization in Practice / 9.4:
Discussion / 9.5:
Thin-Plate and Clamped-Plate Splines / Appendix A:
Curvature and Bending Energy / A.1:
Variational Formulation / A.2:
Green's Functions / A.3:
Green's Functions for the Thin-Plate Spline / A.3.1:
Green's Functions for the Clamped-Plate Spline / A.3.2:
Differentiating the Objective Function / Appendix B:
Finite-Dimensional Shape Representations / B.1:
The Pseudo-Inverse / B.1.1:
Varying the Shape / B.1.2:
From PCA to Singular Value Decomposition / B.1.3:
Infinite Dimensional Shape Representations / B.2:
Glossary
References
Index
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
35.

電子ブック

EB
John Aldo Lee, M. Jordan, John A. Lee, Michel Verleysen
出版情報: Springer eBooks Computer Science , Springer New York, 2007
所蔵情報: loading…
目次情報: 続きを見る
Notations
Acronyms
High-Dimensional Data / 1:
Practical motivations / 1.1:
Fields of application / 1.1.1:
The goals to be reached / 1.1.2:
Theoretical motivations / 1.2:
How can we visualize high-dimensional spaces? / 1.2.1:
Curse of dimensionality and empty space phenomenon / 1.2.2:
Some directions to be explored / 1.3:
Relevance of the variables / 1.3.1:
Dependencies between the variables / 1.3.2:
About topology, spaces, and manifolds / 1.4:
Two benchmark manifolds / 1.5:
Overview of the next chapters / 1.6:
Characteristics of an Analysis Method / 2:
Purpose / 2.1:
Expected functionalities / 2.2:
Estimation of the number of latent variables / 2.2.1:
Embedding for dimensionality reduction / 2.2.2:
Embedding for latent variable separation / 2.2.3:
Internal characteristics / 2.3:
Underlying model / 2.3.1:
Algorithm / 2.3.2:
Criterion / 2.3.3:
Example: Principal component analysis / 2.4:
Data model of PCA / 2.4.1:
Criteria leading to PCA / 2.4.2:
Functionalities of PCA / 2.4.3:
Algorithms / 2.4.4:
Examples and limitations of PCA / 2.4.5:
Toward a categorization of DR methods / 2.5:
Hard vs. soft dimensionality reduction / 2.5.1:
Traditional vs. generative model / 2.5.2:
Linear vs. nonlinear model / 2.5.3:
Continuous vs. discrete model / 2.5.4:
Implicit vs. explicit mapping / 2.5.5:
Integrated vs. external estimation of the dimensionality / 2.5.6:
Layered vs. standalone embeddings / 2.5.7:
Single vs. multiple coordinate systems / 2.5.8:
Optional vs. mandatory vector quantization / 2.5.9:
Batch vs. online algorithm / 2.5.10:
Exact vs. approximate optimization / 2.5.11:
The type of criterion to be optimized / 2.5.12:
Estimation of the Intrinsic Dimension / 3:
Definition of the intrinsic dimension / 3.1:
Fractal dimensions / 3.2:
The q-dimension / 3.2.1:
Capacity dimension / 3.2.2:
Information dimension / 3.2.3:
Correlation dimension / 3.2.4:
Some inequalities / 3.2.5:
Practical estimation / 3.2.6:
Other dimension estimators / 3.3:
Local methods / 3.3.1:
Trial and error / 3.3.2:
Comparisons / 3.4:
Data Sets / 3.4.1:
PCA estimator / 3.4.2:
Local PCA estimator / 3.4.3:
Concluding remarks / 3.4.5:
Distance Preservation / 4:
State-of-the-art / 4.1:
Spatial distances / 4.2:
Metric space, distances, norms and scalar product / 4.2.1:
Multidimensional scaling / 4.2.2:
Sammon's nonlinear mapping / 4.2.3:
Curvilinear component analysis / 4.2.4:
Graph distances / 4.3:
Geodesic distance and graph distance / 4.3.1:
Isomap / 4.3.2:
Geodesic NLM / 4.3.3:
Curvilinear distance analysis / 4.3.4:
Other distances / 4.4:
Kernel PC A / 4.4.1:
Semidefinite embedding / 4.4.2:
Topology Preservation / 5:
State of the art / 5.1:
Predefined lattice / 5.2:
Self-Organizing Maps / 5.2.1:
Generative Topographic Mapping / 5.2.2:
Data-driven lattice / 5.3:
Locally linear embedding / 5.3.1:
Laplacian eigenmaps / 5.3.2:
Isotop / 5.3.3:
Method comparisons / 6:
Toy examples / 6.1:
The Swiss roll / 6.1.1:
Manifolds having essential loops or spheres / 6.1.2:
Cortex unfolding / 6.2:
Image processing / 6.3:
Artificial faces / 6.3.1:
Real faces / 6.3.2:
Conclusions / 7:
Summary of the book / 7.1:
The problem / 7.1.1:
A basic solution / 7.1.2:
Dimensionality reduction / 7.1.3:
Latent variable separation / 7.1.4:
Intrinsic dimensionality estimation / 7.1.5:
Data flow / 7.2:
Variable Selection / 7.2.1:
Calibration / 7.2.2:
Linear dimensionality reduction / 7.2.3:
Nonlinear dimensionality reduction / 7.2.4:
Further processing / 7.2.5:
Model complexity / 7.3:
Taxonomy / 7.4:
Distance preservation / 7.4.1:
Topology preservation / 7.4.2:
Spectral methods / 7.5:
Nonspectral methods / 7.6:
Tentative methodology / 7.7:
Perspectives / 7.8:
Matrix Calculus / A:
Singular value decomposition / A.1:
Eigenvalue decomposition / A.2:
Square root of a square matrix / A.3:
Gaussian Variables / B:
One-dimensional Gaussian distribution / B.1:
Multidimensional Gaussian distribution / B.2:
Uncorrelated Gaussian variables / B.2.1:
Isotropic multivariate Gaussian distribution / B.2.2:
Linearly mixed Gaussian variables / B.2.3:
Optimization / C:
Newton's method / C.1:
Finding extrema / C.1.1:
Multivariate version / C.1.2:
Gradient ascent/descent / C.2:
Stochastic gradient descent / C.2.1:
Vector quantization / D:
Classical techniques / D.1:
Competitive learning / D.2:
Initialization and ""dead units"" / D.3:
Graph Building / E:
Without vector quantization / E.1:
K-rule / E.1.1:
e-rule / E.1.2:
r-rule / E.1.3:
With vector quantization / E.2:
Data rule / E.2.1:
Histogram rule / E.2.2:
Implementation Issues / F:
Dimension estimation / F.1:
Computation of the closest point(s) / F.1.1:
References / F.3:
Index
Notations
Acronyms
High-Dimensional Data / 1:
36.

電子ブック

EB
John Aldo Lee, M. Jordan, John A. Lee, Michel Verleysen, B. Schölkopf
出版情報: SpringerLink Books - AutoHoldings , Springer New York, 2007
所蔵情報: loading…
目次情報: 続きを見る
Notations
Acronyms
High-Dimensional Data / 1:
Practical motivations / 1.1:
Fields of application / 1.1.1:
The goals to be reached / 1.1.2:
Theoretical motivations / 1.2:
How can we visualize high-dimensional spaces? / 1.2.1:
Curse of dimensionality and empty space phenomenon / 1.2.2:
Some directions to be explored / 1.3:
Relevance of the variables / 1.3.1:
Dependencies between the variables / 1.3.2:
About topology, spaces, and manifolds / 1.4:
Two benchmark manifolds / 1.5:
Overview of the next chapters / 1.6:
Characteristics of an Analysis Method / 2:
Purpose / 2.1:
Expected functionalities / 2.2:
Estimation of the number of latent variables / 2.2.1:
Embedding for dimensionality reduction / 2.2.2:
Embedding for latent variable separation / 2.2.3:
Internal characteristics / 2.3:
Underlying model / 2.3.1:
Algorithm / 2.3.2:
Criterion / 2.3.3:
Example: Principal component analysis / 2.4:
Data model of PCA / 2.4.1:
Criteria leading to PCA / 2.4.2:
Functionalities of PCA / 2.4.3:
Algorithms / 2.4.4:
Examples and limitations of PCA / 2.4.5:
Toward a categorization of DR methods / 2.5:
Hard vs. soft dimensionality reduction / 2.5.1:
Traditional vs. generative model / 2.5.2:
Linear vs. nonlinear model / 2.5.3:
Continuous vs. discrete model / 2.5.4:
Implicit vs. explicit mapping / 2.5.5:
Integrated vs. external estimation of the dimensionality / 2.5.6:
Layered vs. standalone embeddings / 2.5.7:
Single vs. multiple coordinate systems / 2.5.8:
Optional vs. mandatory vector quantization / 2.5.9:
Batch vs. online algorithm / 2.5.10:
Exact vs. approximate optimization / 2.5.11:
The type of criterion to be optimized / 2.5.12:
Estimation of the Intrinsic Dimension / 3:
Definition of the intrinsic dimension / 3.1:
Fractal dimensions / 3.2:
The q-dimension / 3.2.1:
Capacity dimension / 3.2.2:
Information dimension / 3.2.3:
Correlation dimension / 3.2.4:
Some inequalities / 3.2.5:
Practical estimation / 3.2.6:
Other dimension estimators / 3.3:
Local methods / 3.3.1:
Trial and error / 3.3.2:
Comparisons / 3.4:
Data Sets / 3.4.1:
PCA estimator / 3.4.2:
Local PCA estimator / 3.4.3:
Concluding remarks / 3.4.5:
Distance Preservation / 4:
State-of-the-art / 4.1:
Spatial distances / 4.2:
Metric space, distances, norms and scalar product / 4.2.1:
Multidimensional scaling / 4.2.2:
Sammon's nonlinear mapping / 4.2.3:
Curvilinear component analysis / 4.2.4:
Graph distances / 4.3:
Geodesic distance and graph distance / 4.3.1:
Isomap / 4.3.2:
Geodesic NLM / 4.3.3:
Curvilinear distance analysis / 4.3.4:
Other distances / 4.4:
Kernel PC A / 4.4.1:
Semidefinite embedding / 4.4.2:
Topology Preservation / 5:
State of the art / 5.1:
Predefined lattice / 5.2:
Self-Organizing Maps / 5.2.1:
Generative Topographic Mapping / 5.2.2:
Data-driven lattice / 5.3:
Locally linear embedding / 5.3.1:
Laplacian eigenmaps / 5.3.2:
Isotop / 5.3.3:
Method comparisons / 6:
Toy examples / 6.1:
The Swiss roll / 6.1.1:
Manifolds having essential loops or spheres / 6.1.2:
Cortex unfolding / 6.2:
Image processing / 6.3:
Artificial faces / 6.3.1:
Real faces / 6.3.2:
Conclusions / 7:
Summary of the book / 7.1:
The problem / 7.1.1:
A basic solution / 7.1.2:
Dimensionality reduction / 7.1.3:
Latent variable separation / 7.1.4:
Intrinsic dimensionality estimation / 7.1.5:
Data flow / 7.2:
Variable Selection / 7.2.1:
Calibration / 7.2.2:
Linear dimensionality reduction / 7.2.3:
Nonlinear dimensionality reduction / 7.2.4:
Further processing / 7.2.5:
Model complexity / 7.3:
Taxonomy / 7.4:
Distance preservation / 7.4.1:
Topology preservation / 7.4.2:
Spectral methods / 7.5:
Nonspectral methods / 7.6:
Tentative methodology / 7.7:
Perspectives / 7.8:
Matrix Calculus / A:
Singular value decomposition / A.1:
Eigenvalue decomposition / A.2:
Square root of a square matrix / A.3:
Gaussian Variables / B:
One-dimensional Gaussian distribution / B.1:
Multidimensional Gaussian distribution / B.2:
Uncorrelated Gaussian variables / B.2.1:
Isotropic multivariate Gaussian distribution / B.2.2:
Linearly mixed Gaussian variables / B.2.3:
Optimization / C:
Newton's method / C.1:
Finding extrema / C.1.1:
Multivariate version / C.1.2:
Gradient ascent/descent / C.2:
Stochastic gradient descent / C.2.1:
Vector quantization / D:
Classical techniques / D.1:
Competitive learning / D.2:
Initialization and ""dead units"" / D.3:
Graph Building / E:
Without vector quantization / E.1:
K-rule / E.1.1:
e-rule / E.1.2:
r-rule / E.1.3:
With vector quantization / E.2:
Data rule / E.2.1:
Histogram rule / E.2.2:
Implementation Issues / F:
Dimension estimation / F.1:
Computation of the closest point(s) / F.1.1:
References / F.3:
Index
Notations
Acronyms
High-Dimensional Data / 1:
37.

図書

図書
Michael Beetz
出版情報: Berlin : Springer, 2000  xvi, 213 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1772 . Lecture notes in artificial intelligence
所蔵情報: loading…
目次情報: 続きを見る
Abstract
Acknowledgements
List of Figures
Introduction / 1:
The Approach / 1.1:
Technical Challenges / 1.2:
Introductory Example / 1.3:
Motivation / 1.4:
Relevance for Autonomous Robot Control / 1.4.1:
Relevance for AI Planning / 1.4.2:
The Computational Problem and Its Solution / 1.5:
The Computational Problem / 1.5.1:
The Computational Model / 1.5.2:
Contributions / 1.6:
Outline of the Book / 1.7:
Reactivity / 2:
The DeliveryWorld / 2.1:
The World / 2.1.1:
Commands and Jobs / 2.1.2:
The Robot / 2.1.3:
Justification of the DeliveryWorld / 2.1.4:
The Implementation of Routine Activities / 2.2:
Plan Steps vs. Concurrent Control Processes / 2.2.1:
Interfacing Continuous Control Processes / 2.2.2:
Coordinating Control Processes / 2.2.3:
Synchronization of Concurrent Control Threads / 2.2.4:
Failure Recovery / 2.2.5:
Perception / 2.2.6:
State, Memory, and World Models / 2.2.7:
The Structure of Routine Activities / 2.2.8:
The Structured Reactive Controller / 2.3:
Behavior and Planning Modules / 2.3.1:
The Body of the Structured Reactive Controller / 2.3.2:
Global Fluents, Variables, and the Plan Library / 2.3.3:
The RPL Runtime System / 2.3.4:
Summary and Discussion / 2.4:
Planning / 3:
The Structured Reactive Plan / 3.1:
Plans as Syntactic Objects / 3.1.1:
RPL as a Plan Language / 3.1.2:
The Computational Structure / 3.2:
The "Criticize-Revise" Cycle / 3.2.1:
The "Criticize" Step / 3.2.2:
The "Revise" Step / 3.2.3:
The XFRM Planning Framework / 3.3:
Anticipation and Forestalling of Behavior Flaws / 3.4:
The Detection of Behavior Flaws / 3.4.1:
Behavior Flaws and Plan Revisions / 3.4.2:
The Diagnosis of Behavior Flaws / 3.4.3:
Transparent Reactive Plans / 3.5:
Declarative Statements / 4.1:
RPL Construct Descriptions / 4.1.1:
Achievement Goals / 4.1.2:
Perceptions / 4.1.3:
Beliefs / 4.1.4:
Other Declarative Statements / 4.1.5:
Using Declarative Statements / 4.1.6:
Routine Plans / 4.2:
The Plan Library / 4.3:
Behavior Modules / 4.3.1:
Low-level Plans / 4.3.2:
High-level Plans / 4.3.3:
Discussion / 4.4:
Representing Plan Revisions / 5:
Conceptualization / 5.1:
Making Inferences / 5.2:
Some Examples / 5.2.1:
Accessing Code Trees / 5.2.2:
Predicates on Plan Interpretations / 5.2.3:
Predicates on Timelines / 5.2.4:
Timelines and Plan Interpretation / 5.2.5:
Expressing Plan Revisions / 5.3:
XFRML - The Implementation / 5.4:
Forestalling Behavior Flaws / 5.5:
FAUST / 6.1:
The Behavior Critic / 6.1.1:
Detecting Behavior Flaws: Implementation / 6.1.2:
Diagnosing the Causes of Behavior Flaws: Implementation / 6.1.3:
The Bug Class "Behavior-Specification Violation" / 6.1.4:
The Elimination of Behavior Flaws / 6.1.5:
The Plan Revisions for the Example / 6.2:
Some Behavior Flaws and Their Revisions / 6.3:
Perceptual Confusion / 6.3.1:
Missed Deadlines / 6.3.2:
Planning Ongoing Activities / 6.4:
Extending RPL / 7.1:
The RUNTIME-PLAN Statement / 7.1.1:
Plan Swapping / 7.1.2:
Making Planning Assumptions / 7.1.3:
Deliberative Controllers / 7.2:
Improving Iterative Plans by Local Planning / 7.2.1:
Plan Execution a la Shakey / 7.2.2:
Execution Monitoring and Replanning / 7.2.3:
Recovering from Execution Failures / 7.2.4:
Some Robot Control Architectures / 7.2.5:
The Controller in the Experiment / 7.3:
Evaluation / 7.4:
Analysis of the Problem / 8.1:
Assessment of the Method / 8.2:
Description of the Method / 8.2.1:
Evaluation of the Method / 8.2.2:
Demonstration / 8.3:
Evaluating SRCs in Standard Situations / 8.3.1:
Comparing SRCs with the Appropriate Fixed Controller179 / 8.3.2:
Problems that Require SRCs / 8.3.3:
Related Work / 8.4:
Control Architectures for Competent Physical Agents / 8.4.1:
Control Languages for Reactive Control / 8.4.2:
Robot Planning / 8.4.3:
Conclusion / 9:
What Do Structured Reactive Controllers Do? / 9.1:
Why Do Structured Reactive Controllers Work? / 9.2:
Do Structured Reactive Controllers Work for Real Robots? / 9.3:
References
Abstract
Acknowledgements
List of Figures
38.

図書

図書
Charles E. Baukal, Jr.
出版情報: Boca Raton, Fla. : CRC Press, c2000  545 p. ; 27 cm
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Chapter 1:
Importance of Heat Transfer in Industrial Combustion / 1.1:
Energy Consumption / 1.1.1:
Research Needs / 1.1.2:
Literature Discussion / 1.2:
Heat Transfer / 1.2.1:
Combustion / 1.2.2:
Heat Transfer and Combustion / 1.2.3:
Combustion System Components / 1.3:
Burners / 1.3.1:
Competing Priorities / 1.3.1.1:
Design Factors / 1.3.1.2:
General Burner Types / 1.3.1.3:
Combustors / 1.3.2:
Design Considerations / 1.3.2.1:
General Classifications / 1.3.2.2:
Heat Load / 1.3.3:
Process Tubes / 1.3.3.1:
Moving Substrate / 1.3.3.2:
Opaque Materials / 1.3.3.3:
Transparent Materials / 1.3.3.4:
Heat Recovery Devices / 1.3.4:
Recuperators / 1.3.4.1:
Regenerators / 1.3.4.2:
References
Some Fundamentals of Combustion / Chapter 2:
Combustion Chemistry / 2.1:
Fuel Properties / 2.1.1:
Oxidizer Composition / 2.1.2:
Mixture Ratio / 2.1.3:
Operating Regimes / 2.1.4:
Combustion Properties / 2.2:
Combustion Products / 2.2.1:
Air and Fuel Preheat Temperature / 2.2.1.1:
Fuel Composition / 2.2.1.4:
Flame Temperature / 2.2.2:
Oxidizer and Fuel Composition / 2.2.2.1:
Oxidizer and Fuel Preheat Temperature / 2.2.2.2:
Available Heat / 2.2.3:
Flue Gas Volume / 2.2.4:
Exhaust Product Transport Properties / 2.3:
Density / 2.3.1:
Specific Heat / 2.3.2:
Thermal Conductivity / 2.3.3:
Viscosity / 2.3.4:
Prandtl Number / 2.3.5:
Lewis Number / 2.3.6:
Heat Transfer Modes / Chapter 3:
Convection / 3.1:
Forced Convection / 3.2.1:
Forced Convection from Flames / 3.2.1.1:
Forced Convection from Outside Combustor Wall / 3.2.1.2:
Forced Convection from Hot Gases to Tubes / 3.2.1.3:
Natural Convection / 3.2.2:
Natural Convection from Flames / 3.2.2.1:
Natural Convection from Outside Combustor Wall / 3.2.2.2:
Radiation / 3.3:
Surface Radiation / 3.3.1:
Nonluminous Radiation / 3.3.2:
Theory / 3.3.2.1:
Combustion Studies / 3.3.2.2:
Luminous Radiation / 3.3.3:
Conduction / 3.3.3.1:
Steady-State Conduction / 3.4.1:
Transient Conduction / 3.4.2:
Phase Change / 3.5:
Melting / 3.5.1:
Boiling / 3.5.2:
Internal Boiling / 3.5.2.1:
External Boiling / 3.5.2.2:
Condensation / 3.5.3:
Heat Sources and Sinks / Chapter 4:
Heat Sources / 4.1:
Combustibles / 4.1.1:
Fuel Combustion / 4.1.1.1:
Volatile Combustion / 4.1.1.2:
Thermochemical Heat Release / 4.1.2:
Equilibrium TCHR / 4.1.2.1:
Catalytic TCHR / 4.1.2.2:
Mixed TCHR / 4.1.2.3:
Heat Sinks / 4.2:
Load / 4.2.1:
Tubes / 4.2.1.1:
Substrate / 4.2.1.2:
Granular Solid / 4.2.1.3:
Molten Liquid / 4.2.1.4:
Surface Conditions / 4.2.1.5:
Wall Losses / 4.2.2:
Openings / 4.2.3:
Gas Flow Through Openings / 4.2.3.1:
Material Transport / 4.2.4:
Computer Modeling / Chapter 5:
Combustion Modeling / 5.1:
Modeling Approaches / 5.2:
Fluid Dynamics / 5.2.1:
Moment Averaging / 5.2.1.1:
Vortex Methods / 5.2.1.2:
Spectral Methods / 5.2.1.3:
Direct Numerical Simulation / 5.2.1.4:
Geometry / 5.2.2:
Zero-Dimensional Modeling / 5.2.2.1:
One-Dimensional Modeling / 5.2.2.2:
Multi-dimensional Modeling / 5.2.2.3:
Reaction Chemistry / 5.2.3:
Nonreacting Flows / 5.2.3.1:
Simplified Chemistry / 5.2.3.2:
Complex Chemistry / 5.2.3.3:
Nonradiating / 5.2.4:
Participating Media / 5.2.4.2:
Time Dependence / 5.2.5:
Steady State / 5.2.5.1:
Transient / 5.2.5.2:
Simplified Models / 5.3:
Computational Fluid Dynamic Modeling / 5.4:
Increasing Popularity of CFD / 5.4.1:
Potential Problems of CFD / 5.4.2:
Equations / 5.4.3:
Chemistry / 5.4.3.1:
Multiple Phases / 5.4.3.4:
Boundary and Initial Conditions / 5.4.4:
Inlets and Outlets / 5.4.4.1:
Surfaces / 5.4.4.2:
Symmetry / 5.4.4.3:
Discretization / 5.4.5:
Finite Difference Technique / 5.4.5.1:
Finite Volume Technique / 5.4.5.2:
Finite Element Technique / 5.4.5.3:
Mixed / 5.4.5.4:
None / 5.4.5.5:
Solution Methods / 5.4.6:
Model Validation / 5.4.7:
Industrial Combustion Examples / 5.4.8:
Modeling Burners / 5.4.8.1:
Modeling Combustors / 5.4.8.2:
Experimental Techniques / Chapter 6:
Heat Flux / 6.1:
Total Heat Flux / 6.2.1:
Steady-State Uncooled Solids / 6.2.1.1:
Steady-State Cooled Solids / 6.2.1.2:
Steady-State Cooled Gages / 6.2.1.3:
Transient Uncooled Targets / 6.2.1.4:
Transient Uncooled Gages / 6.2.1.5:
Radiant Heat Flux / 6.2.2:
Heat Flux Gage / 6.2.2.1:
Ellipsoidal Radiometer / 6.2.2.2:
Spectral Radiometer / 6.2.2.3:
Other Techniques / 6.2.2.4:
Convective Heat Flux / 6.2.3:
Temperature / 6.3:
Gas Temperature / 6.3.1:
Suction Pyrometer / 6.3.1.1:
Optical Techniques / 6.3.1.2:
Fine Wire Thermocouples / 6.3.1.3:
Line Reversal / 6.3.1.4:
Surface Temperature / 6.3.2:
Embedded Thermocouple / 6.3.2.1:
Infrared Detectors / 6.3.2.2:
Gas Flow / 6.4:
Gas Velocity / 6.4.1:
Pitot Tubes / 6.4.1.1:
Laser Doppler Velocimetry / 6.4.1.2:
Static Pressure Distribution / 6.4.1.3:
Stagnation Velocity Gradient / 6.4.2.1:
Stagnation Zone / 6.4.2.2:
Gas Species / 6.5:
Other Measurements / 6.6:
Physical Modeling / 6.7:
Flame Impingement / Chapter 7:
Experimental Conditions / 7.1:
Configurations / 7.2.1:
Flame Normal to a Cylinder in Crossflow / 7.2.1.1:
Flame Normal to a Hemispherically Nosed Cylinder / 7.2.1.2:
Flame Normal to a Plane Surface / 7.2.1.3:
Flame Parallel to a Plane Surface / 7.2.1.4:
Operating Conditions / 7.2.2:
Oxidizers / 7.2.2.1:
Fuels / 7.2.2.2:
Equivalence Ratios / 7.2.2.3:
Firing Rates / 7.2.2.4:
Reynolds Number / 7.2.2.5:
Nozzle Diameter / 7.2.2.6:
Location / 7.2.2.8:
Stagnation Targets / 7.2.3:
Size / 7.2.3.1:
Target Materials / 7.2.3.2:
Surface Preparation / 7.2.3.3:
Surface Temperatures / 7.2.3.4:
Measurements / 7.2.4:
Semianalytical Heat Transfer Solutions / 7.3:
Equation Parameters / 7.3.1:
Thermophysical Properties / 7.3.1.1:
Sibulkin Results / 7.3.1.2:
Fay and Riddell Results / 7.3.2.2:
Rosner Results / 7.3.2.3:
Comparisons With Experiments / 7.3.3:
Forced Convection (Negligible TCHR) / 7.3.3.1:
Forced Convection with TCHR / 7.3.3.2:
Sample Calculations / 7.3.4:
Laminar Flames Without TCHR / 7.3.4.1:
Turbulent Flames Without TCHR / 7.3.4.2:
Laminar Flames with TCHR
Summary / 7.3.5:
Empirical Heat Transfer Correlations / 7.4:
Flames Impinging Normal to a Cylinder / 7.4.1:
Local Convection Heat Transfer / 7.4.2.1:
Average Convection Heat Transfer / 7.4.2.2:
Average Convection Heat Transfer with TCHR / 7.4.2.3:
Average Radiation Heat Transfer / 7.4.2.4:
Maximum Convection and Radiation Heat Transfer / 7.4.2.5:
Flames Impining Normal to a Hemi-Nosed Cylinder / 7.4.3:
Local Convection Heat Transfer with TCHR / 7.4.3.1:
Flames Impinging Normal to a Plane Surface / 7.4.4:
Flames Parallel to a Plane Surface / 7.4.4.1:
Local Convection Heat Transfer With TCHR / 7.4.5.1:
Local Convection and Radiation Heat Transfer / 7.4.5.2:
Heat Transfer from Burners / Chapter 8:
Open-Flame Burners / 8.1:
Momentum Effects / 8.2.1:
Flame Luminosity / 8.2.2:
Firing Rate Effects / 8.2.3:
Flame Shape Effects / 8.2.4:
Radiant Burners / 8.3:
Perforated Ceramic or Wire Mesh Radiant Burners / 8.3.1:
Flame Impingement Radiant Burners / 8.3.2:
Porous Refractory Radiant Burners / 8.3.3:
Advanced Ceramic Radiant Burners / 8.3.4:
Radiant Wall Burners / 8.3.5:
Radiant Tube Burners / 8.3.6:
Effects on Heat Transfer / 8.4:
Fuel Effects / 8.4.1:
Solid Fuels / 8.4.1.1:
Liquid Fuels / 8.4.1.2:
Gaseous Fuels / 8.4.1.3:
Fuel Temperature / 8.4.1.4:
Oxidizer Effects / 8.4.2:
Oxidizer Temperature / 8.4.2.1:
Staging Effects / 8.4.3:
Fuel Staging / 8.4.3.1:
Oxidizer Staging / 8.4.3.2:
Burner Orientation / 8.4.4:
Hearth-Fired Burners / 8.4.4.1:
Wall-Fired Burners / 8.4.4.2:
Roof-Fired Burners / 8.4.4.3:
Side-Fired Burners / 8.4.4.4:
Heat Recuperation / 8.4.5:
Regenerative Burners / 8.4.5.1:
Recuperative Burners / 8.4.5.2:
Furnace or Flue Gas Recirculation / 8.4.5.3:
Pulse Combustion / 8.4.6:
In-Flame Treatment / 8.5:
Heat Transfer in Furnaces / Chapter 9:
Furnaces / 9.1:
Firing Method / 9.2.1:
Direct Firing / 9.2.1.1:
Indirect Firing / 9.2.1.2:
Heat Distribution / 9.2.1.3:
Load Processing Method / 9.2.2:
Batch Processing / 9.2.2.1:
Continuous Processing / 9.2.2.2:
Hybrid Processing / 9.2.2.3:
Heat Transfer Medium / 9.2.3:
Gaseous Medium / 9.2.3.1:
Vacuum / 9.2.3.2:
Liquid Medium / 9.2.3.3:
Solid Medium / 9.2.3.4:
Rotary Geometry / 9.2.4:
Rectangular Geometry / 9.2.4.2:
Ladle Geometry / 9.2.4.3:
Vertical Cylindrical Geometry / 9.2.4.4:
Furnace Types / 9.2.5:
Reverberatory Furnace / 9.2.5.1:
Shaft Kiln / 9.2.5.2:
Rotary Furnace / 9.2.5.3:
Heat Recovery / 9.3:
Gas Recirculation / 9.3.1:
Flue Gas Recirculation / 9.3.3.1:
Furnace Gas Recirculation / 9.3.3.2:
Lower Temperature Applications / Chapter 10:
Ovens and Dryers / 10.1:
Predryer / 10.2.1:
Dryer / 10.2.2:
Fired Heaters / 10.3:
Reformer / 10.3.1:
Process Heater / 10.3.2:
Heat Treating / 10.4:
Standard Atmosphere / 10.4.1:
Special Atmosphere / 10.4.2:
Higher Temperature Applications / Chapter 11:
Industries / 11.1:
Metals Industry / 11.2:
Ferrous Metal Production / 11.2.1:
Electric Arc Furnace / 11.2.1.1:
Smelting / 11.2.1.2:
Ladle Preheating / 11.2.1.3:
Reheating Furnace / 11.2.1.4:
Forging / 11.2.1.5:
Aluminum Metal Production / 11.2.2:
Minerals Industry / 11.3:
Glass / 11.3.1:
Types of Traditional Glass-Melting Furnaces / 11.3.1.1:
Unit Melter / 11.3.1.2:
Recuperative Melter / 11.3.1.3:
Regenerative or Siemens Furnace / 11.3.1.4:
Oxygen-Enhanced Combustion for Glass Production / 11.3.1.5:
Advanced Techniques for Glass Production / 11.3.1.6:
Cement and Lime / 11.3.2:
Bricks, Refractories, and Ceramics / 11.3.3:
Waste Incineration / 11.4:
Types of Incinerators / 11.4.1:
Municipal Waste Incinerators / 11.4.1.1:
Sludge Incinerators / 11.4.1.2:
Mobile Incinerators / 11.4.1.3:
Transportable Incinerators / 11.4.1.4:
Fixed Hazardous Waste Incinerators / 11.4.1.5:
Heat Transfer in Waste Incineration / 11.4.2:
Advanced Combustion Systems / Chapter 12:
Oxygen-Enhanced Combustion / 12.1:
Typical Use Methods / 12.2.1:
Air Enrichment / 12.2.1.1:
O[subscript 2] Lancing / 12.2.1.2:
Oxy/Fuel / 12.2.1.3:
Air-Oxy/Fuel / 12.2.1.4:
Heat Transfer Benefits / 12.2.2:
Increased Productivity / 12.2.3.1:
Higher Thermal Efficiencies / 12.2.3.2:
Higher Heat Transfer Efficiency / 12.2.3.3.:
Increased Flexibility / 12.2.3.4:
Potential Heat Transfer Problems / 12.2.4:
Refractory Damage / 12.2.4.1:
Nonuniform Heating / 12.2.4.2:
Industrial Heating Applications / 12.2.5:
Metals / 12.2.5.1:
Minerals / 12.2.5.2:
Incineration / 12.2.5.3:
Other / 12.2.5.4:
Submerged Combustion / 12.3:
Metals Production / 12.3.1:
Minerals Production / 12.3.2:
Liquid Heating / 12.3.3:
Miscellaneous / 12.4:
Surface Combustor-Heater / 12.4.1:
Direct-Fired Cylinder Dryer / 12.4.2:
Appendices
Reference Sources for Further Information / Appendix A:
Common Conversions / Appendix B:
Methods of Expressing Mixture Ratios for CH[subscript 4], C[subscript 3]H[subscript 8], and H[subscript 2] / Appendix C:
Properties for CH[subscript 4], C[subscript 3]H[subscript 8], and H[subscript 2] Flames / Appendix D:
Fluid Dynamics Equations / Appendix E:
Material Properties / Appendix F:
Author Index
Subject Index
Introduction / Chapter 1:
Importance of Heat Transfer in Industrial Combustion / 1.1:
Energy Consumption / 1.1.1:
39.

電子ブック

EB
Michael Beetz
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2000
所蔵情報: loading…
目次情報: 続きを見る
Abstract
Acknowledgements
List of Figures
Introduction / 1:
The Approach / 1.1:
Technical Challenges / 1.2:
Introductory Example / 1.3:
Motivation / 1.4:
Relevance for Autonomous Robot Control / 1.4.1:
Relevance for AI Planning / 1.4.2:
The Computational Problem and Its Solution / 1.5:
The Computational Problem / 1.5.1:
The Computational Model / 1.5.2:
Contributions / 1.6:
Outline of the Book / 1.7:
Reactivity / 2:
The DeliveryWorld / 2.1:
The World / 2.1.1:
Commands and Jobs / 2.1.2:
The Robot / 2.1.3:
Justification of the DeliveryWorld / 2.1.4:
The Implementation of Routine Activities / 2.2:
Plan Steps vs. Concurrent Control Processes / 2.2.1:
Interfacing Continuous Control Processes / 2.2.2:
Coordinating Control Processes / 2.2.3:
Synchronization of Concurrent Control Threads / 2.2.4:
Failure Recovery / 2.2.5:
Perception / 2.2.6:
State, Memory, and World Models / 2.2.7:
The Structure of Routine Activities / 2.2.8:
The Structured Reactive Controller / 2.3:
Behavior and Planning Modules / 2.3.1:
The Body of the Structured Reactive Controller / 2.3.2:
Global Fluents, Variables, and the Plan Library / 2.3.3:
The RPL Runtime System / 2.3.4:
Summary and Discussion / 2.4:
Planning / 3:
The Structured Reactive Plan / 3.1:
Plans as Syntactic Objects / 3.1.1:
RPL as a Plan Language / 3.1.2:
The Computational Structure / 3.2:
The "Criticize-Revise" Cycle / 3.2.1:
The "Criticize" Step / 3.2.2:
The "Revise" Step / 3.2.3:
The XFRM Planning Framework / 3.3:
Anticipation and Forestalling of Behavior Flaws / 3.4:
The Detection of Behavior Flaws / 3.4.1:
Behavior Flaws and Plan Revisions / 3.4.2:
The Diagnosis of Behavior Flaws / 3.4.3:
Transparent Reactive Plans / 3.5:
Declarative Statements / 4.1:
RPL Construct Descriptions / 4.1.1:
Achievement Goals / 4.1.2:
Perceptions / 4.1.3:
Beliefs / 4.1.4:
Other Declarative Statements / 4.1.5:
Using Declarative Statements / 4.1.6:
Routine Plans / 4.2:
The Plan Library / 4.3:
Behavior Modules / 4.3.1:
Low-level Plans / 4.3.2:
High-level Plans / 4.3.3:
Discussion / 4.4:
Representing Plan Revisions / 5:
Conceptualization / 5.1:
Making Inferences / 5.2:
Some Examples / 5.2.1:
Accessing Code Trees / 5.2.2:
Predicates on Plan Interpretations / 5.2.3:
Predicates on Timelines / 5.2.4:
Timelines and Plan Interpretation / 5.2.5:
Expressing Plan Revisions / 5.3:
XFRML - The Implementation / 5.4:
Forestalling Behavior Flaws / 5.5:
FAUST / 6.1:
The Behavior Critic / 6.1.1:
Detecting Behavior Flaws: Implementation / 6.1.2:
Diagnosing the Causes of Behavior Flaws: Implementation / 6.1.3:
The Bug Class "Behavior-Specification Violation" / 6.1.4:
The Elimination of Behavior Flaws / 6.1.5:
The Plan Revisions for the Example / 6.2:
Some Behavior Flaws and Their Revisions / 6.3:
Perceptual Confusion / 6.3.1:
Missed Deadlines / 6.3.2:
Planning Ongoing Activities / 6.4:
Extending RPL / 7.1:
The RUNTIME-PLAN Statement / 7.1.1:
Plan Swapping / 7.1.2:
Making Planning Assumptions / 7.1.3:
Deliberative Controllers / 7.2:
Improving Iterative Plans by Local Planning / 7.2.1:
Plan Execution a la Shakey / 7.2.2:
Execution Monitoring and Replanning / 7.2.3:
Recovering from Execution Failures / 7.2.4:
Some Robot Control Architectures / 7.2.5:
The Controller in the Experiment / 7.3:
Evaluation / 7.4:
Analysis of the Problem / 8.1:
Assessment of the Method / 8.2:
Description of the Method / 8.2.1:
Evaluation of the Method / 8.2.2:
Demonstration / 8.3:
Evaluating SRCs in Standard Situations / 8.3.1:
Comparing SRCs with the Appropriate Fixed Controller179 / 8.3.2:
Problems that Require SRCs / 8.3.3:
Related Work / 8.4:
Control Architectures for Competent Physical Agents / 8.4.1:
Control Languages for Reactive Control / 8.4.2:
Robot Planning / 8.4.3:
Conclusion / 9:
What Do Structured Reactive Controllers Do? / 9.1:
Why Do Structured Reactive Controllers Work? / 9.2:
Do Structured Reactive Controllers Work for Real Robots? / 9.3:
References
Abstract
Acknowledgements
List of Figures
40.

電子ブック

EB
Sushil Jajodia, Hirosh Joseph, Abhishek Singh, Baibhav Singh
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
Analysis of WEP flaws / 1.2.1:
Key Stream Reuse / 1.2.2:
Message Modification / 1.2.3:
Message Injection / 1.2.4:
Authentication Spoofing / 1.2.5:
IP Redirection / 1.2.6:
Wireless Frame Generation / 1.2.7:
AirJack / 1.2.7.1:
Wavesec / 1.2.7.2:
Libwlan / 1.2.7.3:
FakeAP / 1.2.7.4:
Wnet / 1.2.7.5:
Scapy / 1.2.7.7:
Encryption Cracking Tools / 1.2.8:
Wepcrack / 1.2.8.1:
Dweputils / 1.2.8.2:
Wep tools / 1.2.8.3:
Wep Attack / 1.2.8.4:
Retrieving the WEP keys from Client Host / 1.2.9:
Traffic Inection Tools / 1.2.10:
802.1x Cracking Tools / 1.2.11:
Asleap-imp and Leap / 1.2.11.1:
Wireless DoS Attacks / 1.2.12:
Physical Layer Attack or Jamming / 1.2.12.1:
Signal Strength / 1.2.12.1.1:
Carrier Sensing Time / 1.2.12.1.2:
Packet Delivery Ratio / 1.2.12.1.3:
Signal Strength Consistency check / 1.2.12.1.4:
Spoofed Dessociation and Deauthentication Frames / 1.2.12.2:
Spoofed Malformed Authentication Frames / 1.2.12.3:
Flooding the Access Point Association and Authentication Buffer / 1.2.12.4:
Frame Deletion Attack / 1.2.12.5:
DoS attack dependent upon specific Wireless Setting / 1.2.12.6:
Attack against the 802.11i implementations / 1.2.13:
Authentication Mechanism Attacks / 1.2.13.1:
Prevention and Modifications / 1.3:
TKIP: temporal Key Integrity Protocol / 1.3.1:
TKIP Implementation / 1.3.1.1:
Message Integrity / 1.3.1.1.1:
Initialization Vector / 1.3.1.1.2:
Prevention against the FMS Attack / 1.3.1.1.3:
Per Packet key Mixing / 1.3.1.1.4:
Implementation Details of TKIP / 1.3.1.1.5:
Details of Per Packet Key mixing / 1.3.1.1.6:
Attack on TKIP / 1.3.1.2:
AES - CCMP / 1.3.2:
CCMP Header / 1.3.2.1:
Implementation / 1.3.2.2:
Encryption Process in MPDU / 1.3.2.2.1:
Decrypting MPDU / 1.3.2.2.2:
Prevention Method using Detection Devices / 1.4:
Conclusion / 1.5:
Vulnerability Analysis for Mail Protocols / 2.0:
Format String Specifiers / 2.1:
Format String Vulnerability / 2.2.1:
Format String Denial of Service Attack / 2.2.1.1:
Format String Vulnerability Reading Attack / 2.2.1.2:
Format String Vulnerability Writing Attack / 2.2.1.3:
Preventive Measures for Format String vulnerability / 2.2.1.4:
Buffer Overflow Attack / 2.3:
Buffer Overflow Prevention / 2.3.1:
Directory Traversal Attacks / 2.4:
Remote Detection / 2.4.1:
False Positive in Remote Detection for Mail Traffic / 2.5:
False Positive in case of SMTP Traffic / 2.5.1:
False Positive in case of IMAP Traffic / 2.5.2:
Vulnerability Analysis for FTP and TFTP / 2.6:
Buffer Overflow in FTP / 3.1:
Directory Traversal Attack in FTP / 3.1.2:
TFTP Vulnerability Analysis / 3.2:
Vulnerability Analysis / 3.2.1:
Vulnerability Analysis for HTTP / 3.3:
XSS Attack / 4.1:
Prevention against Cross Site Scripting Attacks / 4.2.1:
Vulnerability Protection / 4.2.1.1:
SQL Injection Attacks / 4.3:
SQL Injection Case Study / 4.3.1:
Preventive Measures / 4.3.2:
SQL injection in Oracle Data base / 4.3.2.1:
Stored Procedures / 4.3.2.2.1:
Remote Detection for Oracle Database / 4.3.2.2.2:
Other Preventive Measures / 4.3.3:
Preventive Measures by developers / 4.3.3.1:
MS DoS Device Name Vulnerability / 4.4:
Prevention from DoS Device Name Vulnerability / 4.4.1:
False Positive in HTTP / 4.5:
Evasion of HTTP Signatures / 4.6:
Vulnerability Analysis for DNS and DHCP / 4.7:
Introduction of DNS Protocol / 5.1:
Vulnerabilities in a DNS Protocol / 5.1.1:
DNS Cache Poisoning / 5.1.1.1:
Redirection Attack / 5.1.1.2:
Buffer Overflow Vulnerability / 5.1.1.3:
DNS Man in the Middle Attack or DNS Hijacking / 5.1.1.4:
DNS Amplification Attack / 5.1.1.5:
False Positives in a DNS Protocol / 5.1.2:
Introduction of DHCP / 5.2:
Vulnerabilities in DHCP / 5.2.1:
Client Masquerading / 5.2.1.1:
Flooding / 5.2.1.2:
Client Misconfiguration / 5.2.1.3:
Theft of Service / 5.2.1.4:
Packet Altercation / 5.2.1.5:
Key Exposure / 5.2.1.6:
Key Distribution / 5.2.1.7:
Protocol Agreement Issues / 5.2.1.8:
False Positive in DHCP / 5.2.2:
Vulnerability Analysis for LDAP and SNMP / 5.3:
ASN and BER Encoding / 6.1:
BER implementation for LDAP / 6.3:
Threat Analysis for Directory Services / 6.3.1:
SNMP / 6.4:
Vulnerability Analysis for SNMP / 6.4.1:
Vulnerability Analysis for RPC / 6.5:
RPC Message Protocol / 7.1:
NDR Format / 7.3:
Port Mapper / 7.4:
False Positive for SMB RPC Protocol / 7.5:
Evasion in RPC / 7.6:
Multiple Binding UUID / 7.6.1:
Fragment Data across many Requests / 7.6.2:
Bind to one UUID then alter Context / 7.6.3:
Prepend an ObjectID / 7.6.4:
Bind with an authentication field / 7.6.5:
One packet UDP function call / 7.6.6:
Endianess Selection / 7.6.7:
Chaining SMB commands / 7.6.8:
Out of order chaining / 7.6.9:
Chaining with random data in between commands / 7.6.10:
Unicode and non-Unicode evasion / 7.6.11:
SMB CreateAndX Path Names / 7.6.12:
Malware / 7.7:
Malware Naming Convention / 8.1:
Worms / 8.2.1:
Trojans / 8.2.2:
Spyware & Adware / 8.2.3:
Malware Threat Analysis / 8.3:
Creating controlled Environment / 8.3.1:
Confinement with the Hard Virtual Machines / 8.3.1.1:
Confinement with the Soft Virtual Machines / 8.3.1.2:
Confinement with Jails and Chroot / 8.3.1.3:
Confinement with System call Sensors / 8.3.1.4:
Confinement with System call Spoofing / 8.3.1.5:
Behavioral Analysis / 8.3.2:
Code Analysis / 8.3.3:
Root Kits / 8.4:
User and Kernel Mode Communication / 8.4.1:
I/O Request Packets (IRP) / 8.4.2:
Interrupt Descriptor Table / 8.4.3:
Service Descriptor Table / 8.4.4:
Direct Kernel Object Manipulation / 8.4.5:
Detection of Rootkits / 8.4.6:
Spyware / 8.5:
Methods of Spyware installation and propagation / 8.5.1:
Drive- By- Downloads / 8.5.1.1:
Bundling / 8.5.1.2:
From Other Spyware / 8.5.1.3:
Security Holes / 8.5.1.4:
Iframe Exploit / 8.5.2:
IE .chm File processing Vulnerability / 8.5.2.2:
Internet Code Download Link / 8.5.2.3:
Anti Spyware Signature Development / 8.5.3:
Vulnerability Signature / 8.5.3.1:
CLSID Data base / 8.5.3.2:
Spyware Specific Signature / 8.5.3.3:
Information Stealing / 8.5.3.4:
Preventing Information from being sent as emails / 8.5.3.5:
Reverse Engineering / 8.6:
Anti Reversing Technique / 9.1:
Anti Disassembly / 9.2.1:
Linear Sweep Disassembler / 9.2.1.1:
Recursive Traversal Disassembler / 9.2.1.2:
Evasion Technique for Disasembler / 9.2.1.3:
Self-Modifying Code / 9.2.2:
Virtual Machine Obfuscation / 9.2.3:
Anti Debugging Technique / 9.3:
Break Points / 9.3.1:
Software break point / 9.3.1.1:
Hardware break point / 9.3.1.2:
Detection of Breakpoint / 9.3.1.3:
Virtual Machine Detection / 9.4:
Checking finger print / 9.4.1:
Checking system tables / 9.4.2:
Checking processor instruction set / 9.4.3:
Unpacking / 9.5:
Manual unpacking of malware / 9.5.1:
Finding an original entry point of an executable / 9.5.1.1:
Taking memory Dump / 9.5.1.2:
Import Table Reconstruction / 9.5.1.3:
Import redirection and code emulation / 9.5.1.4:
Index / 9.6:
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
41.

電子ブック

EB
Sushil Jajodia, Hirosh Joseph, Abhishek Singh, Baibhav Singh, H. Joseph, B. Singh
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
Analysis of WEP flaws / 1.2.1:
Key Stream Reuse / 1.2.2:
Message Modification / 1.2.3:
Message Injection / 1.2.4:
Authentication Spoofing / 1.2.5:
IP Redirection / 1.2.6:
Wireless Frame Generation / 1.2.7:
AirJack / 1.2.7.1:
Wavesec / 1.2.7.2:
Libwlan / 1.2.7.3:
FakeAP / 1.2.7.4:
Wnet / 1.2.7.5:
Scapy / 1.2.7.7:
Encryption Cracking Tools / 1.2.8:
Wepcrack / 1.2.8.1:
Dweputils / 1.2.8.2:
Wep tools / 1.2.8.3:
Wep Attack / 1.2.8.4:
Retrieving the WEP keys from Client Host / 1.2.9:
Traffic Inection Tools / 1.2.10:
802.1x Cracking Tools / 1.2.11:
Asleap-imp and Leap / 1.2.11.1:
Wireless DoS Attacks / 1.2.12:
Physical Layer Attack or Jamming / 1.2.12.1:
Signal Strength / 1.2.12.1.1:
Carrier Sensing Time / 1.2.12.1.2:
Packet Delivery Ratio / 1.2.12.1.3:
Signal Strength Consistency check / 1.2.12.1.4:
Spoofed Dessociation and Deauthentication Frames / 1.2.12.2:
Spoofed Malformed Authentication Frames / 1.2.12.3:
Flooding the Access Point Association and Authentication Buffer / 1.2.12.4:
Frame Deletion Attack / 1.2.12.5:
DoS attack dependent upon specific Wireless Setting / 1.2.12.6:
Attack against the 802.11i implementations / 1.2.13:
Authentication Mechanism Attacks / 1.2.13.1:
Prevention and Modifications / 1.3:
TKIP: temporal Key Integrity Protocol / 1.3.1:
TKIP Implementation / 1.3.1.1:
Message Integrity / 1.3.1.1.1:
Initialization Vector / 1.3.1.1.2:
Prevention against the FMS Attack / 1.3.1.1.3:
Per Packet key Mixing / 1.3.1.1.4:
Implementation Details of TKIP / 1.3.1.1.5:
Details of Per Packet Key mixing / 1.3.1.1.6:
Attack on TKIP / 1.3.1.2:
AES - CCMP / 1.3.2:
CCMP Header / 1.3.2.1:
Implementation / 1.3.2.2:
Encryption Process in MPDU / 1.3.2.2.1:
Decrypting MPDU / 1.3.2.2.2:
Prevention Method using Detection Devices / 1.4:
Conclusion / 1.5:
Vulnerability Analysis for Mail Protocols / 2.0:
Format String Specifiers / 2.1:
Format String Vulnerability / 2.2.1:
Format String Denial of Service Attack / 2.2.1.1:
Format String Vulnerability Reading Attack / 2.2.1.2:
Format String Vulnerability Writing Attack / 2.2.1.3:
Preventive Measures for Format String vulnerability / 2.2.1.4:
Buffer Overflow Attack / 2.3:
Buffer Overflow Prevention / 2.3.1:
Directory Traversal Attacks / 2.4:
Remote Detection / 2.4.1:
False Positive in Remote Detection for Mail Traffic / 2.5:
False Positive in case of SMTP Traffic / 2.5.1:
False Positive in case of IMAP Traffic / 2.5.2:
Vulnerability Analysis for FTP and TFTP / 2.6:
Buffer Overflow in FTP / 3.1:
Directory Traversal Attack in FTP / 3.1.2:
TFTP Vulnerability Analysis / 3.2:
Vulnerability Analysis / 3.2.1:
Vulnerability Analysis for HTTP / 3.3:
XSS Attack / 4.1:
Prevention against Cross Site Scripting Attacks / 4.2.1:
Vulnerability Protection / 4.2.1.1:
SQL Injection Attacks / 4.3:
SQL Injection Case Study / 4.3.1:
Preventive Measures / 4.3.2:
SQL injection in Oracle Data base / 4.3.2.1:
Stored Procedures / 4.3.2.2.1:
Remote Detection for Oracle Database / 4.3.2.2.2:
Other Preventive Measures / 4.3.3:
Preventive Measures by developers / 4.3.3.1:
MS DoS Device Name Vulnerability / 4.4:
Prevention from DoS Device Name Vulnerability / 4.4.1:
False Positive in HTTP / 4.5:
Evasion of HTTP Signatures / 4.6:
Vulnerability Analysis for DNS and DHCP / 4.7:
Introduction of DNS Protocol / 5.1:
Vulnerabilities in a DNS Protocol / 5.1.1:
DNS Cache Poisoning / 5.1.1.1:
Redirection Attack / 5.1.1.2:
Buffer Overflow Vulnerability / 5.1.1.3:
DNS Man in the Middle Attack or DNS Hijacking / 5.1.1.4:
DNS Amplification Attack / 5.1.1.5:
False Positives in a DNS Protocol / 5.1.2:
Introduction of DHCP / 5.2:
Vulnerabilities in DHCP / 5.2.1:
Client Masquerading / 5.2.1.1:
Flooding / 5.2.1.2:
Client Misconfiguration / 5.2.1.3:
Theft of Service / 5.2.1.4:
Packet Altercation / 5.2.1.5:
Key Exposure / 5.2.1.6:
Key Distribution / 5.2.1.7:
Protocol Agreement Issues / 5.2.1.8:
False Positive in DHCP / 5.2.2:
Vulnerability Analysis for LDAP and SNMP / 5.3:
ASN and BER Encoding / 6.1:
BER implementation for LDAP / 6.3:
Threat Analysis for Directory Services / 6.3.1:
SNMP / 6.4:
Vulnerability Analysis for SNMP / 6.4.1:
Vulnerability Analysis for RPC / 6.5:
RPC Message Protocol / 7.1:
NDR Format / 7.3:
Port Mapper / 7.4:
False Positive for SMB RPC Protocol / 7.5:
Evasion in RPC / 7.6:
Multiple Binding UUID / 7.6.1:
Fragment Data across many Requests / 7.6.2:
Bind to one UUID then alter Context / 7.6.3:
Prepend an ObjectID / 7.6.4:
Bind with an authentication field / 7.6.5:
One packet UDP function call / 7.6.6:
Endianess Selection / 7.6.7:
Chaining SMB commands / 7.6.8:
Out of order chaining / 7.6.9:
Chaining with random data in between commands / 7.6.10:
Unicode and non-Unicode evasion / 7.6.11:
SMB CreateAndX Path Names / 7.6.12:
Malware / 7.7:
Malware Naming Convention / 8.1:
Worms / 8.2.1:
Trojans / 8.2.2:
Spyware & Adware / 8.2.3:
Malware Threat Analysis / 8.3:
Creating controlled Environment / 8.3.1:
Confinement with the Hard Virtual Machines / 8.3.1.1:
Confinement with the Soft Virtual Machines / 8.3.1.2:
Confinement with Jails and Chroot / 8.3.1.3:
Confinement with System call Sensors / 8.3.1.4:
Confinement with System call Spoofing / 8.3.1.5:
Behavioral Analysis / 8.3.2:
Code Analysis / 8.3.3:
Root Kits / 8.4:
User and Kernel Mode Communication / 8.4.1:
I/O Request Packets (IRP) / 8.4.2:
Interrupt Descriptor Table / 8.4.3:
Service Descriptor Table / 8.4.4:
Direct Kernel Object Manipulation / 8.4.5:
Detection of Rootkits / 8.4.6:
Spyware / 8.5:
Methods of Spyware installation and propagation / 8.5.1:
Drive- By- Downloads / 8.5.1.1:
Bundling / 8.5.1.2:
From Other Spyware / 8.5.1.3:
Security Holes / 8.5.1.4:
Iframe Exploit / 8.5.2:
IE .chm File processing Vulnerability / 8.5.2.2:
Internet Code Download Link / 8.5.2.3:
Anti Spyware Signature Development / 8.5.3:
Vulnerability Signature / 8.5.3.1:
CLSID Data base / 8.5.3.2:
Spyware Specific Signature / 8.5.3.3:
Information Stealing / 8.5.3.4:
Preventing Information from being sent as emails / 8.5.3.5:
Reverse Engineering / 8.6:
Anti Reversing Technique / 9.1:
Anti Disassembly / 9.2.1:
Linear Sweep Disassembler / 9.2.1.1:
Recursive Traversal Disassembler / 9.2.1.2:
Evasion Technique for Disasembler / 9.2.1.3:
Self-Modifying Code / 9.2.2:
Virtual Machine Obfuscation / 9.2.3:
Anti Debugging Technique / 9.3:
Break Points / 9.3.1:
Software break point / 9.3.1.1:
Hardware break point / 9.3.1.2:
Detection of Breakpoint / 9.3.1.3:
Virtual Machine Detection / 9.4:
Checking finger print / 9.4.1:
Checking system tables / 9.4.2:
Checking processor instruction set / 9.4.3:
Unpacking / 9.5:
Manual unpacking of malware / 9.5.1:
Finding an original entry point of an executable / 9.5.1.1:
Taking memory Dump / 9.5.1.2:
Import Table Reconstruction / 9.5.1.3:
Import redirection and code emulation / 9.5.1.4:
Index / 9.6:
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
42.

電子ブック

EB
Zoya Ignatova, Israel Mart?nez-P?rez
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
References
Theoretical Computer Science / 2:
Graphs / 2.1:
Basic Notions / 2.1.1:
Paths and Cycles / 2.1.2:
Closures and Paths / 2.1.3:
Trees / 2.1.4:
Bipartite Graphs / 2.1.5:
Finite State Automata / 2.2:
Strings and Languages / 2.2.1:
Deterministic Finite State Automata / 2.2.2:
Non-Deterministic Finite State Automata / 2.2.3:
Regular Expressions / 2.2.4:
Stochastic Finite State Automata / 2.2.5:
Computability / 2.3:
Turing Machines / 2.3.1:
Universal Turing Machines / 2.3.2:
Church's Thesis / 2.3.3:
Register Machines / 2.3.4:
Cellular Automata / 2.3.5:
Formal Grammars / 2.4:
Grammars and Languages / 2.4.1:
Chomsky's Hierarchy / 2.4.2:
Grammars and Machines / 2.4.3:
Undecidability / 2.4.4:
Combinatorial Logic / 2.5:
Boolean Circuits / 2.5.1:
Compound Circuits / 2.5.2:
Minterms and Maxterms / 2.5.3:
Canonical Circuits / 2.5.4:
Adder Circuits / 2.5.5:
Computational Complexity / 2.6:
Time Complexity / 2.6.1:
Infinite Asymptotics / 2.6.2:
Decision Problems / 2.6.3:
Optimization Problems / 2.6.4:
Molecular Biology / 3:
DNA / 3.1:
Molecular Structure / 3.1.1:
Manipulation of DNA / 3.1.2:
Physical Chemistry / 3.2:
Thermodynamics / 3.2.1:
Chemical Kinetics / 3.2.2:
DNA Annealing Kinetics / 3.2.3:
Strand Displacement Kinetics / 3.2.4:
Stochastic Chemical Kinetics / 3.2.5:
Genes / 3.3:
Structure and Biosynthesis / 3.3.1:
DNA Recombination / 3.3.2:
Genomes / 3.3.3:
Gene Expression / 3.4:
Protein Biosynthesis / 3.4.1:
Proteins - Molecular Structure / 3.4.2:
Enzymes / 3.4.3:
Cells and Organisms / 3.5:
Eukaryotes and Prokaryotes / 3.5.1:
Viruses / 3.6:
General Structure and Classification / 3.6.1:
Applications / 3.6.2:
Word Design for DNA Computing / 4:
Constraints / 4.1:
Free Energy and Melting Temperature / 4.1.1:
Distance / 4.1.2:
Similarity / 4.1.3:
DNA Languages / 4.2:
Bond-Free Languages / 4.2.1:
Hybridization Properties / 4.2.2:
Small DNA Languages / 4.2.3:
DNA Code Constructions and Bounds / 4.3:
Reverse and Reverse-Complement Codes / 4.3.1:
Constant GC-Content Codes / 4.3.2:
Similarity-Based Codes / 4.3.3:
In Vitro Random Selection / 4.4:
General Selection Model / 4.4.1:
Selective Word Design / 4.4.2:
Concluding Remarks
Non-Autonomous DNA Models / 5:
Seminal Work / 5.1:
Adleman's First Experiment / 5.1.1:
Lipton's First Paper / 5.1.2:
Filtering Models / 5.2:
Memory-Less Filtering / 5.2.1:
Memory-Based Filtering / 5.2.2:
Mark-and-Destroy Filtering / 5.2.3:
Split-and-Merge Filtering / 5.2.4:
Filtering by Blocking / 5.2.5:
Surface-Based Filtering / 5.2.6:
Sticker Systems / 5.3:
Sticker Machines / 5.3.1:
Combinatorial Libraries / 5.3.2:
Useful Subroutines / 5.3.3:
NP-Complete Problems / 5.3.4:
Splicing Systems / 5.4:
Basic Splicing Systems / 5.4.1:
Recursively Enumerable Splicing Systems / 5.4.2:
Universal Splicing Systems / 5.4.3:
Recombinant Systems / 5.4.4:
Autonomous DNA Models / 6:
Algorithmic Self-Assembly / 6.1:
Self-Assembly / 6.1.1:
DNA Graphs / 6.1.2:
Linear Self-Assembly / 6.1.3:
Tile Assembly / 6.1.4:
Finite State Automaton Models / 6.2:
Two-State Two-Symbol Automata / 6.2.1:
Length-Encoding Automata / 6.2.2:
Sticker Automata / 6.2.3:
Stochastic Automata / 6.2.4:
DNA Hairpin Model / 6.3:
Whiplash PCR / 6.3.1:
Satisfiability / 6.3.2:
Hamiltonian Paths / 6.3.3:
Maximum Cliques / 6.3.4:
Hairpin Structures / 6.3.5:
Computational Models / 6.4:
Neural Networks / 6.4.1:
Tic-Tac-Toe Networks / 6.4.2:
Logic Circuits / 6.4.3:
Cellular DNA Computing / 6.4.4:
Ciliate Computing / 7.1:
Ciliates / 7.1.1:
Models of Gene Assembly / 7.1.2:
Intramolecular String Model / 7.1.3:
Intramolecular Graph Model / 7.1.4:
Intermolecular String Model / 7.1.5:
Biomolecular Computing / 7.2:
Gene Therapy / 7.2.1:
Anti-Sense Technology / 7.2.2:
Cell-Based Finite State Automata / 7.3:
Anti-Sense Finite State Automata / 7.4:
Basic Model / 7.4.1:
Diagnostic Rules / 7.4.2:
Diagnosis and Therapy / 7.4.3:
Computational Genes / 7.5:
Index / 7.5.1:
Introduction / 1:
References
Theoretical Computer Science / 2:
43.

図書

図書
Jean-Paul Pier
出版情報: Oxford : Oxford University Press, 2001  x, 428 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The scope of analysis / 1.1:
The great classics on analysis / 1.1.1:
The changing object of analysis / 1.1.2:
Main streams in a turbulent activity / 1.2:
The question of subdividing mathematical analysis / 1.2.1:
How to organize the subject / 1.2.2:
General Topology / 2:
Evolution 1900-1950 / 2.1:
Topological axiomatizations / 2.1.1:
Topological algebra / 2.1.2:
Filtrations / 2.1.3:
Dimension theory / 2.1.4:
Complementary inputs / 2.1.5:
Flashes 1950-2000 / 2.2:
An accomplished subject / 2.2.1:
Generalized topological concepts / 2.2.2:
Integration and Measure / 3:
Lebesgue integration / 3.1:
The general concept of measure / 3.1.2:
Paradoxical decomposition / 3.1.3:
Period of consolidation / 3.1.4:
Standing problems / 3.2:
Abstract formulations / 3.2.2:
Generalized Riemann integrals / 3.2.3:
Outlook / 3.2.4:
Functional analysis / 4:
New objectives / 4.1:
Theory of integral equations / 4.1.2:
Banach spaces / 4.1.3:
Hilbert spaces / 4.1.4:
von Neumann algebras / 4.1.5:
Banach algebras / 4.1.6:
Distributions / 4.1.7:
Topological vector spaces / 4.2:
Extension of Weierstra[beta]'s theorem / 4.2.2:
Frechet spaces, Schwartz spaces, Sobolev spaces / 4.2.3:
Banach space properties / 4.2.4:
Hilbert space properties / 4.2.5:
Banach algebra and C*-algebra properties / 4.2.6:
Approximation properties / 4.2.7:
Nuclearity / 4.2.8:
von Neumann algebra properties / 4.2.9:
Specific topics / 4.2.10:
Harmonic analysis / 5:
Fourier series / 5.1:
Invariant measures / 5.1.2:
Almost periodic functions / 5.1.3:
Uniqueness of invariant measures / 5.1.4:
Convolutions / 5.1.5:
An evolution linked to the history of physics / 5.1.6:
Representation theory / 5.1.7:
Structural properties of topological groups / 5.1.8:
Positive-definite functions / 5.1.9:
Harmonic synthesis / 5.1.10:
Metric locally compact Abelian groups / 5.1.11:
Fourier transforms / 5.2:
Convolution properties / 5.2.2:
Group representations / 5.2.3:
Remarkable Banach algebras of functions on a locally compact group / 5.2.4:
Specific sets / 5.2.5:
Specific groups / 5.2.6:
Harmonic analysis on semigroups / 5.2.7:
Wavelets / 5.2.8:
Generalized actions / 5.2.9:
Lie groups / 6:
Lie groups and Lie algebras / 6.1:
Symmetric Riemannian spaces / 6.1.2:
Hilbert's problem for Lie groups / 6.1.3:
Representations of Lie groups / 6.1.4:
The wide range of Lie group theory / 6.2:
Solution of Hilbert's problem on Lie groups / 6.2.2:
Ergodicity problems / 6.2.3:
Specific classes of Lie groups / 6.2.4:
Extensions of Lie group theory / 6.2.5:
Theory of functions and analytic geometry / 7:
The nineteenth century continued / 7.1:
Potential theory / 7.1.2:
Conformal mappings / 7.1.3:
Towards a theory of several complex variables / 7.1.4:
Accomplishments on previous topics / 7.2:
Hardy spaces / 7.2.2:
The dominance of the theory of several complex variables / 7.2.3:
Iteration problems / 7.2.4:
Ordinary and Partial Differential Equations / 8:
New trends for classical problems / 8.1:
Fixed point properties / 8.1.2:
From the ordinary differential case to the partial differential case / 8.1.3:
Differential equations / 8.2:
Partial differential equations / 8.2.2:
Tentacular subjects / 8.2.3:
Algebraic topology / 9:
The origins of algebraic topology / 9.1:
Simplicial theories / 9.1.2:
Homotopy theory / 9.1.3:
Fibres and fibrations / 9.1.4:
The breakthroughs due to Eilenberg, MacLane, and Leray / 9.1.5:
The power of the machinery / 9.2:
Generalizations / 9.2.2:
Differential topology / 10:
The beginning of the century / 10.1:
E. Cartan's work / 10.1.2:
Tensor products and exterior differentials / 10.1.3:
Morse theory / 10.1.4:
Whitney's work / 10.1.5:
De Rham's work / 10.1.6:
Hodge theory / 10.1.7:
The framing of the subject / 10.1.8:
The status of differentiable manifolds / 10.2:
Foliations / 10.2.2:
From Poincare's heritage / 10.2.3:
Global analysis / 10.2.5:
Probability / 11:
First results / 11.1:
Brownian motion / 11.1.2:
Ergodicity / 11.1.3:
Probabilities as measures / 11.1.4:
Stochastic integrals / 11.1.5:
Probability theory, a part of analysis / 11.2:
Dynamical systems and ergodicity / 11.2.2:
Entropy / 11.2.3:
Stochastic processes / 11.2.4:
Algebraic geometry / 12:
Algebraic geometry and number theory / 12.1:
The Mordell conjecture / 12.1.2:
Transcendence and prime numbers / 12.1.3:
The Riemann conjecture / 12.1.4:
Arithmetical properties / 12.2:
Investigations on transcendental numbers / 12.2.2:
A central object of study / 12.2.3:
Etale cohomology / 12.2.4:
The general Riemann-Roch theorems / 12.2.5:
K-theory / 12.2.6:
Further studies / 12.2.7:
References
Index of Names
Index of Terms
List of Symbols / Appendix:
Introduction / 1:
The scope of analysis / 1.1:
The great classics on analysis / 1.1.1:
44.

電子ブック

EB
Zoya Ignatova, Israel Martínez-Pérez, Karl-Heinz Zimmermann
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
References
Theoretical Computer Science / 2:
Graphs / 2.1:
Basic Notions / 2.1.1:
Paths and Cycles / 2.1.2:
Closures and Paths / 2.1.3:
Trees / 2.1.4:
Bipartite Graphs / 2.1.5:
Finite State Automata / 2.2:
Strings and Languages / 2.2.1:
Deterministic Finite State Automata / 2.2.2:
Non-Deterministic Finite State Automata / 2.2.3:
Regular Expressions / 2.2.4:
Stochastic Finite State Automata / 2.2.5:
Computability / 2.3:
Turing Machines / 2.3.1:
Universal Turing Machines / 2.3.2:
Church's Thesis / 2.3.3:
Register Machines / 2.3.4:
Cellular Automata / 2.3.5:
Formal Grammars / 2.4:
Grammars and Languages / 2.4.1:
Chomsky's Hierarchy / 2.4.2:
Grammars and Machines / 2.4.3:
Undecidability / 2.4.4:
Combinatorial Logic / 2.5:
Boolean Circuits / 2.5.1:
Compound Circuits / 2.5.2:
Minterms and Maxterms / 2.5.3:
Canonical Circuits / 2.5.4:
Adder Circuits / 2.5.5:
Computational Complexity / 2.6:
Time Complexity / 2.6.1:
Infinite Asymptotics / 2.6.2:
Decision Problems / 2.6.3:
Optimization Problems / 2.6.4:
Molecular Biology / 3:
DNA / 3.1:
Molecular Structure / 3.1.1:
Manipulation of DNA / 3.1.2:
Physical Chemistry / 3.2:
Thermodynamics / 3.2.1:
Chemical Kinetics / 3.2.2:
DNA Annealing Kinetics / 3.2.3:
Strand Displacement Kinetics / 3.2.4:
Stochastic Chemical Kinetics / 3.2.5:
Genes / 3.3:
Structure and Biosynthesis / 3.3.1:
DNA Recombination / 3.3.2:
Genomes / 3.3.3:
Gene Expression / 3.4:
Protein Biosynthesis / 3.4.1:
Proteins - Molecular Structure / 3.4.2:
Enzymes / 3.4.3:
Cells and Organisms / 3.5:
Eukaryotes and Prokaryotes / 3.5.1:
Viruses / 3.6:
General Structure and Classification / 3.6.1:
Applications / 3.6.2:
Word Design for DNA Computing / 4:
Constraints / 4.1:
Free Energy and Melting Temperature / 4.1.1:
Distance / 4.1.2:
Similarity / 4.1.3:
DNA Languages / 4.2:
Bond-Free Languages / 4.2.1:
Hybridization Properties / 4.2.2:
Small DNA Languages / 4.2.3:
DNA Code Constructions and Bounds / 4.3:
Reverse and Reverse-Complement Codes / 4.3.1:
Constant GC-Content Codes / 4.3.2:
Similarity-Based Codes / 4.3.3:
In Vitro Random Selection / 4.4:
General Selection Model / 4.4.1:
Selective Word Design / 4.4.2:
Concluding Remarks
Non-Autonomous DNA Models / 5:
Seminal Work / 5.1:
Adleman's First Experiment / 5.1.1:
Lipton's First Paper / 5.1.2:
Filtering Models / 5.2:
Memory-Less Filtering / 5.2.1:
Memory-Based Filtering / 5.2.2:
Mark-and-Destroy Filtering / 5.2.3:
Split-and-Merge Filtering / 5.2.4:
Filtering by Blocking / 5.2.5:
Surface-Based Filtering / 5.2.6:
Sticker Systems / 5.3:
Sticker Machines / 5.3.1:
Combinatorial Libraries / 5.3.2:
Useful Subroutines / 5.3.3:
NP-Complete Problems / 5.3.4:
Splicing Systems / 5.4:
Basic Splicing Systems / 5.4.1:
Recursively Enumerable Splicing Systems / 5.4.2:
Universal Splicing Systems / 5.4.3:
Recombinant Systems / 5.4.4:
Autonomous DNA Models / 6:
Algorithmic Self-Assembly / 6.1:
Self-Assembly / 6.1.1:
DNA Graphs / 6.1.2:
Linear Self-Assembly / 6.1.3:
Tile Assembly / 6.1.4:
Finite State Automaton Models / 6.2:
Two-State Two-Symbol Automata / 6.2.1:
Length-Encoding Automata / 6.2.2:
Sticker Automata / 6.2.3:
Stochastic Automata / 6.2.4:
DNA Hairpin Model / 6.3:
Whiplash PCR / 6.3.1:
Satisfiability / 6.3.2:
Hamiltonian Paths / 6.3.3:
Maximum Cliques / 6.3.4:
Hairpin Structures / 6.3.5:
Computational Models / 6.4:
Neural Networks / 6.4.1:
Tic-Tac-Toe Networks / 6.4.2:
Logic Circuits / 6.4.3:
Cellular DNA Computing / 6.4.4:
Ciliate Computing / 7.1:
Ciliates / 7.1.1:
Models of Gene Assembly / 7.1.2:
Intramolecular String Model / 7.1.3:
Intramolecular Graph Model / 7.1.4:
Intermolecular String Model / 7.1.5:
Biomolecular Computing / 7.2:
Gene Therapy / 7.2.1:
Anti-Sense Technology / 7.2.2:
Cell-Based Finite State Automata / 7.3:
Anti-Sense Finite State Automata / 7.4:
Basic Model / 7.4.1:
Diagnostic Rules / 7.4.2:
Diagnosis and Therapy / 7.4.3:
Computational Genes / 7.5:
Index / 7.5.1:
Introduction / 1:
References
Theoretical Computer Science / 2:
45.

図書

図書
M. Hinze ... [et al.]
出版情報: [Dordrecht] : Springer, c2009  xi, 270 p. ; 24 cm
シリーズ名: Mathematical modelling : theory and applications ; v. 23
所蔵情報: loading…
目次情報: 続きを見る
Preface
Analytical Background and Optimality Theory / 1:
Stefan Ulbrich
Introduction and Examples / 1.1:
Introduction / 1.1.1:
Examples for Optimization Problems with PDEs / 1.1.2:
Optimization of a Stationary Heating Process / 1.1.3:
Optimization of an Unsteady Heating Processes / 1.1.4:
Optimal Design / 1.1.5:
Linear Functional Analysis and Sobolev Spaces / 1.2:
Banach and Hilbert Spaces / 1.2.1:
Sobolev Spaces / 1.2.2:
Weak Convergence / 1.2.3:
Weak Solutions of Elliptic and Parabolic PDEs / 1.3:
Weak Solutions of Elliptic PDEs / 1.3.1:
Weak Solutions of Parabolic PDEs / 1.3.2:
Gateaux- and Fréchet Differentiability / 1.4:
Basic Definitions / 1.4.1:
Implicit Function Theorem / 1.4.2:
Existence of Optimal Controls / 1.5:
Existence Result for a General Linear-Quadratic Problem / 1.5.1:
Existence Result for Nonlinear Problems / 1.5.2:
Applications / 1.5.3:
Reduced Problem, Sensitivities and Adjoints / 1.6:
Sensitivity Approach / 1.6.1:
Adjoint Approach / 1.6.2:
Application to a Linear-Quadratic Optimal Control Problem / 1.6.3:
A Lagrangian-Based View of the Adjoint Approach / 1.6.4:
Second Derivatives / 1.6.5:
Optimality Conditions / 1.7:
Optimality Conditions for Simply Constrained Problems / 1.7.1:
Optimality Conditions for Control-Constrained Problems / 1.7.2:
Optimality Conditions for Problems with General Constraints / 1.7.3:
Optimal Control of Instationary Incompressible Navier-Stokes Flow / 1.8:
Functional Analytic Setting / 1.8.1:
Analysis of the Flow Control Problem / 1.8.2:
Reduced Optimal Control Problem / 1.8.3:
Optimization Methods in Banach Spaces / 2:
Michael Ulbrich
Synopsis / 2.1:
Globally Convergent Methods in Banach Spaces / 2.2:
Unconstrained Optimization / 2.2.1:
Optimization on Closed Convex Sets / 2.2.2:
General Optimization Problems / 2.2.3:
Newton-Based Methods-A Preview / 2.3:
Unconstrained Problems-Newton's Method / 2.3.1:
Simple Constraints / 2.3.2:
General Inequality Constraints / 2.3.3:
Generalized Newton Methods / 2.4:
Motivation: Application to Optimal Control / 2.4.1:
A General Superlinear Convergence Result / 2.4.2:
The Classical Newton's Method / 2.4.3:
Generalized Differential and Semismoothness / 2.4.4:
Semismooth Newton Methods / 2.4.5:
Semismooth Newton Methods in Function Spaces / 2.5:
Semismoothness of Superposition Operators / 2.5.1:
Application to Optimal Control / 2.5.3:
Application to Elliptic Optimal Control Problems / 2.5.5:
Optimal Control of the Incompressible Navier-Stokes Equations / 2.5.7:
Sequential Quadratic Programming / 2.6:
Lagrange-Newton Methods for Equality Constrained Problems / 2.6.1:
The Josephy-Newton Method / 2.6.2:
SQP Methods for Inequality Constrained Problems / 2.6.3:
State-Constrained Problems / 2.7:
SQP Methods / 2.7.1:
Further Aspects / 2.7.2:
Mesh Independence / 2.8.1:
Application of Fast Solvers / 2.8.2:
Other Methods / 2.8.3:
Discrete Concepts in PDE Constrained Optimization / 3:
Michael Hinze
Control Constraints / 3.1:
Stationary Model Problem / 3.2.1:
First Discretize, Then Optimize / 3.2.2:
First Optimize, Then Discretize / 3.2.3:
Discussion and Implications / 3.2.4:
The Variational Discretization Concept / 3.2.5:
Error Estimates / 3.2.6:
Boundary Control / 3.2.7:
Some Literature Related to Control Constraints / 3.2.8:
Constraints on the State / 3.3:
Pointwise Bounds on the State / 3.3.1:
Pointwise Bounds on the Gradient of the State / 3.3.2:
Time Dependent Problem / 3.4:
Mathematical Model, State Equation / 3.4.1:
Optimization Problem / 3.4.2:
Discretization / 3.4.3:
Further Literature on Control of Time-Dependent Problems / 3.4.4:
Rene Pinnau / 4:
Optimal Semiconductor Design / 4.1:
Semiconductor Device Physics / 4.1.1:
The Optimization Problem / 4.1.2:
Numerical Results / 4.1.3:
Optimal Control of Glass Cooling / 4.2:
Modeling / 4.2.1:
Optimal Boundary Control / 4.2.2:
References / 4.2.3:
Preface
Analytical Background and Optimality Theory / 1:
Stefan Ulbrich
46.

図書

図書
Oded Goldreich
出版情報: Cambridge : Cambridge University Press, 2008  xxiv, 606 p. ; 27 cm
所蔵情報: loading…
目次情報: 続きを見る
List of Figures
Preface
Organization and Chapter Summaries
Acknowledgments
Introduction and Preliminaries / 1:
Introduction / 1.1:
A Brief Overview of Complexity Theory / 1.1.1:
Characteristics of Complexity Theory / 1.1.2:
Contents of This Book / 1.1.3:
Approach and Style of This Book / 1.1.4:
Standard Notations and Other Conventions / 1.1.5:
Computational Tasks and Models / 1.2:
Representation / 1.2.1:
Computational Tasks / 1.2.2:
Uniform Models (Algorithms) / 1.2.3:
Non-uniform Models (Circuits and Advice) / 1.2.4:
Complexity Classes / 1.2.5:
Chapter Notes
P, NP, and NP-Completeness / 2:
The P Versus NP Question / 2.1:
The Search Version: Finding Versus Checking / 2.1.1:
The Decision Version: Proving Versus Verifying / 2.1.2:
Equivalence of the Two Formulations / 2.1.3:
Two Technical Comments Regarding NP / 2.1.4:
The Traditional Definition of NP / 2.1.5:
In Support of P Different from NP / 2.1.6:
Philosophical Meditations / 2.1.7:
Polynomial-Time Reductions / 2.2:
The General Notion of a Reduction / 2.2.1:
Reducing Optimization Problems to Search Problems / 2.2.2:
Self-Reducibility of Search Problems / 2.2.3:
Digest and General Perspective / 2.2.4:
NP-Completeness / 2.3:
Definitions / 2.3.1:
The Existence of NP-Complete Problems / 2.3.2:
Some Natural NP-Complete Problems / 2.3.3:
NP Sets That Are Neither in P nor NP-Complete / 2.3.4:
Reflections on Complete Problems / 2.3.5:
Three Relatively Advanced Topics / 2.4:
Promise Problems / 2.4.1:
Optimal Search Algorithms for NP / 2.4.2:
The Class coNP and Its Intersection with NP / 2.4.3:
Exercises
Variations on P and NP / 3:
Non-uniform Polynomial Time (P/poly) / 3.1:
Boolean Circuits / 3.1.1:
Machines That Take Advice / 3.1.2:
The Polynomial-Time Hierarchy (PH) / 3.2:
Alternation of Quantifiers / 3.2.1:
Non-deterministic Oracle Machines / 3.2.2:
The P/poly Versus NP Question and PH / 3.2.3:
More Resources, More Power? / 4:
Non-uniform Complexity Hierarchies / 4.1:
Time Hierarchies and Gaps / 4.2:
Time Hierarchies / 4.2.1:
Time Gaps and Speedup / 4.2.2:
Space Hierarchies and Gaps / 4.3:
Space Complexity / 5:
General Preliminaries and Issues / 5.1:
Important Conventions / 5.1.1:
On the Minimal Amount of Useful Computation Space / 5.1.2:
Time Versus Space / 5.1.3:
Circuit Evaluation / 5.1.4:
Logarithmic Space / 5.2:
The Class L / 5.2.1:
Log-Space Reductions / 5.2.2:
Log-Space Uniformity and Stronger Notions / 5.2.3:
Undirected Connectivity / 5.2.4:
Non-deterministic Space Complexity / 5.3:
Two Models / 5.3.1:
NL and Directed Connectivity / 5.3.2:
A Retrospective Discussion / 5.3.3:
PSPACE and Games / 5.4:
Randomness and Counting / 6:
Probabilistic Polynomial Time / 6.1:
Basic Modeling Issues / 6.1.1:
Two-Sided Error: The Complexity Class BPP / 6.1.2:
One-Sided Error: The Complexity Classes RP and coRP / 6.1.3:
Zero-Sided Error: The Complexity Class ZPP / 6.1.4:
Randomized Log-Space / 6.1.5:
Counting / 6.2:
Exact Counting / 6.2.1:
Approximate Counting / 6.2.2:
Searching for Unique Solutions / 6.2.3:
Uniform Generation of Solutions / 6.2.4:
The Bright Side of Hardness / 7:
One-Way Functions / 7.1:
Generating Hard Instances and One-Way Functions / 7.1.1:
Amplification of Weak One-Way Functions / 7.1.2:
Hard-Core Preicates / 7.1.3:
Reflections on Hardness Amplification / 7.1.4:
Hard Problems in E / 7.2:
Amplification with Respect to Polynomial-Size Circuits / 7.2.1:
Amplification with Respect to Exponential-Size Circuits / 7.2.2:
Pseudorandom Generators / 8:
The General Paradigm / 8.1:
General-Purpose Pseudorandom Generators / 8.2:
The Basic Definition / 8.2.1:
The Archetypical Application / 8.2.2:
Computational Indistinguishability / 8.2.3:
Amplifying the Stretch Function / 8.2.4:
Constructions / 8.2.5:
Non-uniformly Strong Pseudorandom Generators / 8.2.6:
Stronger Notions and Conceptual Reflections / 8.2.7:
Derandomization of Time-Complexity Classes / 8.3:
Defining Canonical Derandomizers / 8.3.1:
Constructing Canonical Derandomizers / 8.3.2:
Technical Variations and Conceptual Reflections / 8.3.3:
Space-Bounded Distinguishers / 8.4:
Definitional Issues / 8.4.1:
Two Constructions / 8.4.2:
Special-Purpose Generators / 8.5:
Pairwise Independence Generators / 8.5.1:
Small-Bias Generators / 8.5.2:
Random Walks on Expanders / 8.5.3:
Probabilistic Proof Systems / 9:
Interactive Proof Systems / 9.1:
Motivation and Perspective / 9.1.1:
Definition / 9.1.2:
The Power of Interactive Proofs / 9.1.3:
Variants and Finer Structure: An Overview / 9.1.4:
On Computationally Bounded Provers: An Overview / 9.1.5:
Zero-Knowledge Proof Systems / 9.2:
The Power of Zero-Knowledge / 9.2.1:
Proofs of Knowledge - A Parenthetical Subsection / 9.2.3:
Probabilistically Checkable Proof Systems / 9.3:
The Power of Probabilistically Checkable Proofs / 9.3.1:
PCP and Approximation / 9.3.3:
More on PCP Itself: An Overview / 9.3.4:
Relaxing the Requirements / 10:
Approximation / 10.1:
Search or Optimization / 10.1.1:
Decision or Property Testing / 10.1.2:
Average-Case Complexity / 10.2:
The Basic Theory / 10.2.1:
Ramifications / 10.2.2:
Epilogue
Glossary of Complexity Classes / Appendix A:
Preliminaries / A.1:
Algorithm-Based Classes / A.2:
Time Complexity Classes / A.2.1:
Space Complexity Classes / A.2.2:
Circuit-Based Classes / A.3:
On the Quest for Lower Bounds / Appendix B:
Boolean Circuit Complexity / B.1:
Basic Results and Questions / B.2.1:
Monotone Circuits / B.2.2:
Bounded-Depth Circuits / B.2.3:
Formula Size / B.2.4:
Arithmetic Circuits / B.3:
Univariate Polynomials / B.3.1:
Multivariate Polynomials / B.3.2:
Proof Complexity / B.4:
Logical Proof Systems / B.4.1:
Algebraic Proof Systems / B.4.2:
Geometric Proof Systems / B.4.3:
On the Foundations of Modern Cryptography / Appendix C:
The Underlying Principles / C.1:
The Computational Model / C.1.2:
Organization and Beyond / C.1.3:
Computational Difficulty / C.2:
Hard-Core Predicates / C.2.1:
Pseudorandomness / C.3:
Pseudorandom Functions / C.3.1:
Zero-Knowledge / C.4:
The Simulation Paradigm / C.4.1:
The Actual Definition / C.4.2:
A General Result and a Generic Application / C.4.3:
Definitional Variations and Related Notions / C.4.4:
Encryption Schemes / C.5:
Beyond Eavesdropping Security / C.5.1:
Signatures and Message Authentication / C.6:
General Cryptographic Protocols / C.6.1:
The Definitional Approach and Some Models / C.7.1:
Some Known Results / C.7.2:
Construction Paradigms and Two Simple Protocols / C.7.3:
Concluding Remarks / C.7.4:
Probabilistic Preliminaries and Advanced Topics in Randomization / Appendix D:
Probabilistic Preliminaries / D.1:
Notational Conventions / D.1.1:
Three Inequalities / D.1.2:
Hashing / D.2:
The Leftover Hash Lemma / D.2.1:
Sampling / D.3:
Formal Setting / D.3.1:
Known Results / D.3.2:
Hitters / D.3.3:
Randomnes Extractors / D.4:
Definitions and Various Perspectives / D.4.1:
Explicit Constructions / D.4.2:
Error-Correcting Codes / E.1:
Basic Notions / E.1.1:
A Few Popular Codes / E.1.2:
Two Additional Computational Problems / E.1.3:
A List-Decoding Bound / E.1.4:
Expander Graphs / E.2:
Definitions and Properties / E.2.1:
Some Omitted Proofs / E.2.2:
Proving That PH Reduces to #P / F.1:
Proving That IP(f) [characters not reproducible] AM(O(f)) [characters not reproducible] AM(f) / F.2:
Emulating General Interactive Proofs by AM-Games / F.2.1:
Linear Speedup for AM / F.2.2:
Some Computational Problems / Appendix G:
Graphs / G.1:
Boolean Formulae / G.2:
Finite Fields, Polynomials, and Vector Spaces / G.3:
The Determinant and the Permanent / G.4:
Primes and Composite Numbers / G.5:
Bibliography
Index
List of Figures
Preface
Organization and Chapter Summaries
47.

電子ブック

EB
Roland Zimmermann, Monique Calisti, Marius Walliser
出版情報: Springer eBooks Computer Science , Dordrecht : Birkh?user Basel, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
Event-related Information Logistics / 2.1.1:
Supply Networks / 2.1.2:
Formal Specification of the Problem / 2.1.3:
Requirements of an Event Management Solution / 2.2:
General Requirements / 2.2.1:
Functional Requirements / 2.2.2:
Data Requirements / 2.2.3:
Implications / 2.2.4:
Potential Benefits / 2.3:
Benefits for Single Enterprises / 2.3.1:
Analysis of Supply Network Effects / 2.3.2:
Benefits for Supply Networks / 2.3.3:
Summary on Potential Benefits / 2.3.4:
Existing Approaches / 2.4:
Tracking Systems / 2.4.1:
SCEM Software / 2.4.2:
Conclusion on Existing Approaches / 2.4.3:
Information Base for Event Management / 3:
Data Model / 3.1:
Representation of the Supply Network Domain / 3.1.1:
Aggregation and Refinement of Status Data / 3.1.2:
Disruptive Event Data for Decision Support / 3.1.3:
Extendable Data Structures / 3.1.4:
Semantic Interoperability / 3.2:
Requirements for Semantic Interoperability / 3.2.1:
Ontology for Supply Network Event Management / 3.2.2:
Data Sources / 3.3:
Data Bases / 3.3.1:
Internet Sources and Web Services / 3.3.2:
Radio Frequency Identification Technologies / 3.3.3:
Event Management Functions / 4:
Information Gathering in Supply Networks / 4.1:
Trigger Events / 4.1.1:
Inter-organizational Information Gathering / 4.1.2:
Proactive and Flexible Monitoring / 4.2:
Critical Profiles / 4.2.1:
Discovery of Critical Profiles / 4.2.2:
Continuous Assessment of Critical Profiles / 4.2.3:
Analysis and Interpretation of Event Data / 4.3:
Basic Approach / 4.3.1:
Data Interpretation with Fuzzy Logic / 4.3.2:
Aggregated Order Status / 4.3.3:
Assessment of Disruptive Events / 4.3.4:
Adjustment of Milestone Plans / 4.3.5:
Distribution of Event Data / 4.4:
Alert Management Process / 4.4.1:
Alert Decision Management / 4.4.2:
Escalation Management / 4.4.3:
Selection of Recipient and Media Type / 4.4.4:
Selection of Content / 4.4.5:
Event Management Process / 4.5:
Distributed Event Management in Supply Networks / 4.5.1:
Agent-based Concept / 5:
Software Agents and Supply Network Event Management / 5.1:
Introduction to Software Agents / 5.1.1:
Benefits of Agent Technology for Event Management / 5.1.2:
Related Work in Agent Technologies / 5.1.3:
Agent Oriented Software Engineering / 5.2:
Approaches / 5.2.1:
AUML for Supply Network Event Management / 5.2.2:
Agent Society for Supply Network Event Management / 5.3:
Roles and Agent Types / 5.3.1:
Agent Interactions / 5.3.2:
Institutional Agreements / 5.3.3:
Coordination Agent / 5.4:
Structure / 5.4.1:
Behaviors / 5.4.2:
Interactions / 5.4.3:
Surveillance Agent / 5.5:
Discourse Agent / 5.5.1:
Wrapper Agent / 5.6.1:
Prototype Implementations / 5.7.1:
Generic Prototype / 6.1:
Overview / 6.1.1:
Ontology Integration / 6.1.2:
Supply Network Testbed / 6.1.3:
Simulated Enterprise Data Base / 6.2.1:
Simulator / 6.2.2:
Industry Showcase / 6.3:
Evaluation / 6.3.1:
Concept / 7.1:
Constraints to an Evaluation / 7.1.1:
Multi-dimensional Evaluation / 7.1.2:
Analytical Evaluation / 7.2:
Effects of SNEM Cycles / 7.2.1:
Costs of Event Management / 7.2.2:
Cost-Benefit-Model and Benchmarks / 7.2.3:
Supply Network Effects / 7.2.4:
Event Management with Profiles / 7.2.5:
Conclusions / 7.2.6:
Experimental Evaluation / 7.3:
Reaction Function / 7.3.1:
Experimental Results / 7.3.2:
Cost-Benefit Analysis / 7.3.3:
Showcase Evaluation / 7.3.4:
Prototype Assessment / 7.4.1:
Analysis of Follow-up Costs / 7.4.2:
Summary - Benefits and Constraints / 7.4.3:
Conclusions and Outlook / 8:
Supply Network Event Management / 8.1:
Further Research Opportunities / 8.2:
Object Chips for Supply Network Event Management / 8.2.1:
Event Management in other Domains / 8.2.2:
Integration and Acceptance Issues / 8.2.3:
Appendices
References
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
48.

図書

図書
A.A. Martynyuk
出版情報: New York : Marcel Dekker, c2002  x, 301 p. ; 24 cm
シリーズ名: Monographs and textbooks in pure and applied mathematics ; 246
所蔵情報: loading…
目次情報: 続きを見る
Preface
Preliminaries / 1:
Introduction / 1.1:
Nonlinear Continuous Systems / 1.2:
General equations of nonlinear dynamics / 1.2.1:
Perturbed motion equations / 1.2.2:
Definitions of Stability / 1.3:
Scalar, Vector and Matrix-Valued Liapunov Functions / 1.4:
Auxiliary scalar functions / 1.4.1:
Comparison functions / 1.4.2:
Vector Liapunov functions / 1.4.3:
Matrix-valued metafunction / 1.4.4:
Comparison Principle / 1.5:
Liapunov-Like Theorems / 1.6:
Matrix-valued function and its properties / 1.6.1:
A version of the original theorems of Liapunov / 1.6.2:
Advantages of Cone-Valued Liapunov Functions / 1.7:
Stability with respect to two measures / 1.7.1:
Stability analysis of large scale systems / 1.7.2:
Liapunov's Theorems for Large Scale Systems in General / 1.8:
Why are matrix-valued Liapunov functions needed? / 1.8.1:
Stability and instability of large scale systems / 1.8.2:
Notes / 1.9:
Qualitative Analysis of Continuous Systems / 2:
Nonlinear Systems with Mixed Hierarchy of Subsystems / 2.1:
Mixed hierarchical structures / 2.2.1:
Hierarchical matrix function structure / 2.2.2:
Structure of hierarchical matrix function derivative / 2.2.3:
Stability and instability conditions / 2.2.4:
Linear autonomous system / 2.2.5:
Examples of third order systems / 2.2.6:
Dynamics of the Systems with Regular Hierarchy Subsystems / 2.3:
Ikeda-Siljak hierarchical decomposition / 2.3.1:
Hierarchical Liapunov's matrix-valued functions / 2.3.2:
Linear nonautonomous systems / 2.3.3:
Stability Analysis of Large Scale Systems / 2.4:
A class of large scale systems / 2.4.1:
Construction of nondiagonal elements of matrix-valued function / 2.4.2:
Test for stability analysis / 2.4.3:
Linear large scale system / 2.4.4:
Discussion and numerical example / 2.4.5:
Overlapping Decomposition and Matrix-Valued Function Construction / 2.5:
Dynamical system extension / 2.5.1:
Liapunov matrix-valued function construction / 2.5.2:
Test for stability of system (2.5.1) / 2.5.3:
Numerical example / 2.5.4:
Exponential Polystability Analysis of Separable Motions / 2.6:
Statement of the Problem / 2.6.1:
A method for the solution of the problem / 2.6.2:
Autonomous system / 2.6.3:
Polystability by the first order approximations / 2.6.4:
Integral and Lipschitz Stability / 2.7:
Definitions / 2.7.1:
Sufficient conditions for integral and asymptotic integral stability / 2.7.2:
Uniform Lipschitz stability / 2.7.3:
Qualitative Analysis of Discrete-Time Systems / 2.8:
Systems Described by Difference Equations / 3.1:
Matrix-Valued Liapunov Functions Method / 3.3:
Auxiliary results / 3.3.1:
Comparison principle application / 3.3.2:
General theorems on stability / 3.3.3:
Large Scale System Decomposition / 3.4:
Stability and Instability of Large Scale Systems / 3.5:
Auxiliary estimates / 3.5.1:
Autonomous Large Scale Systems / 3.5.2:
Hierarchical Analysis of Stability / 3.7:
Hierarchical decomposition and stability conditions / 3.7.1:
Novel tests for connective stability / 3.7.2:
Controlled Systems / 3.8:
Nonlinear Dynamics of Impulsive Systems / 3.9:
Large Scale Impulsive Systems in General / 4.1:
Notations and definitions / 4.2.1:
Sufficient stability conditions / 4.2.2:
Instability conditions / 4.2.4:
Hierarchical Impulsive Systems / 4.3:
Analytical Construction of Liapunov Function / 4.4:
Structure of hierarchical matrix-valued Liapunov function / 4.4.1:
Structure of the total derivative of hierarchical matrix-valued function / 4.4.2:
Uniqueness and Continuability of Solutions / 4.5:
On Boundedness of the Solutions / 4.6:
Novel Methodology for Stability / 4.7:
Stability conditions / 4.7.1:
Applications / 4.8:
Estimations of Asymptotic Stability Domains in General / 5.1:
A fundamental Zubov's result / 5.2.1:
Some estimates for quadratic matrix-valued functions / 5.2.2:
Algorithm of constructing a point network covering boundary of domain E / 5.2.3:
Numerical realization and discussion of the algorithm / 5.2.4:
Illustrative examples / 5.2.5:
Construction of Estimate for the Domain E of Power System / 5.3:
Oscillations and Stability of Some Mechanical Systems / 5.4:
Three-mass systems / 5.4.1:
Nonautonomous oscillator / 5.4.2:
Absolute Stability of Discrete Systems / 5.5:
References / 5.6:
Subject Index
Preface
Preliminaries / 1:
Introduction / 1.1:
49.

電子ブック

EB
Roland Zimmermann, Monique Calisti, Marius Walliser, Thomas Hempfling
出版情報: SpringerLink Books - AutoHoldings , Dordrecht : Birkhäuser Basel, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
Event-related Information Logistics / 2.1.1:
Supply Networks / 2.1.2:
Formal Specification of the Problem / 2.1.3:
Requirements of an Event Management Solution / 2.2:
General Requirements / 2.2.1:
Functional Requirements / 2.2.2:
Data Requirements / 2.2.3:
Implications / 2.2.4:
Potential Benefits / 2.3:
Benefits for Single Enterprises / 2.3.1:
Analysis of Supply Network Effects / 2.3.2:
Benefits for Supply Networks / 2.3.3:
Summary on Potential Benefits / 2.3.4:
Existing Approaches / 2.4:
Tracking Systems / 2.4.1:
SCEM Software / 2.4.2:
Conclusion on Existing Approaches / 2.4.3:
Information Base for Event Management / 3:
Data Model / 3.1:
Representation of the Supply Network Domain / 3.1.1:
Aggregation and Refinement of Status Data / 3.1.2:
Disruptive Event Data for Decision Support / 3.1.3:
Extendable Data Structures / 3.1.4:
Semantic Interoperability / 3.2:
Requirements for Semantic Interoperability / 3.2.1:
Ontology for Supply Network Event Management / 3.2.2:
Data Sources / 3.3:
Data Bases / 3.3.1:
Internet Sources and Web Services / 3.3.2:
Radio Frequency Identification Technologies / 3.3.3:
Event Management Functions / 4:
Information Gathering in Supply Networks / 4.1:
Trigger Events / 4.1.1:
Inter-organizational Information Gathering / 4.1.2:
Proactive and Flexible Monitoring / 4.2:
Critical Profiles / 4.2.1:
Discovery of Critical Profiles / 4.2.2:
Continuous Assessment of Critical Profiles / 4.2.3:
Analysis and Interpretation of Event Data / 4.3:
Basic Approach / 4.3.1:
Data Interpretation with Fuzzy Logic / 4.3.2:
Aggregated Order Status / 4.3.3:
Assessment of Disruptive Events / 4.3.4:
Adjustment of Milestone Plans / 4.3.5:
Distribution of Event Data / 4.4:
Alert Management Process / 4.4.1:
Alert Decision Management / 4.4.2:
Escalation Management / 4.4.3:
Selection of Recipient and Media Type / 4.4.4:
Selection of Content / 4.4.5:
Event Management Process / 4.5:
Distributed Event Management in Supply Networks / 4.5.1:
Agent-based Concept / 5:
Software Agents and Supply Network Event Management / 5.1:
Introduction to Software Agents / 5.1.1:
Benefits of Agent Technology for Event Management / 5.1.2:
Related Work in Agent Technologies / 5.1.3:
Agent Oriented Software Engineering / 5.2:
Approaches / 5.2.1:
AUML for Supply Network Event Management / 5.2.2:
Agent Society for Supply Network Event Management / 5.3:
Roles and Agent Types / 5.3.1:
Agent Interactions / 5.3.2:
Institutional Agreements / 5.3.3:
Coordination Agent / 5.4:
Structure / 5.4.1:
Behaviors / 5.4.2:
Interactions / 5.4.3:
Surveillance Agent / 5.5:
Discourse Agent / 5.5.1:
Wrapper Agent / 5.6.1:
Prototype Implementations / 5.7.1:
Generic Prototype / 6.1:
Overview / 6.1.1:
Ontology Integration / 6.1.2:
Supply Network Testbed / 6.1.3:
Simulated Enterprise Data Base / 6.2.1:
Simulator / 6.2.2:
Industry Showcase / 6.3:
Evaluation / 6.3.1:
Concept / 7.1:
Constraints to an Evaluation / 7.1.1:
Multi-dimensional Evaluation / 7.1.2:
Analytical Evaluation / 7.2:
Effects of SNEM Cycles / 7.2.1:
Costs of Event Management / 7.2.2:
Cost-Benefit-Model and Benchmarks / 7.2.3:
Supply Network Effects / 7.2.4:
Event Management with Profiles / 7.2.5:
Conclusions / 7.2.6:
Experimental Evaluation / 7.3:
Reaction Function / 7.3.1:
Experimental Results / 7.3.2:
Cost-Benefit Analysis / 7.3.3:
Showcase Evaluation / 7.3.4:
Prototype Assessment / 7.4.1:
Analysis of Follow-up Costs / 7.4.2:
Summary - Benefits and Constraints / 7.4.3:
Conclusions and Outlook / 8:
Supply Network Event Management / 8.1:
Further Research Opportunities / 8.2:
Object Chips for Supply Network Event Management / 8.2.1:
Event Management in other Domains / 8.2.2:
Integration and Acceptance Issues / 8.2.3:
Appendices
References
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
50.

電子ブック

EB
Ralf Küsters
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2001
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Description Logics / 2:
History / 2.1:
Syntax and Semantics of Description Logics / 2.2:
Concept Descriptions / 2.2.1:
Terminologies (TBoxes) / 2.2.2:
World Descriptions (ABoxes) / 2.2.3:
Standard Inferences / 2.3:
Decision Algorithms / 2.4:
Non-Standard Inferences / 3:
LCS and MSC / 3.1:
Definition of LCS and MSC / 3.1.1:
Applications of LCS and MSC / 3.1.2:
Previous Results / 3.1.3:
New Results / 3.1.4:
Matching / 3.2:
Definition of Matching Problems / 3.2.1:
Applications of Matching / 3.2.2:
Solutions of Matching Problems / 3.2.3:
The Underlying Techniques / 3.2.4:
Other Non-Standard Inferences / 3.4:
Characterizing Subsumption / 4:
Subsumption in ALNS / 4.1:
A Graph-Based Characterization of Subsumption / 4.1.1:
A Description-Based Characterization of Subsumption / 4.1.2:
Subsumption in ALE / 4.2:
A Tree-Based Characterization of Subsumption / 4.3.1:
LCS for ALNS-Concept Descriptions / 4.3.2:
The LCS in ALNS / 5.1.1:
The LCS in LS / 5.1.2:
LCS for ALE-Concept Descriptions / 5.2:
Matching in ALNS / 6:
Deciding the Solvability of Matching Problems / 6.1.1:
Computing Minimal i-Complete Sets / 6.1.2:
Computing Minimal d-Complete Sets / 6.1.3:
Deciding the Solvability of Matching / 6.2:
Matching in ALE / 6.2.2:
Matching in EL / 6.3.1:
Equivalence of ALE-Concept Descriptions / 6.3.2:
Deciding the Solvability of Matching in FLE / 6.3.3:
Deciding the Solvability of Matching in ALE / 6.3.4:
Computing i-Minimal Matchers in ALE / 6.3.5:
Computing d-Minimal Matchers in ALE / 6.3.6:
Conclusion / 7:
References
Index
Introduction / 1:
Description Logics / 2:
History / 2.1:
51.

図書

図書
Noboru Ono
出版情報: New York : Wiley-VCH, c2001  xvi, 372 p. ; 25 cm
シリーズ名: Organic nitro chemistry series
所蔵情報: loading…
目次情報: 続きを見る
Series Foreword
Preface
Acknowledgments
Abbreviations
Introduction / 1.:
Preparation of Nitro Compounds / 2.:
Nitration of Hydrocarbons / 2.1:
Aromatic Compounds / 2.1.1:
Alkanes / 2.1.2:
Activated C-H Compounds / 2.1.3:
Alkenes / 2.1.4:
Synthesis of [alpha]-Nitro Ketones / 2.1.5:
Nitration of Alkyl Halides / 2.1.6:
Synthesis of Nitro Compounds by Oxidation / 2.2:
Oxidation of Amines / 2.2.1:
Oxidation of Oximes / 2.2.2:
The Nitro-Aldol (Henry) Reaction / 3.:
Preparation of [beta]-Nitro Alcohols / 3.1:
Derivatives from [beta]-Nitro Alcohols / 3.2:
Nitroalkenes / 3.2.1:
Nitroalkanes / 3.2.2:
[alpha]-Nitro Ketones / 3.2.3:
[beta]-Amino Alcohols / 3.2.4:
Nitro Sugars and Amino Sugars / 3.2.5:
Stereoselective Henry Reactions and Applications to Organic Synthesis / 3.3:
Michael Addition / 4.:
Addition to Nitroalkenes / 4.1:
Conjugate Addition of Heteroatom-Centered Nucleophiles / 4.1.1:
Conjugate Addition of Heteroatom Nucleophiles and Subsequent Nef Reaction / 4.1.2:
Conjugate Addition of Carbon-Centered Nucleophiles / 4.1.3:
Addition and Elimination Reaction of [beta]-Heterosubstituted Nitroalkenes / 4.2:
Michael Addition of Nitroalkanes / 4.3:
Intermolecular Addition / 4.3.1:
Intramolecular Addition / 4.3.2:
Asymmetric Michael Addition / 4.4:
Chiral Alkenes and Chiral Nitro Compounds / 4.4.1:
Chiral Catalysts / 4.4.2:
Alkylation, Acylation, and Halogenation of Nitro Compounds / 5.:
Alkylation of Nitro Compounds / 5.1:
Acylation of Nitroalkanes / 5.2:
Ring Cleavage of Cyclic [alpha]-Nitro Ketones (Retro-Acylation) / 5.3:
Alkylation of Nitro Compounds via Alkyl Radicals / 5.4:
Alkylation of Nitro Compounds Using Transition Metal Catalysis / 5.5:
Butadiene Telomerization / 5.5.1:
Pd-Catalyzed Allylic C-Alkylation of Nitro Compounds / 5.5.2:
Arylation of Nitro Compounds / 5.6:
Introduction of Heteroatoms to Nitroalkanes / 5.7:
Conversion of Nitro Compounds into Other Compounds / 6.:
Nef Reaction (Aldehydes, Ketones, and Carboxylic Acids) / 6.1:
Treatment With Acid (Classical Procedure) / 6.1.1:
Oxidative Method / 6.1.2:
Reductive Method / 6.1.3:
Direct Conversion of Nitroalkenes to Carbonyl Compounds / 6.1.4:
Nitrile Oxides and Nitriles / 6.2:
Reduction of Nitro Compounds into Amines / 6.3:
Ar-NH[subscript 2] From Ar-NO[subscript 2] / 6.3.1:
R-NH[subscript 2] From R-NO[subscript 2] / 6.3.2:
Oximes, Hydroxylamines, and Other Nitrogen Derivatives / 6.3.3:
Substitution and Elimination of NO[subscript 2] in R-NO[subscript 2] / 7.:
R-Nu from R-NO[subscript 2] / 7.1:
Radical Reactions (S[subscript RN]1) / 7.1.1:
Ionic Process / 7.1.2:
Intramolecular Nucleophilic Substitution Reaction / 7.1.3:
Allylic Rearrangement / 7.1.4:
R-H from R-NO[subscript 2] / 7.2:
Radical Denitration / 7.2.1:
Ionic Denitration / 7.2.2:
Alkenes from R-NO[subscript 2] / 7.3:
Radical Elimination / 7.3.1:
Ionic Elimination of Nitro Compounds / 7.3.2:
Cycloaddition Chemistry of Nitro Compounds / 8.:
Diels-Alder Reactions / 8.1:
Nitroalkenes Using Dienophiles / 8.1.1:
Asymmetric Diels-Alder Reaction / 8.1.2:
1,3-Dipolar Cycloaddition / 8.2:
Nitrones / 8.2.1:
Nitrile Oxides / 8.2.2:
Nitronates / 8.2.3:
Nitroalkenes as Heterodienes in Tandem [4+2]/[3+2] Cycloaddition / 8.3:
Nitroalkenes as Heterodienes / 8.3.1:
Tandem [4+2]/[3+2] Cycloaddition of Nitroalkenes / 8.3.2:
Nucleophilic Aromatic Displacement / 9.:
S[subscript N]Ar / 9.1:
Nucleophilic Aromatic Substitution of Hydrogen (NASH) / 9.2:
Carbon Nucleophiles / 9.2.1:
Nitrogen and Other Heteroatom Nucleophiles / 9.2.2:
Applications to Synthesis of Heterocyclic Compounds / 9.2.3:
Synthesis of Heterocyclic Compounds / 10.:
Pyrroles / 10.1:
Synthesis of Indoles / 10.2:
Synthesis of Other Nitrogen Heterocycles / 10.3:
Three-Membered Ring / 10.3.1:
Five- and Six-Membered Saturated Rings / 10.3.2:
Miscellaneous / 10.3.3:
Index
Series Foreword
Preface
Acknowledgments
52.

図書

図書
F. Grossmann
出版情報: Berlin : Springer, c2008  xiii, 214 p. ; 24 cm
シリーズ名: Springer series on atomic, optical, and plasma physics ; 48
所蔵情報: loading…
目次情報: 続きを見る
Prerequisites / Part I:
A Short Introduction to Laser Physics / 1:
The Einstein Coefficients / 1.1:
Fundamentals of the Laser / 1.2:
Elementary Laser Theory / 1.2.1:
Realization of the Laser Principle / 1.2.2:
Pulsed Lasers / 1.3:
Frequency Comb / 1.3.1:
Carrier Envelope Phase / 1.3.2:
Husimi Representation of Laser Pulses / 1.3.3:
Some Gaussian Integrals / 1.A:
References
Time-Dependent Quantum Theory / 2:
The Time-Dependent Schrodinger Equation / 2.1:
Introduction / 2.1.1:
Time-Evolution Operator / 2.1.2:
Spectral Information / 2.1.3:
Analytical Solutions for Wavepackets / 2.1.4:
Analytical Approaches / 2.2:
Feynman's Path Integral / 2.2.1:
Semiclassical Approximation / 2.2.2:
Time-Dependent Perturbation Theory / 2.2.3:
Magnus Expansion / 2.2.4:
Time-Dependent Hartree Method / 2.2.5:
Quantum-Classical Methods / 2.2.6:
Floquet Theory / 2.2.7:
Numerical Methods / 2.3:
Orthogonal Basis Expansion / 2.3.1:
Split-Operator FFT Method / 2.3.2:
Alternative Methods of Time-Evolution / 2.3.3:
Semiclassical Initial Value Representations / 2.3.4:
The Royal Road to the Path Integral / 2.A:
Variational Calculus / 2.B:
Stability Matrix / 2.C:
From the HK- to the VVG-Propagator / 2.D:
Applications / Part II:
Field Matter Coupling and Two-Level Systems / 3:
Light Matter Interaction / 3.1:
Minimal Coupling / 3.1.1:
Length Gauge / 3.1.2:
Kramers-Henneberger Transformation / 3.1.3:
Volkov Wavepacket / 3.1.4:
Analytically Solvable Two-Level Problems / 3.2:
Dipole Matrix Element / 3.2.1:
Rabi Oscillations Induced by a Constant Perturbation / 3.2.2:
Time-Dependent Perturbations / 3.2.3:
Exactly Solvable Time-Dependent Cases / 3.2.4:
Generalized Parity Transformation / 3.A:
Two-Level System in an Incoherent Field / 3.B:
Single Electron Atoms in Strong Laser Fields / 4:
The Hydrogen Atom / 4.1:
Hydrogen in Three Dimensions / 4.1.1:
The One-Dimensional Coulomb Problem / 4.1.2:
Field Induced Ionization / 4.2:
Tunnel Ionization / 4.2.1:
Multiphoton Ionization / 4.2.2:
ATI in the Coulomb Potential / 4.2.3:
Stabilization in Very Strong Fields / 4.2.4:
Atoms Driven by HCP / 4.2.5:
High Harmonic Generation / 4.3:
Three-Step Model / 4.3.1:
Odd Harmonics Rule / 4.3.2:
Semiclassical Explanation of the Plateau / 4.3.3:
Cutoff and Odd Harmonics Revisited / 4.3.4:
More on Atomic Units / 4.A:
Molecules in Strong Laser Fields / 5:
The Molecular Ion H[superscript + subscript 2] / 5.1:
Electronic Potential Energy Surfaces / 5.1.1:
The Morse Potential / 5.1.2:
H[superscript + subscript 2] in a Laser Field / 5.2:
Frozen Nuclei / 5.2.1:
Nuclei in Motion / 5.2.2:
Adiabatic and Nonadiabatic Nuclear Dynamics / 5.3:
Born-Oppenheimer Approximation / 5.3.1:
Dissociation in a Morse Potential / 5.3.2:
Coupled Potential Surfaces / 5.3.3:
Femtosecond Spectroscopy / 5.3.4:
Control of Molecular Dynamics / 5.4:
Control of Tunneling / 5.4.1:
Control of Population Transfer / 5.4.2:
Optimal Control Theory / 5.4.3:
Genetic Algorithms / 5.4.4:
Toward Quantum Computing with Molecules / 5.4.5:
Relative and Center of Mass Coordinates for H[superscript + subscript 2] / 5.A:
Perturbation Theory for Two Coupled Surfaces / 5.B:
Reflection Principle of Photodissociation / 5.C:
The Undriven Double Well Problem / 5.D:
The Quantum Mechanical Adiabatic Theorem / 5.E:
Index
Prerequisites / Part I:
A Short Introduction to Laser Physics / 1:
The Einstein Coefficients / 1.1:
53.

図書

図書
Nam-Trung Nguyen, Steven T. Wereley
出版情報: Boston : Artech House, c2002  xiii, 471 p. ; 24 cm
シリーズ名: MEMS--Microelectromechanical systems series
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgments
Introduction / Chapter 1:
Microfluidics--The Emerging Technology / 1.1:
What Is Microfluidics? / 1.1.1:
Commercial Aspects / 1.1.2:
Scientific Aspects / 1.1.3:
Milestones of Microfluidics / 1.2:
Device Development / 1.2.1:
Technology Development / 1.2.2:
Organization of the Book / 1.3:
References
Fluid Mechanics Theory / Chapter 2:
Intermolecular Forces / 2.1:
The Three States of Matter / 2.1.2:
Continuum Assumption / 2.1.3:
Continuum Fluid Mechanics at Small Scales / 2.2:
Gas Flows / 2.2.1:
Liquid Flows / 2.2.2:
Boundary Conditions / 2.2.3:
Parallel Flows / 2.2.4:
Low Reynolds Number Flows / 2.2.5:
Entrance Effects / 2.2.6:
Surface Tension / 2.2.7:
Molecular Approaches / 2.3:
MD / 2.3.1:
DSMC Technique / 2.3.2:
Electrokinetics / 2.4:
Electro-Osmosis / 2.4.1:
Electrophoresis / 2.4.2:
Dielectrophoresis / 2.4.3:
Conclusion / 2.5:
Problems
Fabrication Techniques for Microfluidics / Chapter 3:
Basic Microtechniques / 3.1:
Photolithography / 3.1.1:
Additive Techniques / 3.1.2:
Subtractive Techniques / 3.1.3:
Pattern Transfer Techniques / 3.1.4:
Silicon-Based Micromachining Techniques / 3.2:
Silicon Bulk Micromachining / 3.2.1:
Silicon Surface Micromachining / 3.2.2:
Polymer-Based Micromachining Techniques / 3.3:
Thick Resist Lithography / 3.3.1:
Polymeric Surface Micromachining / 3.3.2:
Soft Lithography / 3.3.3:
Microstereo Lithography / 3.3.4:
Micromolding / 3.3.5:
Other Micromachining Techniques / 3.4:
Assembly and Packaging of Microfluidic Devices / 3.4.1:
Wafer Level Assembly and Packaging / 3.5.1:
Device Level Packaging / 3.5.2:
Biocompatibility / 3.6:
Material Response / 3.6.1:
Tissue and Cellular Response / 3.6.2:
Biocompatibility Tests / 3.6.3:
Experimental Flow Characterization / Chapter 4:
Pointwise Methods / 4.1:
Full-Field Methods / 4.1.2:
Overview of Micro-PIV / 4.2:
Fundamental Physics Considerations of Micro-PIV / 4.2.1:
Special Processing Methods for Micro-PIV Recordings / 4.2.2:
Advanced Processing Methods Suitable for Both Micro/Macro-PIV Recordings / 4.2.3:
Micro-PIV Examples / 4.3:
Flow in a Microchannel / 4.3.1:
Flow in a Micronozzle / 4.3.2:
Flow Around a Blood Cell / 4.3.3:
Flow in Microfluidic Biochip / 4.3.4:
Conclusions / 4.3.5:
Extensions of the Micro-PIV technique / 4.4:
Microfluidic Nanoscope / 4.4.1:
Microparticle Image Thermometry / 4.4.2:
Infrared Micro-PIV / 4.4.3:
Particle Tracking Velocimetry / 4.4.4:
Microfluidics for External Flow Control / Chapter 5:
Velocity and Turbulence Measurement / 5.1:
Velocity Sensors / 5.1.1:
Shear Stress Sensors / 5.1.2:
Turbulence Control / 5.2:
Microflaps / 5.2.1:
Microballoon / 5.2.2:
Microsynthetic Jet / 5.2.3:
Microair Vehicles / 5.3:
Fixed-Wing MAV / 5.3.1:
Flapping-Wing MAV / 5.3.2:
Microrotorcraft / 5.3.3:
Microrockets / 5.3.4:
Microfluidics for Internal Flow Control: Microvalves / Chapter 6:
Design Considerations / 6.1:
Actuators / 6.1.1:
Valve Spring / 6.1.2:
Valve Seat / 6.1.3:
Pressure Compensation Design / 6.1.4:
Pneumatic Valves / 6.2:
Pneumatic Actuators / 6.2.1:
Design Examples / 6.2.2:
Thermopneumatic Valves / 6.3:
Thermopneumatic Actuators / 6.3.1:
Thermomechanical Valves / 6.3.2:
Solid-Expansion Valves / 6.4.1:
Bimetallic Valves / 6.4.2:
Shape-Memory Alloy Valves / 6.4.3:
Piezoelectric Valves / 6.5:
Piezoelectric Actuators / 6.5.1:
Electrostatic Valves / 6.5.2:
Electrostatic Actuators / 6.6.1:
Electromagnetic Valves / 6.6.2:
Electromagnetic Actuators / 6.7.1:
Electrochemical Valves / 6.7.2:
Capillary-Force Valves / 6.9:
Capillary-Force Actuators / 6.9.1:
Microfluidics for Internal Flow Control: Micropumps / 6.9.2:
Mechanical Pumps / 7.1:
Check-Valve Pumps / 7.1.1:
Peristaltic Pumps / 7.1.3:
Valveless Rectification Pumps / 7.1.4:
Rotary Pumps / 7.1.5:
Centrifugal Pumps / 7.1.6:
Ultrasonic Pumps / 7.1.7:
Nonmechanical Pumps / 7.2:
Electrical Pumps / 7.2.1:
Surface Tension Driven Pumps / 7.2.2:
Chemical Pumps / 7.2.3:
Magnetic Pumps / 7.2.4:
Scaling Law for Micropumps / 7.3:
Microfluidics for Internal Flow Control: Microflow Sensors / Chapter 8:
Nonthermal Flow Sensors / 8.1:
Differential Pressure Flow Sensors / 8.1.1:
Drag Force Flow Sensors / 8.1.2:
Lift Force Flow Sensors / 8.1.3:
Coriolis Flow Sensors / 8.1.4:
Electrohydrodynamic Flow Sensors / 8.1.5:
Thermal Flow Sensors / 8.2:
Thermoresistive Flow Sensors / 8.2.1:
Thermocapacitive Flow Sensors / 8.2.3:
Thermoelectric Flow Sensors / 8.2.4:
Thermoelectronic Flow Sensors / 8.2.5:
Pyroelectric Flow Sensors / 8.2.6:
Frequency Analog Sensors / 8.2.7:
Microfluidics for Life Sciences and Chemistry / Chapter 9:
Microfilters / 9.1:
Microneedles / 9.1.1:
Micromixers / 9.2.1:
Microreactors / 9.3.1:
Microdispensers / 9.4.1:
Microseparators / 9.5.1:
Gas Chromatography / 9.6.1:
Liquid Chromatography / 9.6.3:
List of Symbols / 9.6.4:
Resources for Microfluidics Research / Appendix B:
Abbreviations of Different Plastics / Appendix C:
Linear Elastic Deflection Models / Appendix D:
About the Authors
Index
Preface
Acknowledgments
Introduction / Chapter 1:
54.

図書

図書
Robert B. Grossman
出版情報: New York : Springer, c2003  xvi, 355 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface to the Student
Preface to the Instructor
The Basics / 1:
Structure and Stability of Organic Compounds / 1.1:
Conventions of Drawing Structures; Grossman's Rule / 1.1.1:
Lewis Structures; Resonance Structures / 1.1.2:
Molecular Shape; Hybridization / 1.1.3:
Aromaticity / 1.1.4:
Bronsted Acidity and Basicity / 1.2:
pK[subscript a] Values / 1.2.1:
Tautomerism / 1.2.2:
Kinetics and Thermodynamics / 1.3:
Getting Started in Drawing a Mechanism / 1.4:
Classes of Overall Transformations / 1.5:
Classes of Mechanisms / 1.6:
Polar Mechanisms / 1.6.1:
Free-Radical Mechanisms / 1.6.2:
Pericyclic Mechanisms / 1.6.3:
Transition-Metal-Catalyzed and -Mediated Mechanisms / 1.6.4:
Summary / 1.7:
Problems
Polar Reactions under Basic Conditions / 2:
Substitution and Elimination at C(sp[superscript 3])-X [sigma] Bonds, Part I / 2.1:
Substitution by the S[subscript N]2 Mechanism / 2.1.1:
[beta]-Elimination by the E2 and Elcb Mechanisms / 2.1.2:
Predicting Substitution vs. Elimination / 2.1.3:
Addition of Nucleophiles to Electrophilic [pi] Bonds / 2.2:
Addition to Carbonyl Compounds / 2.2.1:
Conjugate Addition; The Michael Reaction / 2.2.2:
Substitution at C(sp[superscript 2])-X [sigma] Bonds / 2.3:
Substitution at Carbonyl C / 2.3.1:
Substitution at Alkenyl and Aryl C / 2.3.2:
Metal Insertion; Halogen-Metal Exchange / 2.3.3:
Substitution and Elimination at C(sp[superscript 3])-X [sigma] Bonds, Part II / 2.4:
Substitution by the S[subscript RN]1 Mechanism / 2.4.1:
Substitution by the Elimination-Addition Mechanism / 2.4.2:
Substitution by the One-Electron Transfer Mechanism / 2.4.3:
[alpha]-Elimination; Generation and Reactions of Carbenes / 2.4.4:
Base-Promoted Rearrangements / 2.5:
Migration from C to C / 2.5.1:
Migration from C to O or N / 2.5.2:
Migration from B to C or O / 2.5.3:
Two Multistep Reactions / 2.6:
The Swern Oxidation / 2.6.1:
The Mitsunobu Reaction / 2.6.2:
Polar Reactions Under Acidic Conditions / 2.7:
Carbocations / 3.1:
Carbocation Stability / 3.1.1:
Carbocation Generation; The Role of Protonation / 3.1.2:
Typical Reactions of Carbocations; Rearrangements / 3.1.3:
Substitution and [beta]-Elimination Reactions at C(sp[superscript 3])-X / 3.2:
Substitution by the S[subscript N]1 and S[subscript N]2 Mechanisms / 3.2.1:
[beta]-Elimination by the E1 Mechanism / 3.2.2:
Electrophilic Addition to Nucleophilic C=C [pi] Bonds / 3.2.3:
Substitution at Nucleophilic C=C [pi] Bonds / 3.4:
Electrophilic Aromatic Substitution / 3.4.1:
Aromatic Substitution of Anilines via Diazonium Salts / 3.4.2:
Electrophilic Aliphatic Substitution / 3.4.3:
Nucleophilic Addition to and Substitution at Electrophilic [pi] Bonds / 3.5:
Heteroatom Nucleophiles / 3.5.1:
Carbon Nucleophiles / 3.5.2:
Pericyclic Reactions / 3.6:
Introduction / 4.1:
Classes of Pericyclic Reactions / 4.1.1:
Polyene MOs / 4.1.2:
Electrocyclic Reactions / 4.2:
Typical Reactions / 4.2.1:
Stereospecificity / 4.2.2:
Stereoselectivity / 4.2.3:
Cycloadditions / 4.3:
Regioselectivity / 4.3.1:
Sigmatropic Rearrangements / 4.3.3:
Ene Reactions / 4.4.1:
Free-Radical Reactions / 4.6:
Free Radicals / 5.1:
Stability / 5.1.1:
Generation from Closed-Shell Species / 5.1.2:
Chain vs. Nonchain Mechanisms / 5.1.3:
Chain Free-Radical Reactions / 5.2:
Substitution Reactions / 5.2.1:
Addition and Fragmentation Reactions / 5.2.2:
Nonchain Free-Radical Reactions / 5.3:
Photochemical Reactions / 5.3.1:
Reductions and Oxidations with Metals / 5.3.2:
Cycloaromatizations / 5.3.3:
Miscellaneous Radical Reactions / 5.4:
1,2-Anionic Rearrangements; Lone-Pair Inversion / 5.4.1:
Triplet Carbenes and Nitrenes / 5.4.2:
Transition-Metal-Mediated and -Catalyzed Reactions / 5.5:
Introduction to the Chemistry of Transition Metals / 6.1:
Conventions of Drawing Structures / 6.1.1:
Counting Electrons / 6.1.2:
Stoichiometric vs. Catalytic Mechanisms / 6.1.3:
Addition Reactions / 6.2:
Late-Metal-Catalyzed Hydrogenation and Hydrometallation (Pd, Pt, Rh) / 6.2.1:
Hydroformylation (Co, Rh) / 6.2.2:
Hydrozirconation (Zr) / 6.2.3:
Alkene Polymerization (Ti, Zr, Sc, and others) / 6.2.4:
Cyclopropanation, Epoxidation, and Aziridination of Alkenes (Cu, Rh, Mn, Ti) / 6.2.5:
Dihydroxylation and Aminohydroxylation of Alkenes (Os) / 6.2.6:
Nucleophilic Addition to Alkenes and Alkynes (Hg, Pd) / 6.2.7:
Conjugate Addition Reactions (Cu) / 6.2.8:
Reductive Coupling Reactions (Ti, Zr) / 6.2.9:
Pauson-Khand Reaction (Co) / 6.2.10:
Dotz Reaction (Cr) / 6.2.11:
Metal-Catalyzed Cycloaddition and Cyclotrimerization (Co, Ni, Rh) / 6.2.12:
Hydrogenolysis (Pd) / 6.3:
Carbonylation of Alkyl Halides (Pd, Rh) / 6.3.2:
Heck Reaction (Pd) / 6.3.3:
Coupling Reactions Between Nucleophiles and C(sp[superscript 2])-X: Kumada, Stille, Suzuki, Negishi, Buchwald-Hartwig, Sonogashira, and Ullmann Reactions (Ni, Pd, Cu) / 6.3.4:
Allylic Substitution (Pd) / 6.3.5:
Pd-Catalyzed Nucleophilic Substitution of Alkenes; Wacker Oxidation / 6.3.6:
Tebbe Reaction (Ti) / 6.3.7:
Propargyl Substitution in Co-Alkyne Complexes / 6.3.8:
Rearrangement Reactions / 6.4:
Alkene Isomerization (Rh) / 6.4.1:
Olefin and Alkyne Metathesis (Ru, W, Mo, Ti) / 6.4.2:
Elimination Reactions / 6.5:
Oxidation of Alcohols (Cr, Ru) / 6.5.1:
Decarbonylation of Aldehydes (Rh) / 6.5.2:
Mixed-Mechanism Problems / 6.6:
A Final Word
Index
Preface to the Student
Preface to the Instructor
The Basics / 1:
55.

図書

図書
issued by International Institute of Refrigeration ; [editor, Kostadin Fikiin] = edité par Institut International du Froid
出版情報: Paris : Institut International du Froid, c2000  701 p. ; 24 cm
シリーズ名: Science et technique du froid = Refrigeration science and technology ; 1998-6
所蔵情報: loading…
56.

図書

図書
Iwao Teraoka
出版情報: New York : Wiley, c2002  xv, 338 p ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Models of Polymer Chains / 1:
Introduction / 1.1:
Chain Architecture / 1.1.1:
Models of a Linear Polymer Chain / 1.1.2:
Real Chains and Ideal Chains / 1.1.3:
Ideal Chains / 1.2:
Random Walk in One Dimension / 1.2.1:
Random Walks in Two and Three Dimensions / 1.2.2:
Dimensions of Random-Walk Chains / 1.2.3:
Problems / 1.2.4:
Gaussian Chain / 1.3:
What is a Gaussian Chain? / 1.3.1:
Dimension of a Gaussian Chain / 1.3.2:
Entropy Elasticity / 1.3.3:
Real Chains / 1.3.4:
Excluded Volume / 1.4.1:
Dimension of a Real Chain / 1.4.2:
Self-Avoiding Walk / 1.4.3:
Semirigid Chains / 1.4.4:
Examples of Semirigid Chains / 1.5.1:
Wormlike Chain / 1.5.2:
Branched Chains / 1.5.3:
Architecture of Branched Chains / 1.6.1:
Dimension of Branched Chains / 1.6.2:
Molecular Weight Distribution / 1.6.3:
Average Molecular Weights / 1.7.1:
Typical Distributions / 1.7.2:
Concentration Regimes / 1.7.3:
Concentration Regimes for Linear Flexible Polymers / 1.8.1:
Concentration Regimes for Rodlike Molecules / 1.8.2:
Thermodynamics of Dilute Polymer Solutions / 1.8.3:
Polymer Solutions and Thermodynamics / 2.1:
Flory-Huggins Mean-Field Theory / 2.2:
Model / 2.2.1:
Free Energy, Chemical Potentials, and Osmotic Pressure / 2.2.2:
Dilute Solutions / 2.2.3:
Coexistence Curve and Stability / 2.2.4:
Polydisperse Polymer / 2.2.5:
Phase Diagram and Theta Solutions / 2.2.6:
Phase Diagram / 2.3.1:
Theta Solutions / 2.3.2:
Coil-Globule Transition / 2.3.3:
Solubility Parameter / 2.3.4:
Static Light Scattering / 2.3.5:
Sample Geometry in Light-Scattering Measurements / 2.4.1:
Scattering by a Small Particle / 2.4.2:
Scattering by a Polymer Chain / 2.4.3:
Scattering by Many Polymer Chains / 2.4.4:
Correlation Function and Structure Factor / 2.4.5:
Structure Factor of a Polymer Chain / 2.4.6:
Light Scattering of a Polymer Solution / 2.4.7:
Other Scattering Techniques / 2.4.8:
Size Exclusion Chromatography and Confinement / 2.4.9:
Separation System / 2.5.1:
Plate Theory / 2.5.2:
Partitioning of Polymer with a Pore / 2.5.3:
Calibration of SEC / 2.5.4:
SEC With an On-Line Light-Scattering Detector / 2.5.5:
Appendixes / 2.5.6:
Review of Thermodynamics for Colligative Properties in Nonideal Solutions / 2.A:
Osmotic Pressure / 2.A.1:
Vapor Pressure Osmometry / 2.A.2:
Another Approach to Thermodynamics of Polymer Solutions / 2.B:
Correlation Function of a Gaussian Chain / 2.C:
Dynamics of Dilute Polymer Solutions / 3:
Dynamics of Polymer Solutions / 3.1:
Dynamic Light Scattering and Diffusion of Polymers / 3.2:
Measurement System and Autocorrelation Function / 3.2.1:
Autocorrelation Function / 3.2.2:
Dynamic Structure Factor of Suspended Particles / 3.2.3:
Diffusion of Particles / 3.2.4:
Diffusion and DLS / 3.2.5:
Dynamic Structure Factor of a Polymer Solution / 3.2.6:
Hydrodynamic Radius / 3.2.7:
Particle Sizing / 3.2.8:
Diffusion From Equation of Motion / 3.2.9:
Diffusion as Kinetics / 3.2.10:
Concentration Effect on Diffusion / 3.2.11:
Diffusion in a Nonuniform System / 3.2.12:
Viscosity / 3.2.13:
Viscosity of Solutions / 3.3.1:
Measurement of Viscosity / 3.3.2:
Intrinsic Viscosity / 3.3.3:
Flow Field / 3.3.4:
Normal Modes / 3.3.5:
Rouse Model / 3.4.1:
Normal Coordinates / 3.4.2:
Equation of Motion for the Normal Coordinates in the Rouse Model / 3.4.3:
Results of the Normal-Coordinates / 3.4.4:
Results for the Rouse Model / 3.4.5:
Zimm Model / 3.4.6:
Dynamic Structure Factor / 3.4.7:
Motion of Monomers / 3.4.9:
Dynamics of Rodlike Molecules / 3.4.10:
Diffusion Coefficients / 3.5.1:
Rotational Diffusion / 3.5.2:
Dynamics of Wormlike Chains / 3.5.3:
Appendices / 3.5.6:
Evaluation of [left angle bracket]q[subscript i superscript 2 right angle bracket subscript eq] / 3.A:
Evaluation of [left angle bracket]exp[ik [middle dot] (Aq - Bp) right angle bracket] / 3.B:
Initial Slope of S[subscript 1](k,t) / 3.C:
Thermodynamics and Dynamics of Semidilute Solutions / 4:
Semidilute Polymer Solutions / 4.1:
Thermodynamics of Semidilute Polymer Solutions / 4.2:
Blob Model / 4.2.1:
Scaling Theory and Semidilute Solutions / 4.2.2:
Partitioning with a Pore / 4.2.3:
Dynamics of Semidilute Solutions / 4.2.4:
Cooperative Diffusion / 4.3.1:
Tube Model and Reptation Theory / 4.3.2:
References / 4.3.3:
Further Readings
Delta Function / A1:
Fourier Transform / A2:
Integrals / A3:
Series / A4:
Index
Preface
Models of Polymer Chains / 1:
Introduction / 1.1:
57.

電子ブック

EB
John Cooke
出版情報: Springer eBooks Computer Science , Springer London, 2005
所蔵情報: loading…
目次情報: 続きを見る
Abridged Preface to First Edition
Preface to Second Edition
Introduction / 0:
What Is this Book About? / 0.1:
Some Terminology / 0.2:
How Might Programs Fail? / 0.3:
A Way Forward / 0.4:
On Mathematics / 0.5:
Linking Paradigms / 0.6:
Problem Solving / 0.7:
The Book Plan / 0.8:
Preliminaries / Part A:
The Technical Background / 1:
Functions, Relations and Specifications / 1.0:
Summary of Features / 1.1.1:
Guidelines for Specifications / 1.1.2:
Equational Reasoning and Types / 1.2:
The Origin and Application of Rules / 1.3:
Data Types / 1.4:
A Glimpse at the Integers / 1.4.1:
Logical Types / 1.4.2:
The Boolean Type, IB / 1.4.2.1:
Implication and Deduction / 1.4.2.2:
Boolean Quantifiers / 1.4.2.3:
Extended (3-valued) Logic / 1.4.2.4:
Sets / 1.4.3:
Integers / 1.4.4:
Inequalities / 1.4.4.1:
Bags / 1.4.5:
Lists / 1.4.6:
Records and n-tuples / 1.4.7:
Union Types / 1.4.8:
Sub-types and Sub-ranges / 1.4.9:
Type Transfer Functions and Casts / 1.4.10:
Data Types and Transformations / 1.4.11:
On Quantification / 1.4.12:
Applying Unfold/Fold Transformations / 1.5:
On Programming / 2:
Overview / 2.0:
Procedural Programming / 2.1:
'Good' Programming / 2.2:
Structuring and (control) Flowcharts / 2.3:
PDL Overview / 2.4:
"Let" and "Where" / 2.4.1:
Scope and Parameters / 2.4.2:
Comments and Assertions / 2.5:
Verification of Procedural Programs / 2.6:
Sequencing / 2.6.1:
Alternation / 2.6.2:
Iteration / 2.6.3:
Program Derivation / 2.7:
Fundamentals / Part B:
Algorithm Extraction / 3:
On Converging Recursion / 3.0:
Design Tactics / 3.2:
Checking Perceived Answers / 3.2.1:
Problem Reduction / 3.2.2:
Problem Decomposition / 3.2.3:
Structural Splitting / 3.2.3.1:
Predicated Splitting / 3.2.3.2:
Mixed Strategies / 3.2.3.3:
Domain Partitioning / 3.2.3.4:
The Use of Analogy / 3.2.4:
'Eureka' Processes / 3.3:
Summary
Recursion Removal / 4:
Tail Recursion / 4.1:
Associative Recursion / 4.2:
Up and Down Iteration / 4.3:
Speeding up Iteratons / 4.4:
Recursive Procedures / 4.5:
Quantifications / 5:
Defining Composite Values / 5.0:
Derived Composite Values / 5.2:
1-place Functions / 5.2.1:
2-place Functions / 5.2.2:
Application to Program Development / 5.3:
An Extended Example: The Factorial Function / 5.3.1:
Some Rules for Quantifications / 5.4:
General Rules / 5.4.1:
Special Rules for Logical Quantifiers / 5.4.2:
Refinement and Re-use / 6:
Operational Refinement / 6.1:
On Correctness / 6.1.1:
Some Properties of Design Refinement / 6.1.2:
An Alternative View / 6.1.3:
Re-using Designs / 6.2:
Developments / Part C:
Sorting / 7:
Specification and Initial Discussion / 7.1:
Initial Designs / 7.2:
Predicated Splitting (Partitioning) / 7.2.1:
Complete Designs / 7.3:
Exchange Sorts / 7.3.1:
Merge Sorts / 7.3.2:
The Basic Merge Sort / 7.3.2.1:
Partition Sorts / 7.3.3:
Simple Partition Sort / 7.3.3.1:
A Quick Design / 7.4:
Data Refinement / 8:
On 'Internal' Data Types / 8.1:
Changing Data Types / 8.2:
Where to next? / 8.3:
Sorting Revisited / 9:
Variants of the Merge Sort / 9.1:
Failures and Fixes / 9.3:
Inadequate Pre-Conditions / 10.1:
Failures in Structural Splitting / 10.2:
Loss of Vital Information / 10.2.1:
Further Examples / 11:
The 2-D Convex Hull / 11.1:
Topological Sort / 11.2:
Experimentation / 11.2.1:
A Proper Formulation / 11.2.2:
Some 'Extremal' Problems / 11.3:
On Interactive Software / 12:
Specifications Involving Change / 12.1:
Specifications of Input/Output / 12.1.1:
Conventional Communications / 12.1.2:
The Enabling of Computations / 12.1.3:
Pertaining to (Software) Systems / 12.2:
System Requirements / 12.2.1:
Specifying Systems / 12.2.2:
Transformation Digest / Appendix:
Re-write Rule Conventions / A.0:
Data Manipulation Rules / A.1:
The Type IB / A.1.1:
Extended Logic and Conditional Expressions / A.1.2:
Common Conversion Functions / A.1.3:
Quantifier Rules / A.1.8:
Quantifier Properties / A.2:
'Not Occurs in' / A.3:
On PDL Structure / A.4:
PDL Transformation Rules / A.4.1:
Bibliography
Index
Abridged Preface to First Edition
Preface to Second Edition
Introduction / 0:
58.

図書

図書
K. Feyrer
出版情報: Berlin : Springer, c2007  IX, 322 p. ; 24 cm
所蔵情報: loading…
目次情報: 続きを見る
Wire Ropes, Elements and Definitions / 1:
Steel Wire / 1.1:
Non-Alloy Steel / 1.1.1:
Wire Manufacturing / 1.1.2:
Metallic Coating / 1.1.3:
Corrosion Resistant Wires / 1.1.4:
Wire Tensile Test / 1.1.5:
Wire Endurance and Fatigue Strength / 1.1.6:
Strands / 1.2:
Round Strands / 1.2.1:
Shaped Strands / 1.2.2:
Compacted Strands / 1.2.3:
Rope Cores / 1.3:
Lubrication / 1.4:
Lubricant / 1.4.1:
Lubricant Consumption / 1.4.2:
Rope Endurance / 1.4.3:
Wire Ropes / 1.5:
The Classification of Ropes According to Usage / 1.5.1:
Wire Rope Constructions / 1.5.2:
Designation of Wire Ropes / 1.5.3:
Symbols and Definitions / 1.5.4:
The Geometry of Wire Ropes / 1.6:
Round Strand with Round Wires / 1.6.1:
Round Strand with Any Kind of Profiled Wires / 1.6.2:
Fibre Core / 1.6.3:
Steel Core / 1.6.4:
References
Wire Ropes under Tensile Load / 2:
Stresses in Straight Wire Ropes / 2.1:
Basic Relation for the Wire Tensile Force in a Strand / 2.1.1:
Wire Tensile Stress in the Strand or Wire Rope / 2.1.2:
Additional Wire Stresses in the Straight Spiral Rope / 2.1.3:
Additional Wire Stresses in Straight Stranded Ropes / 2.1.4:
Wire Rope Elasticity Module / 2.2:
Definition / 2.2.1:
Rope Elasticity Module of Strands and Spiral Ropes, Calculation / 2.2.2:
Rope Elasticity Module of Stranded Wire Ropes / 2.2.3:
Waves and Vibrations / 2.2.4:
Reduction of the Rope Diameter due to Rope Tensile Force / 2.3:
Torque and Torsional Stiffness / 2.4:
Rope Torque from Geometric Data / 2.4.1:
Torque of Twisted Round Strand Ropes / 2.4.2:
Rotating of the Bottom Sheave / 2.4.3:
Rope Twist Caused by the Height-Stress / 2.4.4:
Change of the Rope Length by Twisting the Rope / 2.4.5:
Wire Stresses Caused by Twisting the Rope / 2.4.6:
Rope Endurance Under Fluctuating Twist / 2.4.7:
Wire Rope Breaking Force / 2.5:
Wire Ropes Under Fluctuating Tension / 2.6:
Conditions of Tension-Tension Tests / 2.6.1:
Evaluating Methods / 2.6.2:
Results of Tension Fatigue Test-Series / 2.6.3:
Further Results of Tension Fatigue Tests / 2.6.4:
Calculation of the Number of Load Cycles / 2.6.5:
Dimensioning Stay Wire Ropes / 2.7:
Extreme Forces / 2.7.1:
Fluctuating Forces / 2.7.2:
Discard Criteria / 2.7.3:
Wire Ropes Under Bending and Tensile Stresses / 3:
Stresses in Running Wire Ropes / 3.1:
Bending and Torsion Stress / 3.1.1:
Secondary Tensile Stress / 3.1.2:
Stresses from the Rope Ovalisation / 3.1.3:
Secondary Bending Stress / 3.1.4:
Sum of the Stresses / 3.1.5:
Force Between Rope and Sheave (Line Pressure) / 3.1.6:
Pressure Between Rope and Sheave / 3.1.7:
Force on the Outer Arcs of the Rope Wires / 3.1.8:
Rope Bending Tests / 3.2:
Bending-Fatigue-Machines, Test Procedures / 3.2.1:
Number of Bending Cycles / 3.2.2:
Further Influences on the Number of Bending Cycles / 3.2.3:
Reverse Bending / 3.2.4:
Fluctuating Tension and Bending / 3.2.5:
Palmgren-Miner Rule / 3.2.6:
Limiting Factors / 3.2.7:
Ropes during Bendings / 3.2.8:
Number of Wire Breaks / 3.2.9:
Rope Drive Requirements / 3.3:
General Requirements / 3.3.1:
Lifting Installations for Passengers / 3.3.2:
Cranes and Lifting Appliances / 3.3.3:
Calculation of Rope Drives / 3.4:
Analysis of Rope Drives / 3.4.1:
Tensile Rope Force / 3.4.2:
Limits / 3.4.3:
Rope Drive Calculations, Examples / 3.4.6:
Rope Efficiency / 3.5:
Single Sheave / 3.5.1:
Rope Drive / 3.5.2:
Lowering an Empty Hook Block / 3.5.3:
Index
Wire Ropes, Elements and Definitions / 1:
Steel Wire / 1.1:
Non-Alloy Steel / 1.1.1:
59.

電子ブック

EB
John Cooke
出版情報: SpringerLink Books - AutoHoldings , Springer London, 2005
所蔵情報: loading…
目次情報: 続きを見る
Abridged Preface to First Edition
Preface to Second Edition
Introduction / 0:
What Is this Book About? / 0.1:
Some Terminology / 0.2:
How Might Programs Fail? / 0.3:
A Way Forward / 0.4:
On Mathematics / 0.5:
Linking Paradigms / 0.6:
Problem Solving / 0.7:
The Book Plan / 0.8:
Preliminaries / Part A:
The Technical Background / 1:
Functions, Relations and Specifications / 1.0:
Summary of Features / 1.1.1:
Guidelines for Specifications / 1.1.2:
Equational Reasoning and Types / 1.2:
The Origin and Application of Rules / 1.3:
Data Types / 1.4:
A Glimpse at the Integers / 1.4.1:
Logical Types / 1.4.2:
The Boolean Type, IB / 1.4.2.1:
Implication and Deduction / 1.4.2.2:
Boolean Quantifiers / 1.4.2.3:
Extended (3-valued) Logic / 1.4.2.4:
Sets / 1.4.3:
Integers / 1.4.4:
Inequalities / 1.4.4.1:
Bags / 1.4.5:
Lists / 1.4.6:
Records and n-tuples / 1.4.7:
Union Types / 1.4.8:
Sub-types and Sub-ranges / 1.4.9:
Type Transfer Functions and Casts / 1.4.10:
Data Types and Transformations / 1.4.11:
On Quantification / 1.4.12:
Applying Unfold/Fold Transformations / 1.5:
On Programming / 2:
Overview / 2.0:
Procedural Programming / 2.1:
'Good' Programming / 2.2:
Structuring and (control) Flowcharts / 2.3:
PDL Overview / 2.4:
"Let" and "Where" / 2.4.1:
Scope and Parameters / 2.4.2:
Comments and Assertions / 2.5:
Verification of Procedural Programs / 2.6:
Sequencing / 2.6.1:
Alternation / 2.6.2:
Iteration / 2.6.3:
Program Derivation / 2.7:
Fundamentals / Part B:
Algorithm Extraction / 3:
On Converging Recursion / 3.0:
Design Tactics / 3.2:
Checking Perceived Answers / 3.2.1:
Problem Reduction / 3.2.2:
Problem Decomposition / 3.2.3:
Structural Splitting / 3.2.3.1:
Predicated Splitting / 3.2.3.2:
Mixed Strategies / 3.2.3.3:
Domain Partitioning / 3.2.3.4:
The Use of Analogy / 3.2.4:
'Eureka' Processes / 3.3:
Summary
Recursion Removal / 4:
Tail Recursion / 4.1:
Associative Recursion / 4.2:
Up and Down Iteration / 4.3:
Speeding up Iteratons / 4.4:
Recursive Procedures / 4.5:
Quantifications / 5:
Defining Composite Values / 5.0:
Derived Composite Values / 5.2:
1-place Functions / 5.2.1:
2-place Functions / 5.2.2:
Application to Program Development / 5.3:
An Extended Example: The Factorial Function / 5.3.1:
Some Rules for Quantifications / 5.4:
General Rules / 5.4.1:
Special Rules for Logical Quantifiers / 5.4.2:
Refinement and Re-use / 6:
Operational Refinement / 6.1:
On Correctness / 6.1.1:
Some Properties of Design Refinement / 6.1.2:
An Alternative View / 6.1.3:
Re-using Designs / 6.2:
Developments / Part C:
Sorting / 7:
Specification and Initial Discussion / 7.1:
Initial Designs / 7.2:
Predicated Splitting (Partitioning) / 7.2.1:
Complete Designs / 7.3:
Exchange Sorts / 7.3.1:
Merge Sorts / 7.3.2:
The Basic Merge Sort / 7.3.2.1:
Partition Sorts / 7.3.3:
Simple Partition Sort / 7.3.3.1:
A Quick Design / 7.4:
Data Refinement / 8:
On 'Internal' Data Types / 8.1:
Changing Data Types / 8.2:
Where to next? / 8.3:
Sorting Revisited / 9:
Variants of the Merge Sort / 9.1:
Failures and Fixes / 9.3:
Inadequate Pre-Conditions / 10.1:
Failures in Structural Splitting / 10.2:
Loss of Vital Information / 10.2.1:
Further Examples / 11:
The 2-D Convex Hull / 11.1:
Topological Sort / 11.2:
Experimentation / 11.2.1:
A Proper Formulation / 11.2.2:
Some 'Extremal' Problems / 11.3:
On Interactive Software / 12:
Specifications Involving Change / 12.1:
Specifications of Input/Output / 12.1.1:
Conventional Communications / 12.1.2:
The Enabling of Computations / 12.1.3:
Pertaining to (Software) Systems / 12.2:
System Requirements / 12.2.1:
Specifying Systems / 12.2.2:
Transformation Digest / Appendix:
Re-write Rule Conventions / A.0:
Data Manipulation Rules / A.1:
The Type IB / A.1.1:
Extended Logic and Conditional Expressions / A.1.2:
Common Conversion Functions / A.1.3:
Quantifier Rules / A.1.8:
Quantifier Properties / A.2:
'Not Occurs in' / A.3:
On PDL Structure / A.4:
PDL Transformation Rules / A.4.1:
Bibliography
Index
Abridged Preface to First Edition
Preface to Second Edition
Introduction / 0:
60.

電子ブック

EB
Richard William Sharp
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2004
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Hardware Description Languages / 1.1:
Hardware Synthesis / 1.2:
High-Level Synthesis / 1.2.1:
Motivation for Higher Level Tools / 1.3:
Lack of Structuring Support / 1.3.1:
Limitations of Static Scheduling / 1.3.2:
Structure of the Monograph / 1.4:
Related Work / 2:
Verilog and VHDL / 2.1:
The Olympus Synthesis System / 2.2:
The HardwareC Language / 2.2.1:
Hercules / 2.2.2:
Hebe / 2.2.3:
Functional Languages / 2.3:
/?FP: An Algebra for VLSI Specification / 2.3.1:
Embedding HDLs in General-Purpose Functional Languages / 2.3.2:
Term Rewriting Systems / 2.4:
Occam/CSP-Based Approaches / 2.5:
Handel and Handel-C / 2.5.1:
Tangram and Balsa / 2.5.2:
Synchronous Languages / 2.6:
Summary / 2.7:
The SAFL Language / 3:
Motivation / 3.1:
Language Definition / 3.2:
Static Allocation / 3.2.1:
Integrating with External Hardware Components / 3.2.2:
Semantics / 3.2.3:
Concrete Syntax / 3.2.4:
Hardware Synthesis Using SAFL / 3.3:
Automatic Generation of Parallel Hardware / 3.3.1:
Resource Awareness / 3.3.2:
Source-Level Program Transformation / 3.3.3:
Static Analysis and Optimisation / 3.3.4:
Architecture Independence / 3.3.5:
Aside: Dealing with Mutual Recursion / 3.4:
Eliminating Mutual Recursion by Transformation / 3.4.1:
Soft Scheduling / 3.5:
Motivation and Related Work / 4.1:
Translating SAFL to Hardware / 4.1.1:
Soft Scheduling: Technical Details / 4.2:
Removing Redundant Arbiters / 4.2.1:
Parallel Conflict Analysis (PCA) / 4.2.2:
Integrating PCA into the FLaSH Compiler / 4.2.3:
Examples and Discussion / 4.3:
Parallel FIR Filter / 4.3.1:
Shared-Memory Multi-processor Architecture / 4.3.2:
Parallel Tasks Sharing Graphical Display / 4.3.3:
Program Transformation for Scheduling and Binding / 4.4:
High-Level Synthesis of SAFL / 4.5:
FLaSH Intermediate Code / 5.1:
The Structure of Intermediate Grap / 5.1.1:
Translation to Intermediate Code / 5.1.2:
Translation to Synchronous Hardware / 5.2:
Compiling Expressions / 5.2.1:
Compiling Functions / 5.2.2:
Generated Verilog / 5.2.3:
Compiling External Functions / 5.2.4:
Translation to GALS Hardware / 5.3:
A Brief Discussion of Metastability / 5.3.1:
Interfacing between Different Clock Domains / 5.3.2:
Modifying the Arbitration Circuitry / 5.3.3:
Analysis and Optimisation of Intermediate Code / 5.4:
Architecture-Neutral verses Architecture-Specific / 6.1:
Definitions and Terminology / 6.2:
Register Placement Analysis and Optimisation / 6.3:
Sharing Conflicts / 6.3.1:
Technical Details / 6.3.2:
Resource Dependency Analysis / 6.3.3:
Data Validity Analysis / 6.3.4:
Sequential Conflict Register Placement / 6.3.5:
Extending the Model: Calling Conventions / 6.4:
Caller-Save Resource Dependency Analysis / 6.4.1:
Caller-Save Permanisation Analysis / 6.4.2:
Synchronous Timing Analysis / 6.5:
Associated Optimisations / 6.5.1:
Results and Discussion / 6.6:
Register Placement Analysis: Results / 6.6.1:
Synchronous Timing Optimisations: Results / 6.6.2:
Dealing with I/O / 6.7:
SAFL+ Language Description / 7.1:
Channels and Channel Passing / 7.1.1:
The Motivation for Channel Passing / 7.1.3:
Translating SAFL+ to Hardware / 7.2:
Extending Analyses from SAFL to SAFL+ / 7.2.1:
Operational Semantics for SAFL+ / 7.3:
Transition Rules / 7.3.1:
Semantics for Channel Passing / 7.3.2:
Non-determinism / 7.3.3:
Combining Behaviour and Structure / 7.4:
Embedding Structural Expansion in SAFL / 8.1:
Building Combinatorial Hardware in Magma / 8.2.1:
Integrating SAFL and Magma / 8.2.2:
Aside: Embedding Magma in VHDL/Verilog / 8.3:
Transformation of SAFL Specifications / 8.4:
Hardware Software CoDesign / 9.1:
Comparison with Other Work / 9.1.1:
The Stack Machine Template / 9.2:
Stack Machine Instances / 9.2.2:
Compilation to Stack Code / 9.2.3:
The Partitioning Transformation / 9.2.4:
Validity of Partitioning Functions / 9.2.5:
Extensions / 9.2.6:
Transformations from SAFL to SAFL+ / 9.3:
Case Study / 9.4:
The SAFL to Silicon Tool Chain / 10.1:
DES Encrypter/Decrypter / 10.2:
Adding Hardware VGA Support / 10.2.1:
Conclusions and Further Work / 10.3:
Future Work / 11.1:
Appendix
DES Encryption/Decryption Circuit / A:
Transformations to Pipeline DES / B:
A Simple Stack Machine and Instruction Memory / C:
References
Index
Introduction / 1:
Hardware Description Languages / 1.1:
Hardware Synthesis / 1.2:
61.

電子ブック

EB
Kenneth V. Price, Th B?ck, Jouni A. Lampinen, Rainer M. Storn
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2005
所蔵情報: loading…
目次情報: 続きを見る
Preface
Table of Contents
The Motivation for Differential Evolution / 1:
Introduction to Parameter Optimization / 1.1:
Overview / 1.1.1:
Single-Point, Derivative-Based Optimization / 1.1.2:
One-Point, Derivative-Free Optimization and the Step Size Problem / 1.1.3:
Local Versus Global Optimization / 1.2:
Simulated Annealing / 1.2.1:
Multi-Point, Derivative-Based Methods / 1.2.2:
Multi-Point, Derivative-Free Methods / 1.2.3:
Differential Evolution - A First Impression / 1.2.4:
References
The Differential Evolution Algorithm / 2:
Population Structure / 2.1:
Initialization / 2.1.2:
Mutation / 2.1.3:
Crossover / 2.1.4:
Selection / 2.1.5:
DE at a Glance / 2.1.6:
Visualizing DE / 2.1.7:
Notation / 2.1.8:
Parameter Representation / 2.2:
Bit Strings / 2.2.1:
Floating-Point / 2.2.2:
Floating-Point Constraints / 2.2.3:
Initial Bounds / 2.3:
Initial Distributions / 2.3.2:
Base Vector Selection / 2.4:
Choosing the Base Vector Index, r0 / 2.4.1:
One-to-One Base Vector Selection / 2.4.2:
A Comparison of Random Base Index Selection Methods / 2.4.3:
Degenerate Vector Combinations / 2.4.4:
Implementing Mutually Exclusive Indices / 2.4.5:
Gauging the Effects of Degenerate Combinations: The Sphere / 2.4.6:
Biased Base Vector Selection Schemes / 2.4.7:
Differential Mutation / 2.5:
The Mutation Scale Factor: F / 2.5.1:
Randomizing the Scale Factor / 2.5.2:
Recombination / 2.6:
The Role of Cr in Optimization / 2.6.1:
Arithmetic Recombination / 2.6.3:
Phase Portraits / 2.6.4:
The Either/Or Algorithm / 2.6.5:
Survival Criteria / 2.7:
Tournament Selection / 2.7.2:
One-to-One Survivor Selection / 2.7.3:
Local Versus Global Selection / 2.7.4:
Permutation Selection Invariance / 2.7.5:
Crossover-Dependent Selection Pressure / 2.7.6:
Parallel Performance / 2.7.7:
Extensions / 2.7.8:
Termination Criteria / 2.8:
Objective Met / 2.8.1:
Limit the Number of Generations / 2.8.2:
Population Statistics / 2.8.3:
Limited Time / 2.8.4:
Human Monitoring / 2.8.5:
Application Specific / 2.8.6:
Benchmarking Differential Evolution / 3:
About Testing / 3.1:
Performance Measures / 3.2:
DE Versus DE / 3.3:
The Algorithms / 3.3.1:
The Test Bed / 3.3.2:
Summary / 3.3.3:
DE Versus Other Optimizers / 3.4:
Comparative Performance: Thirty-Dimensional Functions / 3.4.1:
Comparative Studies: Unconstrained Optimization / 3.4.2:
Performance Comparisons from Other Problem Domains / 3.4.3:
Application-Based Performance Comparisons / 3.4.4:
Problem Domains / 3.5:
Function and Parameter Quantization / 4.1:
Uniform Quantization / 4.2.1:
Non-Uniform Quantization / 4.2.2:
Objective Function Quantization / 4.2.3:
Parameter Quantization / 4.2.4:
Mixed Variables / 4.2.5:
Optimization with Constraints / 4.3:
Boundary Constraints / 4.3.1:
Inequality Constraints / 4.3.2:
Equality Constraints / 4.3.3:
Combinatorial Problems / 4.4:
The Traveling Salesman Problem / 4.4.1:
The Permutation Matrix Approach / 4.4.2:
Relative Position Indexing / 4.4.3:
Onwubolu's Approach / 4.4.4:
Adjacency Matrix Approach / 4.4.5:
Design Centering / 4.4.6:
Divergence, Self-Steering and Pooling / 4.5.1:
Computing a Design Center / 4.5.2:
Multi-Objective Optimization / 4.6:
Weighted Sum of Objective Functions / 4.6.1:
Pareto Optimality / 4.6.2:
The Pareto-Front: Two Examples / 4.6.3:
Adapting DE for Multi-Objective Optimization / 4.6.4:
Dynamic Objective Functions / 4.7:
Stationary Optima / 4.7.1:
Non-Stationary Optima / 4.7.2:
Architectural Aspects and Computing Environments / 5:
DE on Parallel Processors / 5.1:
Background / 5.1.1:
Related Work / 5.1.2:
Drawbacks of the Standard Model / 5.1.3:
Modifying the Standard Model / 5.1.4:
The Master Process / 5.1.5:
DE on Limited Resource Devices / 5.2:
Random Numbers / 5.2.1:
Permutation Generators / 5.2.2:
Efficient Sorting / 5.2.3:
Memory-Saving DE Variants / 5.2.4:
Computer Code / 6:
DeMat - Differential Evolution for MATLAB / 6.1:
General Structure of DeMat / 6.1.1:
Naming and Coding Conventions / 6.1.2:
Data Flow Diagram / 6.1.3:
How to Use the Graphics / 6.1.4:
DeWin - DE for MS Windows: An Application in C / 6.2:
General Structure of DeWin / 6.2.1:
How To Use the Graphics / 6.2.2:
Functions of graphics.h / 6.2.5:
Software on the Accompanying CD / 6.3:
Applications / 7:
Genetic Algorithms and Related Techniques for Optimizing Si-H Clusters: A Merit Analysis for Differential Evolution / 7.1:
Introduction / 7.1.1:
The System Model / 7.1.2:
Computational Details / 7.1.3:
Results and Discussion / 7.1.4:
Concluding Remarks / 7.1.5:
Non-Imaging Optical Design Using Differential Evolution / 7.2:
Objective Function / 7.2.1:
A Reverse Engineering Approach to Testing / 7.2.3:
A More Difficult Problem: An Extended Source / 7.2.4:
Conclusion / 7.2.5:
Optimization of an Industrial Compressor Supply System / 7.3:
Background Information on the Test Problem / 7.3.1:
System Optimization / 7.3.3:
Demand Profiles / 7.3.4:
Modified Differential Evolution; Extending the Generality of DE / 7.3.5:
Component Selection from the Database / 7.3.6:
Crossover Approaches / 7.3.7:
Testing Procedures / 7.3.8:
Obtaining 100% Certainty of the Results / 7.3.9:
Results / 7.3.10:
Minimal Representation Multi-Sensor Fusion Using Differential Evolution / 7.3.11:
Minimal Representation Multi-Sensor Fusion / 7.4.1:
Differential Evolution for Multi-Sensor Fusion / 7.4.3:
Experimental Results / 7.4.4:
Comparison with a Binary Genetic Algorithm / 7.4.5:
Determination of the Earthquake Hypocenter: A Challenge for the Differential Evolution Algorithm / 7.4.6:
Brief Outline of Direct Problem Solution / 7.5.1:
Synthetic Location Test / 7.5.3:
Convergence Properties / 7.5.4:
Conclusions / 7.5.5:
Parallel Differential Evolution: Application to 3-D Medical Image Registration / 7.6:
Medical Image Registration Using Similarity Measures / 7.6.1:
Optimization by Differential Evolution / 7.6.3:
Parallelization of Differential Evolution / 7.6.4:
Acknowledgments / 7.6.5:
Design of Efficient Erasure Codes with Differential Evolution / 7.7:
Codes from Bipartite Graphs / 7.7.1:
Code Design / 7.7.3:
Differential Evolution / 7.7.4:
FIWIZ - A Versatile Program for the Design of Digital Filters Using Differential Evolution / 7.7.5:
Unconventional Design Tasks / 7.8.1:
Approach / 7.8.3:
Examples / 7.8.4:
Optimization of Radial Active Magnetic Bearings by Using Differential Evolution and the Finite Element Method / 7.8.5:
Radial Active Magnetic Bearings / 7.9.1:
Magnetic Field Distribution and Force Computed by the Two-Dimensional FEM / 7.9.3:
RAMB Design Optimized by DE and the FEM / 7.9.4:
Application of Differential Evolution to the Analysis of X-Ray Reflectivity Data / 7.9.5:
The Data-Fitting Procedure / 7.10.1:
The Model and Simulation / 7.10.3:
Inverse Fractal Problem / 7.10.4:
General Introduction / 7.11.1:
Active Compensation in RF-Driven Plasmas by Means of Differential Evolution / 7.11.2:
RF-Driven Plasmas / 7.12.1:
Langmuir Probes / 7.12.3:
Active Compensation in RF-Driven Plasmas / 7.12.4:
Automated Control System Structure and Fitness Function / 7.12.5:
Experimental Setup / 7.12.6:
Parameters and Experimental Design / 7.12.7:
Appendix / 7.12.8:
Unconstrained Uni-Modal Test Functions / A.1:
Sphere / A.1.1:
Hyper-Ellipsoid / A.1.2:
Generalized Rosenbrock / A.1.3:
Schwefel's Ridge / A.1.4:
Neumaier #3 / A.1.5:
Unconstrained Multi-Modal Test Functions / A.2:
Ackley / A.2.1:
Griewangk / A.2.2:
Rastrigin / A.2.3:
Salomon / A.2.4:
Whitley / A.2.5:
Storn's Chebyshev / A.2.6:
Lennard-Jones / A.2.7:
Hilbert / A.2.8:
Modified Langerman / A.2.9:
Shekel's Foxholes / A.2.10:
Odd Square / A.2.11:
Katsuura / A.2.12:
Bound-Constrained Test Functions / A.3:
Schwefel / A.3.1:
Epistatic Michalewicz / A.3.2:
Rana / A.3.3:
Index
Preface
Table of Contents
The Motivation for Differential Evolution / 1:
62.

図書

図書
Kenneth V. Price, Rainer M. Storn, Jouni A. Lampinen
出版情報: Berlin : Springer, c2005  xix, 538 p. ; 24 cm.
シリーズ名: Natural computing series
所蔵情報: loading…
目次情報: 続きを見る
Preface
Table of Contents
The Motivation for Differential Evolution / 1:
Introduction to Parameter Optimization / 1.1:
Overview / 1.1.1:
Single-Point, Derivative-Based Optimization / 1.1.2:
One-Point, Derivative-Free Optimization and the Step Size Problem / 1.1.3:
Local Versus Global Optimization / 1.2:
Simulated Annealing / 1.2.1:
Multi-Point, Derivative-Based Methods / 1.2.2:
Multi-Point, Derivative-Free Methods / 1.2.3:
Differential Evolution - A First Impression / 1.2.4:
References
The Differential Evolution Algorithm / 2:
Population Structure / 2.1:
Initialization / 2.1.2:
Mutation / 2.1.3:
Crossover / 2.1.4:
Selection / 2.1.5:
DE at a Glance / 2.1.6:
Visualizing DE / 2.1.7:
Notation / 2.1.8:
Parameter Representation / 2.2:
Bit Strings / 2.2.1:
Floating-Point / 2.2.2:
Floating-Point Constraints / 2.2.3:
Initial Bounds / 2.3:
Initial Distributions / 2.3.2:
Base Vector Selection / 2.4:
Choosing the Base Vector Index, r0 / 2.4.1:
One-to-One Base Vector Selection / 2.4.2:
A Comparison of Random Base Index Selection Methods / 2.4.3:
Degenerate Vector Combinations / 2.4.4:
Implementing Mutually Exclusive Indices / 2.4.5:
Gauging the Effects of Degenerate Combinations: The Sphere / 2.4.6:
Biased Base Vector Selection Schemes / 2.4.7:
Differential Mutation / 2.5:
The Mutation Scale Factor: F / 2.5.1:
Randomizing the Scale Factor / 2.5.2:
Recombination / 2.6:
The Role of Cr in Optimization / 2.6.1:
Arithmetic Recombination / 2.6.3:
Phase Portraits / 2.6.4:
The Either/Or Algorithm / 2.6.5:
Survival Criteria / 2.7:
Tournament Selection / 2.7.2:
One-to-One Survivor Selection / 2.7.3:
Local Versus Global Selection / 2.7.4:
Permutation Selection Invariance / 2.7.5:
Crossover-Dependent Selection Pressure / 2.7.6:
Parallel Performance / 2.7.7:
Extensions / 2.7.8:
Termination Criteria / 2.8:
Objective Met / 2.8.1:
Limit the Number of Generations / 2.8.2:
Population Statistics / 2.8.3:
Limited Time / 2.8.4:
Human Monitoring / 2.8.5:
Application Specific / 2.8.6:
Benchmarking Differential Evolution / 3:
About Testing / 3.1:
Performance Measures / 3.2:
DE Versus DE / 3.3:
The Algorithms / 3.3.1:
The Test Bed / 3.3.2:
Summary / 3.3.3:
DE Versus Other Optimizers / 3.4:
Comparative Performance: Thirty-Dimensional Functions / 3.4.1:
Comparative Studies: Unconstrained Optimization / 3.4.2:
Performance Comparisons from Other Problem Domains / 3.4.3:
Application-Based Performance Comparisons / 3.4.4:
Problem Domains / 3.5:
Function and Parameter Quantization / 4.1:
Uniform Quantization / 4.2.1:
Non-Uniform Quantization / 4.2.2:
Objective Function Quantization / 4.2.3:
Parameter Quantization / 4.2.4:
Mixed Variables / 4.2.5:
Optimization with Constraints / 4.3:
Boundary Constraints / 4.3.1:
Inequality Constraints / 4.3.2:
Equality Constraints / 4.3.3:
Combinatorial Problems / 4.4:
The Traveling Salesman Problem / 4.4.1:
The Permutation Matrix Approach / 4.4.2:
Relative Position Indexing / 4.4.3:
Onwubolu's Approach / 4.4.4:
Adjacency Matrix Approach / 4.4.5:
Design Centering / 4.4.6:
Divergence, Self-Steering and Pooling / 4.5.1:
Computing a Design Center / 4.5.2:
Multi-Objective Optimization / 4.6:
Weighted Sum of Objective Functions / 4.6.1:
Pareto Optimality / 4.6.2:
The Pareto-Front: Two Examples / 4.6.3:
Adapting DE for Multi-Objective Optimization / 4.6.4:
Dynamic Objective Functions / 4.7:
Stationary Optima / 4.7.1:
Non-Stationary Optima / 4.7.2:
Architectural Aspects and Computing Environments / 5:
DE on Parallel Processors / 5.1:
Background / 5.1.1:
Related Work / 5.1.2:
Drawbacks of the Standard Model / 5.1.3:
Modifying the Standard Model / 5.1.4:
The Master Process / 5.1.5:
DE on Limited Resource Devices / 5.2:
Random Numbers / 5.2.1:
Permutation Generators / 5.2.2:
Efficient Sorting / 5.2.3:
Memory-Saving DE Variants / 5.2.4:
Computer Code / 6:
DeMat - Differential Evolution for MATLAB / 6.1:
General Structure of DeMat / 6.1.1:
Naming and Coding Conventions / 6.1.2:
Data Flow Diagram / 6.1.3:
How to Use the Graphics / 6.1.4:
DeWin - DE for MS Windows: An Application in C / 6.2:
General Structure of DeWin / 6.2.1:
How To Use the Graphics / 6.2.2:
Functions of graphics.h / 6.2.5:
Software on the Accompanying CD / 6.3:
Applications / 7:
Genetic Algorithms and Related Techniques for Optimizing Si-H Clusters: A Merit Analysis for Differential Evolution / 7.1:
Introduction / 7.1.1:
The System Model / 7.1.2:
Computational Details / 7.1.3:
Results and Discussion / 7.1.4:
Concluding Remarks / 7.1.5:
Non-Imaging Optical Design Using Differential Evolution / 7.2:
Objective Function / 7.2.1:
A Reverse Engineering Approach to Testing / 7.2.3:
A More Difficult Problem: An Extended Source / 7.2.4:
Conclusion / 7.2.5:
Optimization of an Industrial Compressor Supply System / 7.3:
Background Information on the Test Problem / 7.3.1:
System Optimization / 7.3.3:
Demand Profiles / 7.3.4:
Modified Differential Evolution; Extending the Generality of DE / 7.3.5:
Component Selection from the Database / 7.3.6:
Crossover Approaches / 7.3.7:
Testing Procedures / 7.3.8:
Obtaining 100% Certainty of the Results / 7.3.9:
Results / 7.3.10:
Minimal Representation Multi-Sensor Fusion Using Differential Evolution / 7.3.11:
Minimal Representation Multi-Sensor Fusion / 7.4.1:
Differential Evolution for Multi-Sensor Fusion / 7.4.3:
Experimental Results / 7.4.4:
Comparison with a Binary Genetic Algorithm / 7.4.5:
Determination of the Earthquake Hypocenter: A Challenge for the Differential Evolution Algorithm / 7.4.6:
Brief Outline of Direct Problem Solution / 7.5.1:
Synthetic Location Test / 7.5.3:
Convergence Properties / 7.5.4:
Conclusions / 7.5.5:
Parallel Differential Evolution: Application to 3-D Medical Image Registration / 7.6:
Medical Image Registration Using Similarity Measures / 7.6.1:
Optimization by Differential Evolution / 7.6.3:
Parallelization of Differential Evolution / 7.6.4:
Acknowledgments / 7.6.5:
Design of Efficient Erasure Codes with Differential Evolution / 7.7:
Codes from Bipartite Graphs / 7.7.1:
Code Design / 7.7.3:
Differential Evolution / 7.7.4:
FIWIZ - A Versatile Program for the Design of Digital Filters Using Differential Evolution / 7.7.5:
Unconventional Design Tasks / 7.8.1:
Approach / 7.8.3:
Examples / 7.8.4:
Optimization of Radial Active Magnetic Bearings by Using Differential Evolution and the Finite Element Method / 7.8.5:
Radial Active Magnetic Bearings / 7.9.1:
Magnetic Field Distribution and Force Computed by the Two-Dimensional FEM / 7.9.3:
RAMB Design Optimized by DE and the FEM / 7.9.4:
Application of Differential Evolution to the Analysis of X-Ray Reflectivity Data / 7.9.5:
The Data-Fitting Procedure / 7.10.1:
The Model and Simulation / 7.10.3:
Inverse Fractal Problem / 7.10.4:
General Introduction / 7.11.1:
Active Compensation in RF-Driven Plasmas by Means of Differential Evolution / 7.11.2:
RF-Driven Plasmas / 7.12.1:
Langmuir Probes / 7.12.3:
Active Compensation in RF-Driven Plasmas / 7.12.4:
Automated Control System Structure and Fitness Function / 7.12.5:
Experimental Setup / 7.12.6:
Parameters and Experimental Design / 7.12.7:
Appendix / 7.12.8:
Unconstrained Uni-Modal Test Functions / A.1:
Sphere / A.1.1:
Hyper-Ellipsoid / A.1.2:
Generalized Rosenbrock / A.1.3:
Schwefel's Ridge / A.1.4:
Neumaier #3 / A.1.5:
Unconstrained Multi-Modal Test Functions / A.2:
Ackley / A.2.1:
Griewangk / A.2.2:
Rastrigin / A.2.3:
Salomon / A.2.4:
Whitley / A.2.5:
Storn's Chebyshev / A.2.6:
Lennard-Jones / A.2.7:
Hilbert / A.2.8:
Modified Langerman / A.2.9:
Shekel's Foxholes / A.2.10:
Odd Square / A.2.11:
Katsuura / A.2.12:
Bound-Constrained Test Functions / A.3:
Schwefel / A.3.1:
Epistatic Michalewicz / A.3.2:
Rana / A.3.3:
Index
Preface
Table of Contents
The Motivation for Differential Evolution / 1:
63.

電子ブック

EB
Kenneth V. Price, Th Bäck, Jouni A. Lampinen, Rainer M. Storn
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2005
所蔵情報: loading…
目次情報: 続きを見る
Preface
Table of Contents
The Motivation for Differential Evolution / 1:
Introduction to Parameter Optimization / 1.1:
Overview / 1.1.1:
Single-Point, Derivative-Based Optimization / 1.1.2:
One-Point, Derivative-Free Optimization and the Step Size Problem / 1.1.3:
Local Versus Global Optimization / 1.2:
Simulated Annealing / 1.2.1:
Multi-Point, Derivative-Based Methods / 1.2.2:
Multi-Point, Derivative-Free Methods / 1.2.3:
Differential Evolution - A First Impression / 1.2.4:
References
The Differential Evolution Algorithm / 2:
Population Structure / 2.1:
Initialization / 2.1.2:
Mutation / 2.1.3:
Crossover / 2.1.4:
Selection / 2.1.5:
DE at a Glance / 2.1.6:
Visualizing DE / 2.1.7:
Notation / 2.1.8:
Parameter Representation / 2.2:
Bit Strings / 2.2.1:
Floating-Point / 2.2.2:
Floating-Point Constraints / 2.2.3:
Initial Bounds / 2.3:
Initial Distributions / 2.3.2:
Base Vector Selection / 2.4:
Choosing the Base Vector Index, r0 / 2.4.1:
One-to-One Base Vector Selection / 2.4.2:
A Comparison of Random Base Index Selection Methods / 2.4.3:
Degenerate Vector Combinations / 2.4.4:
Implementing Mutually Exclusive Indices / 2.4.5:
Gauging the Effects of Degenerate Combinations: The Sphere / 2.4.6:
Biased Base Vector Selection Schemes / 2.4.7:
Differential Mutation / 2.5:
The Mutation Scale Factor: F / 2.5.1:
Randomizing the Scale Factor / 2.5.2:
Recombination / 2.6:
The Role of Cr in Optimization / 2.6.1:
Arithmetic Recombination / 2.6.3:
Phase Portraits / 2.6.4:
The Either/Or Algorithm / 2.6.5:
Survival Criteria / 2.7:
Tournament Selection / 2.7.2:
One-to-One Survivor Selection / 2.7.3:
Local Versus Global Selection / 2.7.4:
Permutation Selection Invariance / 2.7.5:
Crossover-Dependent Selection Pressure / 2.7.6:
Parallel Performance / 2.7.7:
Extensions / 2.7.8:
Termination Criteria / 2.8:
Objective Met / 2.8.1:
Limit the Number of Generations / 2.8.2:
Population Statistics / 2.8.3:
Limited Time / 2.8.4:
Human Monitoring / 2.8.5:
Application Specific / 2.8.6:
Benchmarking Differential Evolution / 3:
About Testing / 3.1:
Performance Measures / 3.2:
DE Versus DE / 3.3:
The Algorithms / 3.3.1:
The Test Bed / 3.3.2:
Summary / 3.3.3:
DE Versus Other Optimizers / 3.4:
Comparative Performance: Thirty-Dimensional Functions / 3.4.1:
Comparative Studies: Unconstrained Optimization / 3.4.2:
Performance Comparisons from Other Problem Domains / 3.4.3:
Application-Based Performance Comparisons / 3.4.4:
Problem Domains / 3.5:
Function and Parameter Quantization / 4.1:
Uniform Quantization / 4.2.1:
Non-Uniform Quantization / 4.2.2:
Objective Function Quantization / 4.2.3:
Parameter Quantization / 4.2.4:
Mixed Variables / 4.2.5:
Optimization with Constraints / 4.3:
Boundary Constraints / 4.3.1:
Inequality Constraints / 4.3.2:
Equality Constraints / 4.3.3:
Combinatorial Problems / 4.4:
The Traveling Salesman Problem / 4.4.1:
The Permutation Matrix Approach / 4.4.2:
Relative Position Indexing / 4.4.3:
Onwubolu's Approach / 4.4.4:
Adjacency Matrix Approach / 4.4.5:
Design Centering / 4.4.6:
Divergence, Self-Steering and Pooling / 4.5.1:
Computing a Design Center / 4.5.2:
Multi-Objective Optimization / 4.6:
Weighted Sum of Objective Functions / 4.6.1:
Pareto Optimality / 4.6.2:
The Pareto-Front: Two Examples / 4.6.3:
Adapting DE for Multi-Objective Optimization / 4.6.4:
Dynamic Objective Functions / 4.7:
Stationary Optima / 4.7.1:
Non-Stationary Optima / 4.7.2:
Architectural Aspects and Computing Environments / 5:
DE on Parallel Processors / 5.1:
Background / 5.1.1:
Related Work / 5.1.2:
Drawbacks of the Standard Model / 5.1.3:
Modifying the Standard Model / 5.1.4:
The Master Process / 5.1.5:
DE on Limited Resource Devices / 5.2:
Random Numbers / 5.2.1:
Permutation Generators / 5.2.2:
Efficient Sorting / 5.2.3:
Memory-Saving DE Variants / 5.2.4:
Computer Code / 6:
DeMat - Differential Evolution for MATLAB / 6.1:
General Structure of DeMat / 6.1.1:
Naming and Coding Conventions / 6.1.2:
Data Flow Diagram / 6.1.3:
How to Use the Graphics / 6.1.4:
DeWin - DE for MS Windows: An Application in C / 6.2:
General Structure of DeWin / 6.2.1:
How To Use the Graphics / 6.2.2:
Functions of graphics.h / 6.2.5:
Software on the Accompanying CD / 6.3:
Applications / 7:
Genetic Algorithms and Related Techniques for Optimizing Si-H Clusters: A Merit Analysis for Differential Evolution / 7.1:
Introduction / 7.1.1:
The System Model / 7.1.2:
Computational Details / 7.1.3:
Results and Discussion / 7.1.4:
Concluding Remarks / 7.1.5:
Non-Imaging Optical Design Using Differential Evolution / 7.2:
Objective Function / 7.2.1:
A Reverse Engineering Approach to Testing / 7.2.3:
A More Difficult Problem: An Extended Source / 7.2.4:
Conclusion / 7.2.5:
Optimization of an Industrial Compressor Supply System / 7.3:
Background Information on the Test Problem / 7.3.1:
System Optimization / 7.3.3:
Demand Profiles / 7.3.4:
Modified Differential Evolution; Extending the Generality of DE / 7.3.5:
Component Selection from the Database / 7.3.6:
Crossover Approaches / 7.3.7:
Testing Procedures / 7.3.8:
Obtaining 100% Certainty of the Results / 7.3.9:
Results / 7.3.10:
Minimal Representation Multi-Sensor Fusion Using Differential Evolution / 7.3.11:
Minimal Representation Multi-Sensor Fusion / 7.4.1:
Differential Evolution for Multi-Sensor Fusion / 7.4.3:
Experimental Results / 7.4.4:
Comparison with a Binary Genetic Algorithm / 7.4.5:
Determination of the Earthquake Hypocenter: A Challenge for the Differential Evolution Algorithm / 7.4.6:
Brief Outline of Direct Problem Solution / 7.5.1:
Synthetic Location Test / 7.5.3:
Convergence Properties / 7.5.4:
Conclusions / 7.5.5:
Parallel Differential Evolution: Application to 3-D Medical Image Registration / 7.6:
Medical Image Registration Using Similarity Measures / 7.6.1:
Optimization by Differential Evolution / 7.6.3:
Parallelization of Differential Evolution / 7.6.4:
Acknowledgments / 7.6.5:
Design of Efficient Erasure Codes with Differential Evolution / 7.7:
Codes from Bipartite Graphs / 7.7.1:
Code Design / 7.7.3:
Differential Evolution / 7.7.4:
FIWIZ - A Versatile Program for the Design of Digital Filters Using Differential Evolution / 7.7.5:
Unconventional Design Tasks / 7.8.1:
Approach / 7.8.3:
Examples / 7.8.4:
Optimization of Radial Active Magnetic Bearings by Using Differential Evolution and the Finite Element Method / 7.8.5:
Radial Active Magnetic Bearings / 7.9.1:
Magnetic Field Distribution and Force Computed by the Two-Dimensional FEM / 7.9.3:
RAMB Design Optimized by DE and the FEM / 7.9.4:
Application of Differential Evolution to the Analysis of X-Ray Reflectivity Data / 7.9.5:
The Data-Fitting Procedure / 7.10.1:
The Model and Simulation / 7.10.3:
Inverse Fractal Problem / 7.10.4:
General Introduction / 7.11.1:
Active Compensation in RF-Driven Plasmas by Means of Differential Evolution / 7.11.2:
RF-Driven Plasmas / 7.12.1:
Langmuir Probes / 7.12.3:
Active Compensation in RF-Driven Plasmas / 7.12.4:
Automated Control System Structure and Fitness Function / 7.12.5:
Experimental Setup / 7.12.6:
Parameters and Experimental Design / 7.12.7:
Appendix / 7.12.8:
Unconstrained Uni-Modal Test Functions / A.1:
Sphere / A.1.1:
Hyper-Ellipsoid / A.1.2:
Generalized Rosenbrock / A.1.3:
Schwefel's Ridge / A.1.4:
Neumaier #3 / A.1.5:
Unconstrained Multi-Modal Test Functions / A.2:
Ackley / A.2.1:
Griewangk / A.2.2:
Rastrigin / A.2.3:
Salomon / A.2.4:
Whitley / A.2.5:
Storn's Chebyshev / A.2.6:
Lennard-Jones / A.2.7:
Hilbert / A.2.8:
Modified Langerman / A.2.9:
Shekel's Foxholes / A.2.10:
Odd Square / A.2.11:
Katsuura / A.2.12:
Bound-Constrained Test Functions / A.3:
Schwefel / A.3.1:
Epistatic Michalewicz / A.3.2:
Rana / A.3.3:
Index
Preface
Table of Contents
The Motivation for Differential Evolution / 1:
64.

電子ブック

EB
Mario A. A. Guti?rrez, Mario A. A. Guti?rrez, Daniel Thalmann, Fr?d?ric Vexo, Fr?d?ric Vexo
出版情報: Springer eBooks Computer Science , Springer London, 2008
所蔵情報: loading…
目次情報: 続きを見る
List of Figures
Introduction / 1:
Virtual Reality: The Science of Illusion / 1.1:
Basic Concepts / 1.2:
Immersion / 1.2.1:
Presence / 1.2.2:
A Brief History of Virtual Reality / 1.3:
Reality-Virtuality Continuum / 1.4:
Fundamentals / Part I:
Computer Graphics / 2:
Mathematics / 2.1:
Coordinate Systems / 2.1.1:
Vectors, Transformations and Matrices / 2.1.2:
Angular Representations / 2.1.3:
Projections / 2.1.4:
3D Modeling / 2.2:
Geometric Representations / 2.2.1:
Curves / 2.2.2:
Surfaces / 2.2.3:
3D Rendering / 2.3:
Local Illumination Model / 2.3.1:
Global Illumination Model / 2.3.2:
Textures / 2.3.3:
Rendering Pipeline / 2.3.4:
Computer Animation / 3:
Animation Types: Real Time and Image by Image / 3.1:
Articulated Bodies and Virtual Characters / 3.1.2:
Motion Control Methods / 3.2:
Motion Capture and Performance Animation / 3.3:
Optical Motion Capture Systems / 3.3.1:
Magnetic Trackers and Systems / 3.3.2:
Motion Capture Advantages and Disadvantages / 3.3.3:
Key-Frame Animation / 3.4:
Shape Interpolation and Parametric Keyframe Animation / 3.4.1:
Kochanek-Bartels Spline Interpolation / 3.4.2:
Inverse Kinematics / 3.5:
Motion Retargeting / 3.6:
Procedural Animation / 3.7:
Physics-Based Animation / 3.8:
Behavioral Animation / 3.9:
Virtual Worlds / Part II:
Virtual Characters / 4:
Virtual Humans in Virtual Environments / 4.1:
Character Skinning / 4.2:
Skeleton-Based Deformations / 4.2.1:
Data-Driven Methods / 4.2.2:
Physics-Based Approaches / 4.2.3:
Locomotion / 4.3:
Locomotion Generation / 4.3.1:
PCA-Based Locomotion / 4.3.2:
Virtual Human-Object interaction / 4.4:
Feature Modeling and Smart Objects / 4.4.1:
Grasping / 4.4.2:
Motion Planning / 4.4.3:
Facial Animation / 4.5:
Autonomous Characters / 4.6:
Why Autonomous Virtual Characters? / 4.6.1:
Properties of Autonomous Virtual Characters / 4.6.2:
Behaviors for Autonomous Virtual Characters / 4.6.3:
Crowd Simulation / 4.7:
Architecture of Virtual Reality Systems / 5:
Scene Graph-Based Systems / 5.1:
Semantic Virtual Environments / 5.2:
Generic System Architecture for VR Systems / 5.3:
Distributed Virtual Environments / 5.4:
Communication Architecture / 5.4.1:
Interest Management / 5.4.2:
Concurrency Control / 5.4.3:
Data Replication / 5.4.4:
Load Distribution / 5.4.5:
Mixed Realities / 6:
Augmented Reality and Augmented Virtuality / 6.1:
Tracking Techniques / 6.2:
Markers-Based Tracking / 6.2.1:
Marker-Less Tracking / 6.2.2:
Mixed Reality Tool Kits / 6.3:
Perceiving Virtual Worlds / Part III:
Vision / 7:
Graphical Display Technologies / 7.1:
Cathode-Ray Tubes / 7.1.1:
Liquid Crystal Displays / 7.1.2:
Plasma Displays / 7.1.3:
Virtual Reality Displays / 7.2:
Head-Mounted Displays / 7.2.1:
Fish Tank VR / 7.2.2:
Handheld Displays / 7.2.3:
Large Projection Screens / 7.2.4:
CAVE Systems / 7.2.5:
Audition / 8:
The Need for Sound in VR / 8.1:
Recording and Reproduction of Spatial Sound / 8.2:
Synthesis of Spatial Sound / 8.3:
Sound Rendering / 8.3.1:
Head-Related Transfer Function / 8.3.2:
3D Sound Imaging / 8.3.3:
Utilization of Loudspeaker Location / 8.3.4:
Sound Systems for VR / 8.4:
Sound Hardware / 8.4.1:
Sound Engines / 8.4.2:
Touch / 9:
The Need for Touch in VR / 9.1:
Data Gloves / 9.2:
Haptic Rendering / 9.3:
History of Haptic Rendering / 9.3.1:
Haptic Interfaces / 9.4:
Vibrotactile Displays / 9.4.1:
Tactile Displays / 9.4.2:
Kinesthetic Displays / 9.4.3:
Smell and Taste / 10:
The Need for Smells and Tastes in VR / 10.1:
Smell Interfaces / 10.2:
Taste interfaces / 10.3:
Applications / Part IV:
Health Sciences / 11:
Virtual Surgery / 11.1:
Virtual Rehabilitation and Therapy / 11.2:
Physiotherapy / 11.2.1:
Psychological Therapy / 11.2.2:
Virtual Anatomy / 11.3:
Cultural Heritage / 12:
Virtual Campeche and Calakmul / 12.1:
Virtual Dunhuang / 12.2:
Terracotta Soldiers / 12.3:
EU-INCO CAHRISMA and ERATO / 12.4:
EU-IST Archeoguide / 12.5:
EU-IST Lifeplus / 12.6:
Other VR Applications / 13:
Vehicle Simulators / 13.1:
Manufacturing / 13.2:
Entertainment / 13.3:
References
Index
List of Figures
Introduction / 1:
Virtual Reality: The Science of Illusion / 1.1:
65.

電子ブック

EB
Mario A. A. Gutiérrez, Mario A. A. Gutiérrez, Daniel Thalmann, Frédéric Vexo, Frédéric Vexo, F. Vexo
出版情報: SpringerLink Books - AutoHoldings , Springer London, 2008
所蔵情報: loading…
目次情報: 続きを見る
List of Figures
Introduction / 1:
Virtual Reality: The Science of Illusion / 1.1:
Basic Concepts / 1.2:
Immersion / 1.2.1:
Presence / 1.2.2:
A Brief History of Virtual Reality / 1.3:
Reality-Virtuality Continuum / 1.4:
Fundamentals / Part I:
Computer Graphics / 2:
Mathematics / 2.1:
Coordinate Systems / 2.1.1:
Vectors, Transformations and Matrices / 2.1.2:
Angular Representations / 2.1.3:
Projections / 2.1.4:
3D Modeling / 2.2:
Geometric Representations / 2.2.1:
Curves / 2.2.2:
Surfaces / 2.2.3:
3D Rendering / 2.3:
Local Illumination Model / 2.3.1:
Global Illumination Model / 2.3.2:
Textures / 2.3.3:
Rendering Pipeline / 2.3.4:
Computer Animation / 3:
Animation Types: Real Time and Image by Image / 3.1:
Articulated Bodies and Virtual Characters / 3.1.2:
Motion Control Methods / 3.2:
Motion Capture and Performance Animation / 3.3:
Optical Motion Capture Systems / 3.3.1:
Magnetic Trackers and Systems / 3.3.2:
Motion Capture Advantages and Disadvantages / 3.3.3:
Key-Frame Animation / 3.4:
Shape Interpolation and Parametric Keyframe Animation / 3.4.1:
Kochanek-Bartels Spline Interpolation / 3.4.2:
Inverse Kinematics / 3.5:
Motion Retargeting / 3.6:
Procedural Animation / 3.7:
Physics-Based Animation / 3.8:
Behavioral Animation / 3.9:
Virtual Worlds / Part II:
Virtual Characters / 4:
Virtual Humans in Virtual Environments / 4.1:
Character Skinning / 4.2:
Skeleton-Based Deformations / 4.2.1:
Data-Driven Methods / 4.2.2:
Physics-Based Approaches / 4.2.3:
Locomotion / 4.3:
Locomotion Generation / 4.3.1:
PCA-Based Locomotion / 4.3.2:
Virtual Human-Object interaction / 4.4:
Feature Modeling and Smart Objects / 4.4.1:
Grasping / 4.4.2:
Motion Planning / 4.4.3:
Facial Animation / 4.5:
Autonomous Characters / 4.6:
Why Autonomous Virtual Characters? / 4.6.1:
Properties of Autonomous Virtual Characters / 4.6.2:
Behaviors for Autonomous Virtual Characters / 4.6.3:
Crowd Simulation / 4.7:
Architecture of Virtual Reality Systems / 5:
Scene Graph-Based Systems / 5.1:
Semantic Virtual Environments / 5.2:
Generic System Architecture for VR Systems / 5.3:
Distributed Virtual Environments / 5.4:
Communication Architecture / 5.4.1:
Interest Management / 5.4.2:
Concurrency Control / 5.4.3:
Data Replication / 5.4.4:
Load Distribution / 5.4.5:
Mixed Realities / 6:
Augmented Reality and Augmented Virtuality / 6.1:
Tracking Techniques / 6.2:
Markers-Based Tracking / 6.2.1:
Marker-Less Tracking / 6.2.2:
Mixed Reality Tool Kits / 6.3:
Perceiving Virtual Worlds / Part III:
Vision / 7:
Graphical Display Technologies / 7.1:
Cathode-Ray Tubes / 7.1.1:
Liquid Crystal Displays / 7.1.2:
Plasma Displays / 7.1.3:
Virtual Reality Displays / 7.2:
Head-Mounted Displays / 7.2.1:
Fish Tank VR / 7.2.2:
Handheld Displays / 7.2.3:
Large Projection Screens / 7.2.4:
CAVE Systems / 7.2.5:
Audition / 8:
The Need for Sound in VR / 8.1:
Recording and Reproduction of Spatial Sound / 8.2:
Synthesis of Spatial Sound / 8.3:
Sound Rendering / 8.3.1:
Head-Related Transfer Function / 8.3.2:
3D Sound Imaging / 8.3.3:
Utilization of Loudspeaker Location / 8.3.4:
Sound Systems for VR / 8.4:
Sound Hardware / 8.4.1:
Sound Engines / 8.4.2:
Touch / 9:
The Need for Touch in VR / 9.1:
Data Gloves / 9.2:
Haptic Rendering / 9.3:
History of Haptic Rendering / 9.3.1:
Haptic Interfaces / 9.4:
Vibrotactile Displays / 9.4.1:
Tactile Displays / 9.4.2:
Kinesthetic Displays / 9.4.3:
Smell and Taste / 10:
The Need for Smells and Tastes in VR / 10.1:
Smell Interfaces / 10.2:
Taste interfaces / 10.3:
Applications / Part IV:
Health Sciences / 11:
Virtual Surgery / 11.1:
Virtual Rehabilitation and Therapy / 11.2:
Physiotherapy / 11.2.1:
Psychological Therapy / 11.2.2:
Virtual Anatomy / 11.3:
Cultural Heritage / 12:
Virtual Campeche and Calakmul / 12.1:
Virtual Dunhuang / 12.2:
Terracotta Soldiers / 12.3:
EU-INCO CAHRISMA and ERATO / 12.4:
EU-IST Archeoguide / 12.5:
EU-IST Lifeplus / 12.6:
Other VR Applications / 13:
Vehicle Simulators / 13.1:
Manufacturing / 13.2:
Entertainment / 13.3:
References
Index
List of Figures
Introduction / 1:
Virtual Reality: The Science of Illusion / 1.1:
66.

電子ブック

EB
Marcus du Sautoy, F. Takens, Luke Woodward
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
A Brief History of Zeta Functions / 1.1:
Euler, Riemann / 1.1.1:
Dirichlet / 1.1.2:
Dedekind / 1.1.3:
Artin, Weil / 1.1.4:
Birch, Swinnerton-Dyer / 1.1.5:
Zeta Functions of Groups / 1.2:
Zeta Functions of Algebraic Groups / 1.2.1:
Zeta Functions of Rings / 1.2.2:
Local Functional Equations / 1.2.3:
Uniformity / 1.2.4:
Analytic Properties / 1.2.5:
p-Adic Integrals / 1.3:
Natural Boundaries of Euler Products / 1.4:
Nilpotent Groups: Explicit Examples / 2:
Calculating Zeta Functions of Groups / 2.1:
Calculating Zeta Functions of Lie Rings / 2.2:
Constructing the Cone Integral / 2.2.1:
Resolution / 2.2.2:
Evaluating Monomial Integrals / 2.2.3:
Summing the Rational Functions / 2.2.4:
Explicit Examples / 2.3:
Free Abelian Lie Rings / 2.4:
Heisenberg Lie Ring and Variants / 2.5:
Grenham's Lie Rings / 2.6:
Free Class-2 Nilpotent Lie Rings / 2.7:
Three Generators / 2.7.1:
n Generators / 2.7.2:
The 'Elliptic Curve Example' / 2.8:
Other Class Two Examples / 2.9:
The Maximal Class Lie Ring M[subscript 3] and Variants / 2.10:
Lie Rings with Large Abelian Ideals / 2.11:
F[subscript 3,2] / 2.12:
The Maximal Class Lie Rings M[subscript 4] and Fil[subscript 4] / 2.13:
Nilpotent Lie Algebras of Dimension [less than or equal] 6 / 2.14:
Nilpotent Lie Algebras of Dimension 7 / 2.15:
Soluble Lie Rings / 3:
Proof of Theorem 3.1 / 3.1:
Choosing a Basis for tr[subscript n](Z) / 3.2.1:
Determining the Conditions / 3.2.2:
Constructing the Zeta Function / 3.2.3:
Transforming the Conditions / 3.2.4:
Deducing the Functional Equation / 3.2.5:
Variations / 3.3:
Quotients of tr[subscript n](Z) / 3.4.1:
Counting All Subrings / 3.4.2:
Algebraic Groups / 4:
Nilpotent Groups and Lie Rings / 4.3:
The Conjecture / 4.4:
Special Cases Known to Hold / 4.5:
A Special Case of the Conjecture / 4.6:
Projectivisation / 4.6.1:
Manipulating the Cone Sums / 4.6.2:
Cones and Schemes / 4.6.4:
Quasi-Good Sets / 4.6.5:
Quasi-Good Sets: The Monomial Case / 4.6.6:
Applications of Conjecture 4.5 / 4.7:
Counting Subrings and p-Subrings / 4.8:
Counting Ideals and p-Ideals / 4.9:
Heights, Cocentral Bases and the [pi]-Map / 4.9.1:
Property ([dagger]) / 4.9.2:
Lie Rings Without ([dagger]) / 4.9.3:
Natural Boundaries I: Theory / 5:
A Natural Boundary for [zeta]GSp[subscript 6] (s) / 5.1:
Natural Boundaries for Euler Products / 5.2:
Practicalities / 5.2.1:
Distinguishing Types I, II and III / 5.2.2:
Avoiding the Riemann Hypothesis / 5.3:
All Local Zeros on or to the Left of R(s) = [beta] / 5.4:
Using Riemann Zeros / 5.4.1:
Avoiding Rational Independence of Riemann Zeros / 5.4.2:
Continuation with Finitely Many Riemann Zeta Functions / 5.4.3:
Infinite Products of Riemann Zeta Functions / 5.4.4:
Natural Boundaries II: Algebraic Groups / 6:
G = GO[subscript 2l+1] of Type B[subscript l] / 6.1:
G = GSp[subscript 2l] of Type C[subscript l] or G = GO[superscript +][subscript 2l] of Type D[subscript l] / 6.3:
G = GSp[subscript 2l] of Type C[subscript l] / 6.3.1:
G = GO[superscript + subscript 2l] of Type D[subscript l] / 6.3.2:
Natural Boundaries III: Nilpotent Groups / 7:
Zeta Functions with Meromorphic Continuation / 7.1:
Zeta Functions with Natural Boundaries / 7.3:
Type I / 7.3.1:
Type II / 7.3.2:
Type III / 7.3.3:
Other Types / 7.4:
Types IIIa and IIIb / 7.4.1:
Types IV, V and VI / 7.4.2:
Large Polynomials / A:
H[superscript 4], Counting Ideals / A.1:
g[subscript 6,4], Counting All Subrings / A.2:
T[subscript 4], Counting All Subrings / A.3:
L[subscript (3,2,2)], Counting Ideals / A.4:
G[subscript 3] x g[subscript 5,3], Counting Ideals / A.5:
g[subscript 6,12], Counting All Subrings / A.6:
g[subscript 1357G], Counting Ideals / A.7:
g[subscript 1457A], Counting Ideals / A.8:
g[subscript 1457B], Counting Ideals / A.9:
tr[subscript 6](Z), Counting Ideals / A.10:
tr[subscript 7](Z), Counting Ideals / A.11:
Factorisation of Polynomials Associated to Classical Groups / B:
References
Index
Index of Notation
Introduction / 1:
A Brief History of Zeta Functions / 1.1:
Euler, Riemann / 1.1.1:
67.

電子ブック

EB
Pierre Henry
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
The Project / 1:
Purpose and Contents of This Book / 1.1:
The Signs / 1.1.1:
Testing Revisited / 1.1.2:
Introduction to Testing / 2:
Testing Challenges / 2.1:
Business and IT / 2.1.1:
The Human Factor / 2.1.2:
Old and New Worlds / 2.1.3:
Banking Platform Renewal / 2.1.4:
Complex Testing / 2.1.5:
Global Testing / 2.1.6:
The Value of Testing / 2.1.7:
The Significance of Requirements / 2.2:
What is a Requirement? / 2.2.1:
Meeting the Unknown / 2.2.2:
Characteristics of Requirements / 2.2.3:
Requirements Elicitation / 2.2.4:
Main Problems with Requirements / 2.2.5:
Risks Associated with Requirements / 2.2.6:
Recommendations / 2.2.7:
The Nonconformity Problem / 2.3:
How Defects are Born / 2.3.1:
Nonconformity to Standards and Rules / 2.3.2:
Aging of Product Components / 2.3.3:
Environmental Changes / 2.3.4:
Outdated Tests / 2.3.5:
Conformity Assessment / 2.3.6:
The Costs of the Nonconformity / 2.3.7:
Mission Impossible? / 2.3.8:
Complexity / 2.3.9:
Test Artifacts / 2.4:
Classification of Test Artifacts / 2.4.1:
Information Life Cycle / 2.4.2:
Data Life Cycle / 2.4.3:
Testing Predictability / 2.5:
Business Rules / 2.5.1:
Business Rules Management (BRM) / 2.5.2:
Software Reliability / 2.5.3:
Software Quality Criteria [ISO 9126] / 2.5.4:
Software Development Methods / 2.6:
V-Model / 2.6.1:
Agile Software Development / 2.6.2:
What is Agility? / 2.6.3:
Iterative Development / 2.6.4:
Waterfall and Agile Methods Compared / 2.6.5:
Staged Delivery Method / 2.6.6:
Selection of the Right Development Method / 2.6.7:
The Testing Value Chain (TVC) / 2.7:
The SO Organization / 2.7.1:
Quality Gates / 2.7.2:
Test Methods and Technology / 3:
Different Views of Testing / 3.1:
Test Methods - Overview / 3.1.1:
Dynamic Test Methods / 3.2:
Structural Testing (White Box) / 3.2.1:
Functional Testing (Black Box) / 3.2.2:
Para-Functional Testing / 3.2.3:
Static Test Methods / 3.3:
Inspections / 3.3.1:
Reviews / 3.3.2:
Static Analysis (SA) / 3.3.3:
Design Verification (DV) / 3.3.4:
Ways to Test / 3.4:
Planned Testing (PT) / 3.4.1:
Exploratory Testing (ET) / 3.4.2:
Performance Testing (PT) / 3.4.3:
Rapid Testing / 3.4.4:
Regression Testing (RT) / 3.4.5:
Extended Random Regression Testing (ERRT) / 3.4.6:
Scenario Testing / 3.4.7:
SOA Testing / 3.4.8:
Test Technology / 3.4.9:
Model-Based Testing (MBT) / 3.5.1:
Model-Based Integration and Testing (MBI&T) / 3.5.2:
Model Checking / 3.5.3:
Test Automation / 3.5.4:
The Test Domain / 4:
Topology of the Test Domain / 4.1:
Environmental Factors / 4.1.1:
Business Pressure on IT / 4.1.2:
IT Technology / 4.1.3:
Mainframe as the Foundation of the IT Infrastructure / 4.1.4:
A Complex Network / 4.1.5:
Multi-Tier Architecture / 4.1.6:
Backward and Lateral Compatibility / 4.1.7:
Multi-Layered Test Domain / 4.1.8:
SOA / 4.1.9:
Data and Time Aspects / 4.2:
Master Data Management (MDM) / 4.2.1:
Business Data Categorization / 4.2.2:
Business Data Growth / 4.2.3:
Test Data Management (TDM) / 4.2.4:
Business Data Lifecycle / 4.2.5:
Bi-Temporality / 4.2.7:
Causality Violation / 4.2.8:
Other Time Aspects / 4.2.9:
Table-Driven Systems (TDS) / 4.3:
Tabular Representation of Data / 4.3.1:
Characteristics of Tables / 4.3.2:
Usage of Tables / 4.3.3:
Specification Tables / 4.3.4:
Transient Tables and Data / 4.3.5:
Relational Databases / 4.3.6:
TDS Testing / 4.3.7:
Critical Technical Parameters / 4.4:
Definition / 4.4.1:
Examples of CTPs / 4.4.2:
Test Processes / 5:
The Testing Network - Process Technology / 5.1:
What is a Process? / 5.1.1:
Process Networks / 5.1.2:
Test Process Landscape / 5.1.3:
Core Testing Processes / 5.2:
Overview / 5.2.1:
Test Strategy Elaboration / 5.2.2:
Test Planning / 5.2.3:
Test Objectives Definition / 5.2.4:
Test Design Techniques / 5.2.5:
Test Artifacts Management / 5.2.6:
TC Design / 5.2.7:
TC Review / 5.2.8:
TC Implementation / 5.2.9:
TC Archiving / 5.2.10:
Test Set Build / 5.2.11:
Test Runs / 5.2.12:
Test Results Analysis / 5.2.13:
Incident and Problem Management (IPM) / 5.2.14:
Incident Tracking and Channeling (ITC) / 5.2.15:
Compliance Testing Process (CTP) / 5.2.16:
Distributed Testing / 5.2.17:
Test Support Processes / 5.3:
Document Management / 5.3.1:
Information Channeling / 5.3.2:
Training/Skills Improvement / 5.3.3:
Software Testing Certification / 5.3.4:
Test Neighbor Processes / 5.4:
Specifications Review / 5.4.1:
Software Package Build / 5.4.2:
Software Build Manager Role / 5.4.3:
Software Package Installation / 5.4.4:
Release Management / 5.4.5:
Test Data Management / 5.4.6:
Risk Management / 5.4.7:
Test Platforms and Tools / 6:
The Integrated Test Platform / 6.1:
Benefits of an ITP / 6.1.1:
Test Platform Management / 6.1.2:
TD for QC / 6.2:
TD Staffing / 6.2.1:
TD Administration / 6.2.2:
TD Modules / 6.2.3:
Requirements Module / 6.2.4:
TestPlan Module / 6.2.5:
TestLab Module / 6.2.6:
Defect Module / 6.2.7:
Analysis Function / 6.2.8:
Export Function / 6.2.9:
Traceability Function / 6.2.10:
Email and Workflow / 6.2.11:
Document Generator / 6.2.12:
Other Functions / 6.2.13:
Dashboard / 6.2.14:
The Leading Commercial SA Tools / 6.3:
The Leading Commercial Testing Tools / 6.4:
The Analysis of Defect Root Causes / 7:
The Methodological Approach / 7.1:
Defect Classification Schemes / 7.1.1:
Orthogonal Default Classification (ODC) / 7.1.2:
Situational Analysis / 7.1.3:
Ishikawa Diagram / 7.1.4:
Limitations of Cause and Effect Models / 7.1.5:
Causal Chains Explained / 7.2:
Identifying Problem Sources / 7.2.1:
Test Perimeter / 7.2.2:
Causal Chain Examples / 7.2.3:
Data-Dependent Testing / 7.3:
Database Testing / 7.3.1:
SQL Tuning Sets (STSs) / 7.3.2:
Bi-temporality Issues / 7.3.3:
Data State / 7.3.4:
Frequent Causes of Problems / 7.3.6:
Deadlock / 7.4.1:
Fixes / 7.4.2:
Interfaces / 7.4.3:
Memory Leaks / 7.4.4:
Metadata / 7.4.5:
Network-Centric Applications / 7.4.6:
Network problems / 7.4.7:
SW Package Build / 7.4.8:
Wrong Parameters / 7.4.9:
Software Aging / 7.5:
Causes of Software Decay / 7.5.1:
Symptoms of Code Decay / 7.5.2:
Risk factors Related to Software Aging / 7.5.3:
The Cost of Software Aging / 7.5.4:
An Analysis Tool for Aging Software / 7.5.5:
The Investigation of a Technical Problem / 7.6:
Technical Processes (TPs) / 7.6.1:
Measuring Test Efforts / 8:
Overall Project Progress Measurement / 8.1:
EVA's Power / 8.1.1:
EVA's Benefits / 8.1.2:
Test Progress Reporting (TPR) / 8.2:
Technical Measurement / 8.2.1:
Test Monitoring / 8.2.2:
Implementing TPR / 8.2.3:
Test Quality Measurement / 8.2.4:
Test Progress Measurement / 8.2.5:
Test Progress Horizon / 8.2.6:
Test Progress Prediction / 8.2.7:
Test Progress Reporting with TD/QC / 8.2.8:
Central Reporting with TD/QC / 8.2.9:
Test Issues / 9:
Risk Management in the Enterprise IT Project / 9.1:
The Scope of IT Risk Management / 9.1.2:
Risk-Based Testing / 9.1.3:
Limitations on Risk Management / 9.1.4:
Risks Related to Compliance / 9.1.5:
Implementing Sarbanes-Oxley in TestDirector / 9.1.6:
The Impact of International Regulations on IT / 9.1.7:
Recommended Lectures / 9.1.8:
IPC Management / 9.2:
Detecting Danger Areas in the Project / 9.2.1:
Crisis Management / 9.2.2:
Conclusion
Appendices
Useful Aids / A:
Templates / A.1:
Data Profile / A.1.1:
Project Status / A.1.2:
Release Flash / A.1.3:
Top-Down Process Modelling / A.1.4:
Software Test Documentation (IEEE Standard) / A.1.5:
Checklists / A.2:
Cause-Effect Checklist / A.2.1:
Code Review Checklist / A.2.2:
Functionality Checklist / A.2.3:
How to Create Component Test Cases / A.2.4:
Investigation of a Technical Problem / A.2.5:
ODC Triggers Usage / A.2.6:
Process Design Parameters / A.2.7:
Requirements Definition / A.2.8:
Test Case Conformity Checklist / A.2.9:
Test Case Review Checklist / A.2.10:
Test Findings / A.2.11:
Sarbanes-Oxley Compliance / B:
Test Platforms and Tool Providers / C:
Acronyms / D:
Glossary
Bibliography
Links
Index
Acknowledgements
Copyrights and Trademarks
The Project / 1:
Purpose and Contents of This Book / 1.1:
The Signs / 1.1.1:
68.

電子ブック

EB
Pierre Henry
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
The Project / 1:
Purpose and Contents of This Book / 1.1:
The Signs / 1.1.1:
Testing Revisited / 1.1.2:
Introduction to Testing / 2:
Testing Challenges / 2.1:
Business and IT / 2.1.1:
The Human Factor / 2.1.2:
Old and New Worlds / 2.1.3:
Banking Platform Renewal / 2.1.4:
Complex Testing / 2.1.5:
Global Testing / 2.1.6:
The Value of Testing / 2.1.7:
The Significance of Requirements / 2.2:
What is a Requirement? / 2.2.1:
Meeting the Unknown / 2.2.2:
Characteristics of Requirements / 2.2.3:
Requirements Elicitation / 2.2.4:
Main Problems with Requirements / 2.2.5:
Risks Associated with Requirements / 2.2.6:
Recommendations / 2.2.7:
The Nonconformity Problem / 2.3:
How Defects are Born / 2.3.1:
Nonconformity to Standards and Rules / 2.3.2:
Aging of Product Components / 2.3.3:
Environmental Changes / 2.3.4:
Outdated Tests / 2.3.5:
Conformity Assessment / 2.3.6:
The Costs of the Nonconformity / 2.3.7:
Mission Impossible? / 2.3.8:
Complexity / 2.3.9:
Test Artifacts / 2.4:
Classification of Test Artifacts / 2.4.1:
Information Life Cycle / 2.4.2:
Data Life Cycle / 2.4.3:
Testing Predictability / 2.5:
Business Rules / 2.5.1:
Business Rules Management (BRM) / 2.5.2:
Software Reliability / 2.5.3:
Software Quality Criteria [ISO 9126] / 2.5.4:
Software Development Methods / 2.6:
V-Model / 2.6.1:
Agile Software Development / 2.6.2:
What is Agility? / 2.6.3:
Iterative Development / 2.6.4:
Waterfall and Agile Methods Compared / 2.6.5:
Staged Delivery Method / 2.6.6:
Selection of the Right Development Method / 2.6.7:
The Testing Value Chain (TVC) / 2.7:
The SO Organization / 2.7.1:
Quality Gates / 2.7.2:
Test Methods and Technology / 3:
Different Views of Testing / 3.1:
Test Methods - Overview / 3.1.1:
Dynamic Test Methods / 3.2:
Structural Testing (White Box) / 3.2.1:
Functional Testing (Black Box) / 3.2.2:
Para-Functional Testing / 3.2.3:
Static Test Methods / 3.3:
Inspections / 3.3.1:
Reviews / 3.3.2:
Static Analysis (SA) / 3.3.3:
Design Verification (DV) / 3.3.4:
Ways to Test / 3.4:
Planned Testing (PT) / 3.4.1:
Exploratory Testing (ET) / 3.4.2:
Performance Testing (PT) / 3.4.3:
Rapid Testing / 3.4.4:
Regression Testing (RT) / 3.4.5:
Extended Random Regression Testing (ERRT) / 3.4.6:
Scenario Testing / 3.4.7:
SOA Testing / 3.4.8:
Test Technology / 3.4.9:
Model-Based Testing (MBT) / 3.5.1:
Model-Based Integration and Testing (MBI&T) / 3.5.2:
Model Checking / 3.5.3:
Test Automation / 3.5.4:
The Test Domain / 4:
Topology of the Test Domain / 4.1:
Environmental Factors / 4.1.1:
Business Pressure on IT / 4.1.2:
IT Technology / 4.1.3:
Mainframe as the Foundation of the IT Infrastructure / 4.1.4:
A Complex Network / 4.1.5:
Multi-Tier Architecture / 4.1.6:
Backward and Lateral Compatibility / 4.1.7:
Multi-Layered Test Domain / 4.1.8:
SOA / 4.1.9:
Data and Time Aspects / 4.2:
Master Data Management (MDM) / 4.2.1:
Business Data Categorization / 4.2.2:
Business Data Growth / 4.2.3:
Test Data Management (TDM) / 4.2.4:
Business Data Lifecycle / 4.2.5:
Bi-Temporality / 4.2.7:
Causality Violation / 4.2.8:
Other Time Aspects / 4.2.9:
Table-Driven Systems (TDS) / 4.3:
Tabular Representation of Data / 4.3.1:
Characteristics of Tables / 4.3.2:
Usage of Tables / 4.3.3:
Specification Tables / 4.3.4:
Transient Tables and Data / 4.3.5:
Relational Databases / 4.3.6:
TDS Testing / 4.3.7:
Critical Technical Parameters / 4.4:
Definition / 4.4.1:
Examples of CTPs / 4.4.2:
Test Processes / 5:
The Testing Network - Process Technology / 5.1:
What is a Process? / 5.1.1:
Process Networks / 5.1.2:
Test Process Landscape / 5.1.3:
Core Testing Processes / 5.2:
Overview / 5.2.1:
Test Strategy Elaboration / 5.2.2:
Test Planning / 5.2.3:
Test Objectives Definition / 5.2.4:
Test Design Techniques / 5.2.5:
Test Artifacts Management / 5.2.6:
TC Design / 5.2.7:
TC Review / 5.2.8:
TC Implementation / 5.2.9:
TC Archiving / 5.2.10:
Test Set Build / 5.2.11:
Test Runs / 5.2.12:
Test Results Analysis / 5.2.13:
Incident and Problem Management (IPM) / 5.2.14:
Incident Tracking and Channeling (ITC) / 5.2.15:
Compliance Testing Process (CTP) / 5.2.16:
Distributed Testing / 5.2.17:
Test Support Processes / 5.3:
Document Management / 5.3.1:
Information Channeling / 5.3.2:
Training/Skills Improvement / 5.3.3:
Software Testing Certification / 5.3.4:
Test Neighbor Processes / 5.4:
Specifications Review / 5.4.1:
Software Package Build / 5.4.2:
Software Build Manager Role / 5.4.3:
Software Package Installation / 5.4.4:
Release Management / 5.4.5:
Test Data Management / 5.4.6:
Risk Management / 5.4.7:
Test Platforms and Tools / 6:
The Integrated Test Platform / 6.1:
Benefits of an ITP / 6.1.1:
Test Platform Management / 6.1.2:
TD for QC / 6.2:
TD Staffing / 6.2.1:
TD Administration / 6.2.2:
TD Modules / 6.2.3:
Requirements Module / 6.2.4:
TestPlan Module / 6.2.5:
TestLab Module / 6.2.6:
Defect Module / 6.2.7:
Analysis Function / 6.2.8:
Export Function / 6.2.9:
Traceability Function / 6.2.10:
Email and Workflow / 6.2.11:
Document Generator / 6.2.12:
Other Functions / 6.2.13:
Dashboard / 6.2.14:
The Leading Commercial SA Tools / 6.3:
The Leading Commercial Testing Tools / 6.4:
The Analysis of Defect Root Causes / 7:
The Methodological Approach / 7.1:
Defect Classification Schemes / 7.1.1:
Orthogonal Default Classification (ODC) / 7.1.2:
Situational Analysis / 7.1.3:
Ishikawa Diagram / 7.1.4:
Limitations of Cause and Effect Models / 7.1.5:
Causal Chains Explained / 7.2:
Identifying Problem Sources / 7.2.1:
Test Perimeter / 7.2.2:
Causal Chain Examples / 7.2.3:
Data-Dependent Testing / 7.3:
Database Testing / 7.3.1:
SQL Tuning Sets (STSs) / 7.3.2:
Bi-temporality Issues / 7.3.3:
Data State / 7.3.4:
Frequent Causes of Problems / 7.3.6:
Deadlock / 7.4.1:
Fixes / 7.4.2:
Interfaces / 7.4.3:
Memory Leaks / 7.4.4:
Metadata / 7.4.5:
Network-Centric Applications / 7.4.6:
Network problems / 7.4.7:
SW Package Build / 7.4.8:
Wrong Parameters / 7.4.9:
Software Aging / 7.5:
Causes of Software Decay / 7.5.1:
Symptoms of Code Decay / 7.5.2:
Risk factors Related to Software Aging / 7.5.3:
The Cost of Software Aging / 7.5.4:
An Analysis Tool for Aging Software / 7.5.5:
The Investigation of a Technical Problem / 7.6:
Technical Processes (TPs) / 7.6.1:
Measuring Test Efforts / 8:
Overall Project Progress Measurement / 8.1:
EVA's Power / 8.1.1:
EVA's Benefits / 8.1.2:
Test Progress Reporting (TPR) / 8.2:
Technical Measurement / 8.2.1:
Test Monitoring / 8.2.2:
Implementing TPR / 8.2.3:
Test Quality Measurement / 8.2.4:
Test Progress Measurement / 8.2.5:
Test Progress Horizon / 8.2.6:
Test Progress Prediction / 8.2.7:
Test Progress Reporting with TD/QC / 8.2.8:
Central Reporting with TD/QC / 8.2.9:
Test Issues / 9:
Risk Management in the Enterprise IT Project / 9.1:
The Scope of IT Risk Management / 9.1.2:
Risk-Based Testing / 9.1.3:
Limitations on Risk Management / 9.1.4:
Risks Related to Compliance / 9.1.5:
Implementing Sarbanes-Oxley in TestDirector / 9.1.6:
The Impact of International Regulations on IT / 9.1.7:
Recommended Lectures / 9.1.8:
IPC Management / 9.2:
Detecting Danger Areas in the Project / 9.2.1:
Crisis Management / 9.2.2:
Conclusion
Appendices
Useful Aids / A:
Templates / A.1:
Data Profile / A.1.1:
Project Status / A.1.2:
Release Flash / A.1.3:
Top-Down Process Modelling / A.1.4:
Software Test Documentation (IEEE Standard) / A.1.5:
Checklists / A.2:
Cause-Effect Checklist / A.2.1:
Code Review Checklist / A.2.2:
Functionality Checklist / A.2.3:
How to Create Component Test Cases / A.2.4:
Investigation of a Technical Problem / A.2.5:
ODC Triggers Usage / A.2.6:
Process Design Parameters / A.2.7:
Requirements Definition / A.2.8:
Test Case Conformity Checklist / A.2.9:
Test Case Review Checklist / A.2.10:
Test Findings / A.2.11:
Sarbanes-Oxley Compliance / B:
Test Platforms and Tool Providers / C:
Acronyms / D:
Glossary
Bibliography
Links
Index
Acknowledgements
Copyrights and Trademarks
The Project / 1:
Purpose and Contents of This Book / 1.1:
The Signs / 1.1.1:
69.

図書

図書
Jean-Pierre Colinge, editor
出版情報: New York : Springer, c2008  xiii, 339 p. ; 24 cm
シリーズ名: Series on Integrated Circuits and Systems
所蔵情報: loading…
目次情報: 続きを見る
Preface
Table of Content
Contributors
The SOI MOSFET: from Single Gate to Multigate / 1:
MOSFET scaling and Moore's law / 1.1:
Short-Channel Effects / 1.2:
Gate Geometry and Electrostatic Integrity / 1.3:
A Brief History of Multiple-Gate MOSFETs / 1.4:
Single-gate SOI MOSFETs / 1.4.1:
Double-gate SOI MOSFETs / 1.4.2:
Triple-gate SOI MOSFETs / 1.4.3:
Surrounding-gate (quadruple-gate) SOI MOSFETs / 1.4.4:
Other multigate MOSFET structures / 1.4.5:
Multigate MOSFET memory devices / 1.4.6:
Multigate MOSFET Physics / 1.5:
Classical physics / 1.5.1:
Natural length and short-channel effects / 1.5.1.1:
Current drive / 1.5.1.2:
Corner effect / 1.5.1.3:
Quantum effects / 1.5.2:
Volume inversion / 1.5.2.1:
Mobility effects / 1.5.2.2:
Threshold voltage / 1.5.2.3:
Inter-subband scattering / 1.5.2.4:
References
Multigate MOSFET Technology / 2:
Introduction / 2.1:
Active Area: Fins / 2.2:
Fin Width / 2.2.1:
Fin Height and Fin Pitch / 2.2.2:
Fin Surface Crystal Orientation / 2.2.3:
Fin Surface Preparation / 2.2.4:
Fins on Bulk Silicon / 2.2.5:
Nano-wires and Self-Assembled Wires / 2.2.6:
Gate Stack / 2.3:
Gate Patterning / 2.3.1:
Threshold Voltage and Gate Workfunction Requirements / 2.3.2:
Polysilicon Gate / 2.3.2.1:
Metal Gate / 2.3.2.2:
Tunable Workfunction Metal Gate / 2.3.2.3:
Gate EWF and Gate Induced Drain Leakage (GIDL) / 2.3.3:
Independently Controlled Gates / 2.3.4:
Source/Drain Resistance and Capacitance / 2.4:
Doping the Thin Fins / 2.4.1:
Junction Depth / 2.4.2:
Parasitic Resistance/Capacitance and Raised Source and Drain Structure / 2.4.3:
Mobility and Strain Engineering / 2.5:
Wafer Bending Experiment / 2.5.1:
Nitride Stress Liners / 2.5.3:
Embedded SiGe and SiC Source and Drain / 2.5.4:
Local Strain from Gate Electrode / 2.5.5:
Substrate Strain: Strained Silicon on Insulator / 2.5.6:
Contacts to the Fins / 2.6:
Dumbbell source and drain contact / 2.6.1:
Saddle contact / 2.6.2:
Contact to merged fins / 2.6.3:
Acknowledgments
BSIM-CMG: A Compact Model for Multi-Gate Transistors / 3:
Framework for Multigate FET Modeling / 3.1:
Multigate Models: BSIM-CMG and BSIM-IMG / 3.3:
The BSIM-CMG Model / 3.3.1:
The BSIM-IMG Model / 3.3.2:
BSIM-CMG / 3.4:
Core Model / 3.4.1:
Surface Potential Model / 3.4.1.1:
I-V Model / 3.4.1.2:
C-V Model / 3.4.1.3:
Modeling Physical Effects of Real Devices / 3.4.2:
Quantum Mechanical Effects (QME) / 3.4.2.1:
Short-channel Effects (SCE) / 3.4.2.2:
Experimental Verification / 3.4.3:
Surface Potential of independent DG-FET / 3.5:
BSIM-IMG features / 3.5.2:
Summary / 3.6:
Physics of the Multigate MOS System / 4:
Device electrostatics / 4.1:
Double gate MOS system / 4.2:
Modeling assumptions / 4.2.1:
Gate voltage effect / 4.2.2:
Semiconductor thickness effect / 4.2.3:
Asymmetry effects / 4.2.4:
Oxide thickness effect / 4.2.5:
Electron tunnel current / 4.2.6:
Two-dimensional confinement / 4.3:
Mobility in Multigate MOSFETs / 5:
Double-Gate MOSFETs and FinFETs / 5.1:
Phonon-limited mobility / 5.2.1:
Confinement of acoustic phonons / 5.2.2:
Interface roughness scattering / 5.2.3:
Coulomb scattering / 5.2.4:
Temperature Dependence of Mobility / 5.2.5:
Symmetrical and Asymmetrical Operation of DGSOI FETs / 5.2.6:
Crystallographic orientation / 5.2.7:
High-k dielectrics / 5.2.8:
Strained DGSOI devices / 5.2.9:
Silicon multiple-gate nanowires / 5.2.10:
Electrostatic description of Si nanowires / 5.3.1:
Electron transport in Si nanowires / 5.3.3:
Surface roughness / 5.3.4:
Experimental results and conclusions / 5.3.5:
Radiation Effects in Advanced Single- and Multi-Gate SOI MOSFETs / 6:
A brief history of radiation effects in SOI / 6.1:
Total Ionizing Dose Effects / 6.2:
A brief overview of Total Ionizing Dose effects / 6.2.1:
Advanced Single-Gate FDSOI devices / 6.2.2:
Description of Advanced FDSOI Devices / 6.2.2.1:
Front-gate threshold voltage shift / 6.2.2.2:
Single-transistor latch / 6.2.2.3:
Advanced Multi-Gate devices / 6.2.3:
Devices and process description / 6.2.3.1:
Single-Event Effects / 6.2.3.2:
Background / 6.3.1:
Effect of ion track diameter in nanoscale devices / 6.3.2:
Transient measurements on single-gate and FinFET SOI transistors / 6.3.3:
Scaling effects / 6.3.4:
Multi-Gate MOSFET Circuit Design / 7:
Digital Circuit Design / 7.1:
Impact of device performance on digital circuit design / 7.2.1:
Large-scale digital circuits / 7.2.2:
Leakage-performance trade off and energy dissipation / 7.2.3:
Multi-V[subscript T] devices and mixed-V[subscript T] circuits / 7.2.4:
High-temperature circuit operation / 7.2.5:
SRAM design / 7.2.6:
Analog Circuit Design / 7.3:
Device figures of merit and technology related design issues / 7.3.1:
Transconductance / 7.3.1.1:
Intrinsic transistor gain / 7.3.1.2:
Matching behavior / 7.3.1.3:
Flicker noise / 7.3.1.4:
Transit and maximum oscillation frequency / 7.3.1.5:
Self-heating / 7.3.1.6:
Charge trapping in high-k dielectrics / 7.3.1.7:
Design of analog building blocks / 7.3.2:
V-[subscript T]-based current reference circuit / 7.3.2.1:
Bandgap voltage reference / 7.3.2.2:
Operational amplifier / 7.3.2.3:
Comparator / 7.3.2.4:
Mixed-signal aspects / 7.3.3:
Current steering DAC / 7.3.3.1:
Successive approximation ADC / 7.3.3.2:
RF circuit design / 7.3.4:
SoC Design and Technology Aspects / 7.4:
Index
Preface
Table of Content
Contributors
70.

図書

図書
Saeid Sanei and Jonathon Chambers
出版情報: Chichester : John Wiley & Sons, c2007  xxii, 289 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
List of Abbreviations
List of Symbols
Introduction to EEG / 1:
History / 1.1:
Neural Activities / 1.2:
Action Potentials / 1.3:
EEG Generation / 1.4:
Brain Rhythms / 1.5:
EEG Recording and Measurement / 1.6:
Conventional Electrode Positioning / 1.6.1:
Conditioning the Signals / 1.6.2:
Abnormal EEG Patterns / 1.7:
Ageing / 1.8:
Mental Disorders / 1.9:
Dementia / 1.9.1:
Epileptic Seizure and Nonepileptic Attacks / 1.9.2:
Psychiatric Disorders / 1.9.3:
External Effects / 1.9.4:
Summary and Conclusions / 1.10:
References
Fundamentals of EEG Signal Processing / 2:
EEG Signal Modelling / 2.1:
Linear Models / 2.1.1:
Nonlinear Modelling / 2.1.2:
Generating EEG Signals Based on Modelling the Neuronal Activities / 2.1.3:
Nonlinearity of the Medium / 2.2:
Nonstationarity / 2.3:
Signal Segmentation / 2.4:
Signal Transforms and Joint Time-Frequency Analysis / 2.5:
Wavelet Transform / 2.5.1:
Ambiguity Function and the Wigner-Ville Distribution / 2.5.2:
Coherency, Multivariate Autoregressive (MVAR) Modelling, and Directed Transfer Function (DTF) / 2.6:
Chaos and Dynamical Analysis / 2.7:
Entropy / 2.7.1:
Kolmogorov Entropy / 2.7.2:
Lyapunov Exponents / 2.7.3:
Plotting the Attractor Dimensions from the Time Series / 2.7.4:
Estimation of Lyapunov Exponents from the Time Series / 2.7.5:
Approximate Entropy / 2.7.6:
Using the Prediction Order / 2.7.7:
Filtering and Denoising / 2.8:
Principal Component Analysis / 2.9:
Singular-Value Decomposition / 2.9.1:
Independent Component Analysis / 2.10:
Instantaneous BSS / 2.10.1:
Convolutive BSS / 2.10.2:
Sparse Component Analysis / 2.10.3:
Nonlinear BSS / 2.10.4:
Constrained BSS / 2.10.5:
Application of Constrained BSS: Example / 2.11:
Signal Parameter Estimation / 2.12:
Classification Algorithms / 2.13:
Support Vector Machines / 2.13.1:
The k-Means Algorithm / 2.13.2:
Matching Pursuits / 2.14:
Event-Related Potentials / 2.15:
Detection, Separation, Localization, and Classification of P300 Signals / 3.1:
Using ICA / 3.1.1:
Estimating Single Brain Potential Components by Modelling ERP Waveforms / 3.1.2:
Source Tracking / 3.1.3:
Localization of the ERP / 3.1.4:
Time-Frequency Domain Analysis / 3.1.5:
Adaptive Filtering Approach / 3.1.6:
Prony's Approach for Detection of P300 Signals / 3.1.7:
Adaptive Time-Frequency Methods / 3.1.8:
Brain Activity Assessment Using ERP / 3.2:
Application of P300 to BCI / 3.3:
Seizure Signal Analysis / 3.4:
Seizure Detection / 4.1:
Adult Seizure Detection / 4.1.1:
Detection of Neonate Seizure / 4.1.2:
Chaotic Behaviour of EEG Sources / 4.2:
Predictability of Seizure from the EEGs / 4.3:
Fusion of EEG-fMRI Data for Seizure Prediction / 4.4:
EEG Source Localization / 4.5:
Introduction / 5.1:
General Approaches to Source Localization / 5.1.1:
Dipole Assumption / 5.1.2:
Overview of the Traditional Approaches / 5.2:
ICA Method / 5.2.1:
MUSIC Algorithm / 5.2.2:
LORETA Algorithm / 5.2.3:
FOCUSS Algorithm / 5.2.4:
Standardized LORETA / 5.2.5:
Other Weighted Minimum Norm Solutions / 5.2.6:
Evaluation Indices / 5.2.7:
Joint ICA-LORETA Approach / 5.2.8:
Partially Constrained BSS Method / 5.2.9:
Determination of the Number of Sources / 5.3:
Sleep EEG / 5.4:
Stages of Sleep / 6.1:
NREM Sleep / 6.1.1:
REM Sleep / 6.1.2:
The Influence of Circadian Rhythms / 6.2:
Sleep Deprivation / 6.3:
Preface
List of Abbreviations
List of Symbols
71.

図書

図書
John F. Watts, John Wolstenholme
出版情報: Chichester : Wiley, c2003  x, 212 p. ; 23 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Electron Spectroscopy: Some Basic Concepts / 1:
Electron Spectrometer Design
The Electron Spectrum: Qualitative and Quantitative Interpretation
Compositional Depth Profiling / 1.1:
Applications of Electron Spectroscopy in Materials Science
Analysis of Surfaces
Comparison of XPS and AES with Other Analytical Techniques
Glossary / 1.2:
Bibliography
Notation
Auger Electron Energies / Appendix 1:
Spectroscopists' notation / Appendix 2:
Table of Binding Energies Accessible with AIK& Radiation
Index / 1.2.2:
X-ray notation
X-ray Photoelectron Spectroscopy (XPS) / 1.3:
Auger Electron Spectroscopy (AES) / 1.4:
Scanning Auger Microscopy (SAM) / 1.5:
The Depth of Analysis in Electron Spectroscopy / 1.6:
Comparison of XPS and AES/SAM / 1.7:
The Availability of Surface Analytical Equipment / 1.8:
The Vacuum System / 2:
The Sample / 2.2:
X-ray Sources for XPS / 2.3:
The twin anode X-ray source / 2.3.1:
X-ray monochromators / 2.3.2:
Charge compensation / 2.3.3:
The Electron Gun for AES / 2.4:
Electron sources / 2.4.1:
Analysers for Electron Spectroscopy / 2.5:
The cylindrical mirror analyser / 2.5.1:
The hemispherical sector analyser / 2.5.2:
Detectors / 2.6:
Channel electron multipliers / 2.6.1:
Channel plates / 2.6.2:
Small Area XPS / 2.7:
Lens-defined small area XPS / 2.7.1:
Source-defined small area analysis / 2.7.2:
XPS Imaging and Mapping / 2.8:
Serial acquisition / 2.8.1:
Parallel acquisition / 2.8.2:
Lateral Resolution in Small Area XPS / 2.9:
Angle Resolved XPS / 2.10:
Qualitative Analysis / 3:
Unwanted features in electron spectra / 3.1.1:
Data acquisition / 3.1.2:
Chemical State Information / 3.2:
X-ray photoelectron spectroscopy / 3.2.1:
Electron induced Auger electron spectroscopy / 3.2.2:
The Auger parameter / 3.2.3:
Chemical state plots / 3.2.4:
Shake-up satellites / 3.2.5:
Multiplet splitting / 3.2.6:
Plasmons / 3.2.7:
Quantitative Analysis / 3.3:
Factors affecting the quantification of electron spectra / 3.3.1:
Quantification in XPS / 3.3.2:
Quantification in AES / 3.3.3:
Compositional Depth Profilin / 4:
Non-destructive Depth Profiling Methods / 4.1:
Angle resolved electron spectroscopy / 4.1.1:
Elastic scattering / 4.1.1.1:
Compositional depth profiles by ARXPS / 4.1.1.2:
Recent advances in ARXPS / 4.1.1.3:
Variation of analysis depth with electron kinetic energy / 4.1.2:
Depth Profiling by Erosion with Noble Gas Ions / 4.2:
The sputtering process / 4.2.1:
Experimental method / 4.2.2:
Sputter yield and etch rate / 4.2.3:
Factors affecting the etch rate / 4.2.4:
Factors affecting the depth resolution / 4.2.5:
Calibration / 4.2.6:
Ion gun design / 4.2.7:
Mechanical Sectioning / 4.3:
Angle lapping / 4.3.1:
Ball cratering / 4.3.2:
Conclusions / 4.4:
Introduction / 5:
Metallurgy / 5.2:
Grain-boundary segregation / 5.2.1:
Electronic structure of metallic alloys / 5.2.2:
Surface engineering / 5.2.3:
Corrosion Science / 5.3:
Ceramics and Catalysis / 5.4:
Microelectronics and Semiconductor Materials / 5.5:
Mapping semiconductor devices using AES / 5.5.1:
Depth profiling of semiconductor materials / 5.5.2:
Ultra-thin layers studied by ARXPS / 5.5.3:
Polymeric Materials / 5.6:
Adhesion Science / 5.7:
X-ray Analysis in the Electron Microscope / 6:
Electron Analysis in the Electron Microscope / 6.2:
Mass Spectrometry for Surface Analysis / 6.3:
Ion Scattering / 6.4:
Concluding Remarks / 6.5:
Appendices
Table of Binding Energies Accessible with AlKalpha Radiation
Preface
Acknowledgements
Electron Spectroscopy: Some Basic Concepts / 1:
72.

電子ブック

EB
Jean-Pierre Colinge, editor
出版情報: [New York] : Springer, [20--]  1 online resource (xiii, 339 p.)
シリーズ名: Series on Integrated Circuits and Systems
所蔵情報: loading…
目次情報: 続きを見る
Preface
Table of Content
Contributors
The SOI MOSFET: from Single Gate to Multigate / 1:
MOSFET scaling and Moore's law / 1.1:
Short-Channel Effects / 1.2:
Gate Geometry and Electrostatic Integrity / 1.3:
A Brief History of Multiple-Gate MOSFETs / 1.4:
Single-gate SOI MOSFETs / 1.4.1:
Double-gate SOI MOSFETs / 1.4.2:
Triple-gate SOI MOSFETs / 1.4.3:
Surrounding-gate (quadruple-gate) SOI MOSFETs / 1.4.4:
Other multigate MOSFET structures / 1.4.5:
Multigate MOSFET memory devices / 1.4.6:
Multigate MOSFET Physics / 1.5:
Classical physics / 1.5.1:
Natural length and short-channel effects / 1.5.1.1:
Current drive / 1.5.1.2:
Corner effect / 1.5.1.3:
Quantum effects / 1.5.2:
Volume inversion / 1.5.2.1:
Mobility effects / 1.5.2.2:
Threshold voltage / 1.5.2.3:
Inter-subband scattering / 1.5.2.4:
References
Multigate MOSFET Technology / 2:
Introduction / 2.1:
Active Area: Fins / 2.2:
Fin Width / 2.2.1:
Fin Height and Fin Pitch / 2.2.2:
Fin Surface Crystal Orientation / 2.2.3:
Fin Surface Preparation / 2.2.4:
Fins on Bulk Silicon / 2.2.5:
Nano-wires and Self-Assembled Wires / 2.2.6:
Gate Stack / 2.3:
Gate Patterning / 2.3.1:
Threshold Voltage and Gate Workfunction Requirements / 2.3.2:
Polysilicon Gate / 2.3.2.1:
Metal Gate / 2.3.2.2:
Tunable Workfunction Metal Gate / 2.3.2.3:
Gate EWF and Gate Induced Drain Leakage (GIDL) / 2.3.3:
Independently Controlled Gates / 2.3.4:
Source/Drain Resistance and Capacitance / 2.4:
Doping the Thin Fins / 2.4.1:
Junction Depth / 2.4.2:
Parasitic Resistance/Capacitance and Raised Source and Drain Structure / 2.4.3:
Mobility and Strain Engineering / 2.5:
Wafer Bending Experiment / 2.5.1:
Nitride Stress Liners / 2.5.3:
Embedded SiGe and SiC Source and Drain / 2.5.4:
Local Strain from Gate Electrode / 2.5.5:
Substrate Strain: Strained Silicon on Insulator / 2.5.6:
Contacts to the Fins / 2.6:
Dumbbell source and drain contact / 2.6.1:
Saddle contact / 2.6.2:
Contact to merged fins / 2.6.3:
Acknowledgments
BSIM-CMG: A Compact Model for Multi-Gate Transistors / 3:
Framework for Multigate FET Modeling / 3.1:
Multigate Models: BSIM-CMG and BSIM-IMG / 3.3:
The BSIM-CMG Model / 3.3.1:
The BSIM-IMG Model / 3.3.2:
BSIM-CMG / 3.4:
Core Model / 3.4.1:
Surface Potential Model / 3.4.1.1:
I-V Model / 3.4.1.2:
C-V Model / 3.4.1.3:
Modeling Physical Effects of Real Devices / 3.4.2:
Quantum Mechanical Effects (QME) / 3.4.2.1:
Short-channel Effects (SCE) / 3.4.2.2:
Experimental Verification / 3.4.3:
Surface Potential of independent DG-FET / 3.5:
BSIM-IMG features / 3.5.2:
Summary / 3.6:
Physics of the Multigate MOS System / 4:
Device electrostatics / 4.1:
Double gate MOS system / 4.2:
Modeling assumptions / 4.2.1:
Gate voltage effect / 4.2.2:
Semiconductor thickness effect / 4.2.3:
Asymmetry effects / 4.2.4:
Oxide thickness effect / 4.2.5:
Electron tunnel current / 4.2.6:
Two-dimensional confinement / 4.3:
Mobility in Multigate MOSFETs / 5:
Double-Gate MOSFETs and FinFETs / 5.1:
Phonon-limited mobility / 5.2.1:
Confinement of acoustic phonons / 5.2.2:
Interface roughness scattering / 5.2.3:
Coulomb scattering / 5.2.4:
Temperature Dependence of Mobility / 5.2.5:
Symmetrical and Asymmetrical Operation of DGSOI FETs / 5.2.6:
Crystallographic orientation / 5.2.7:
High-k dielectrics / 5.2.8:
Strained DGSOI devices / 5.2.9:
Silicon multiple-gate nanowires / 5.2.10:
Electrostatic description of Si nanowires / 5.3.1:
Electron transport in Si nanowires / 5.3.3:
Surface roughness / 5.3.4:
Experimental results and conclusions / 5.3.5:
Radiation Effects in Advanced Single- and Multi-Gate SOI MOSFETs / 6:
A brief history of radiation effects in SOI / 6.1:
Total Ionizing Dose Effects / 6.2:
A brief overview of Total Ionizing Dose effects / 6.2.1:
Advanced Single-Gate FDSOI devices / 6.2.2:
Description of Advanced FDSOI Devices / 6.2.2.1:
Front-gate threshold voltage shift / 6.2.2.2:
Single-transistor latch / 6.2.2.3:
Advanced Multi-Gate devices / 6.2.3:
Devices and process description / 6.2.3.1:
Single-Event Effects / 6.2.3.2:
Background / 6.3.1:
Effect of ion track diameter in nanoscale devices / 6.3.2:
Transient measurements on single-gate and FinFET SOI transistors / 6.3.3:
Scaling effects / 6.3.4:
Multi-Gate MOSFET Circuit Design / 7:
Digital Circuit Design / 7.1:
Impact of device performance on digital circuit design / 7.2.1:
Large-scale digital circuits / 7.2.2:
Leakage-performance trade off and energy dissipation / 7.2.3:
Multi-V[subscript T] devices and mixed-V[subscript T] circuits / 7.2.4:
High-temperature circuit operation / 7.2.5:
SRAM design / 7.2.6:
Analog Circuit Design / 7.3:
Device figures of merit and technology related design issues / 7.3.1:
Transconductance / 7.3.1.1:
Intrinsic transistor gain / 7.3.1.2:
Matching behavior / 7.3.1.3:
Flicker noise / 7.3.1.4:
Transit and maximum oscillation frequency / 7.3.1.5:
Self-heating / 7.3.1.6:
Charge trapping in high-k dielectrics / 7.3.1.7:
Design of analog building blocks / 7.3.2:
V-[subscript T]-based current reference circuit / 7.3.2.1:
Bandgap voltage reference / 7.3.2.2:
Operational amplifier / 7.3.2.3:
Comparator / 7.3.2.4:
Mixed-signal aspects / 7.3.3:
Current steering DAC / 7.3.3.1:
Successive approximation ADC / 7.3.3.2:
RF circuit design / 7.3.4:
SoC Design and Technology Aspects / 7.4:
Index
Preface
Table of Content
Contributors
73.

電子ブック

EB
Hartmut Obendorf
出版情報: Springer eBooks Computer Science , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Designing for an Age of Complexity / Part I:
Minimalism: Introduction and Synopsis / 1:
Motivations for Minimalism in HCI / 1.1:
Machine Beauty = Power + Simplicity / 1.1.1:
Reduction-Give Up or Gain? / 1.1.2:
Minimalism: Borrowing the Extreme from the Arts / 1.1.3:
Minimalism in a Nutshell / 1.2:
Four Notions of Minimalism, Their Relationship, and Design / 1.2.1:
An Example Analysis Using Notions of Minimalism / 1.2.2:
Minimalism, Products, and Processes / 1.2.3:
Defining the Scope of Minimalist Terminology / 1.3:
Minimalism-Mathematic Minimalism / 1.3.1:
Minimalism-Linguistic Minimalism / 1.3.2:
Minimalism-Documentation Minimalism / 1.3.3:
Minimalism-Folk Minimalism / 1.3.4:
Finding a Minimalism for Interaction Design / 1.4:
References
Defining Minimalism / Part II:
In Search of "Minimalism"-Roving in Art, Music and Elsewhere / 2:
Minimalism in the Arts / 2.1:
Rauschenberg, Klein and Newman: Birth of Minimal Painting / 2.1.1:
Reinhardt: Art-as-Art / 2.1.2:
Stella: To See What Is There / 2.1.3:
Radical Minimalism and Post-Minimalist Painting / 2.1.4:
Judd, Andre, Flavin, and Morris: Minimal Objects / 2.1.5:
LeWitt: Minimal Structure in Minimalist Sculpture / 2.1.6:
Post-Minimalist Sculpture / 2.1.7:
Minimal Art: Art as Art or Cooperative Sense-Building? / 2.1.8:
Minimalism in Music / 2.2:
The Origins of Minimal Music / 2.2.1:
Terry Riley / 2.2.2:
La Monte Young / 2.2.3:
Philip Glass / 2.2.4:
Steve Reich / 2.2.5:
Summarizing Minimalism in Music / 2.2.6:
Minimalism Found Elsewhere / 2.3:
Literary Minimalism: Roots in Hemingway, Archetype in Carver / 2.3.1:
Minimalism in Architecture / 2.3.2:
Minimalism in Typography / 2.3.3:
Homing in on Minimalism: Summarizing the Art perspective / 2.4:
Minimality of Means / 2.4.1:
Minimality of Meaning / 2.4.2:
Minimality of Structure / 2.4.3:
Use of Patterns / 2.4.4:
Involvement of the recipient / 2.4.5:
The Minimalist Perspective and Criticism / 2.4.6:
Minimalism for Interaction Design: a Proposal / 3:
Meanings of Minimalism in HCI-A Transfer from the Arts / 3.1:
Defining Four Notions of the Minimal for Interaction Design / 3.2:
Minimal Functionality for User Interfaces / 3.2.1:
Minimal Structure for User Interfaces / 3.2.2:
Minimal Architecture for User Interfaces / 3.2.3:
Minimal Composition for User Interfaces / 3.2.4:
A Minimalist Terminology for the Design of Interactive Systems / 3.2.5:
Summary / 3.3:
Rethinking Minimalism / Part III:
Minimalism, Industrial Design and HCI / 4:
Following the Roots in Industrial Design / 4.1:
Standards in Interaction Design and Minimalism / 4.2:
HCI Lore and Minimalism / 4.3:
Rules of Noble Metal and Minimalism / 4.3.1:
Interface Guidelines and Minimalism / 4.3.2:
Discussion / 4.3.3:
Minimalism, Simplicity and Rules of Design / 4.4:
Deep Design: Causes of Clutter and Excise / 5.1:
Visibility of Interface Elements / 5.2:
Access Structure / 5.3:
Minimalism and Consistency / 5.4:
Minimalism and Conceptions of Design / 5.5:
Minimalism and Simplicity / 5.6:
Limits of the Notion of Simplicity / 5.6.1:
Revisiting the Four Notions of Minimalism / 5.7:
Applying Minimalism / Part IV:
Detecting the Minimal / 6:
Functional Minimalism / 6.1:
Cutting Edges / 6.1.1:
Apple GarageBand (i-Series 1) / 6.1.2:
The CommSy Community System / 6.1.3:
Word Processing / 6.1.4:
Refining the Notion of Functional Minimalism / 6.1.5:
Structural Minimalism / 6.2:
Remote Controls / 6.2.1:
The Palm Handheld / 6.2.2:
Minimal Access Structures for Mobile Communication / 6.2.3:
HyperScout: Enhancing Link Preview in the World Wide Web / 6.2.4:
World Processing / 6.2.5:
Refining the Notion of Structural Minimalism / 6.2.6:
Architectural Minimalism / 6.3:
Building Blocks / 6.3.1:
Apple Automator (i-Series 2) / 6.3.2:
Sketch Up / 6.3.3:
Apple iPod / 6.3.4:
Web 2.0 / 6.3.5:
Refining the Notion of Architectural Minimalism / 6.3.6:
Compositional Minimalism / 6.4:
Old Buildings Learn / 6.4.1:
A Sticky Story: The Post-it Note / 6.4.2:
E-mail / 6.4.3:
PowerPoint / 6.4.4:
WikiWikiWebs / 6.4.5:
Refining the Notion of Compositional Minimalism / 6.4.6:
Reflections on the Four Notions of Minimalism / 6.5:
A First Assessment of Suitability for the Analysis of Products / 6.5.1:
Design Advice / 6.5.2:
Designing the Minimal / 7:
Process Matters / 7.1:
A Direct Approach: Reduction as a Design Activity / 7.2:
The Minimal Design Game / 7.2.1:
First Experiences / 7.2.2:
The Indirect Approach: Changing the Process / 7.2.3:
Scoping Reduction / 7.3.1:
Defining Scope: Using Personas / 7.4:
Personas and Notions of Minimalism / 7.4.1:
Reduction and the Use of Personas / 7.4.2:
Defining Use: Scenario Techniques / 7.5:
Scenarios and Notions of Minimalism / 7.5.1:
Scenario-Based Design / 7.5.2:
Reduction and the Use of Scenarios / 7.5.3:
Defining Architecture: Small Steps and Agile Methods / 7.6:
Simplicity in Software Engineering / 7.6.1:
Minimalism in Agile Development / 7.6.2:
Reduction in Agile Methods / 7.6.3:
Defining Growth: Using Values in Design / 7.7:
Values in Software / 7.7.1:
Case Study: CommSy-Designing with Values / 7.7.2:
Sharing Explicit Values in Communities of Interest / 7.7.3:
Reduction in Value-Based Development / 7.7.4:
Engineering Simplicity? A Reality Check / 7.8:
Reflections on Minimalism / Part V:
Minimalism Revisited / 8:
The Minimal Perspective on Design / 8.1:
Minimalism as an Analytic Tool / 8.2:
Minimalism as a Constructive Tool / 8.3:
A Minimalist Design Method: The Minimal Design Game / 8.3.1:
Indirect Minimalism in Existing Methods / 8.3.2:
Refining the Definition of Minimalism / 8.4:
Functional Minimalism Revisited / 8.4.1:
Structural Minimalism Revisited / 8.4.2:
Architectural Minimalism Revisited / 8.4.3:
Compositional Minimalism Revisited / 8.4.4:
Implications of a Minimalist Standpoint for Design / 8.5:
Minimal Aesthetics / 9:
Unconnected Ends / 10:
Conclusion / 11:
Index
Designing for an Age of Complexity / Part I:
Minimalism: Introduction and Synopsis / 1:
Motivations for Minimalism in HCI / 1.1:
74.

図書

図書
Kenneth A. Small and Erik T. Verhoef
出版情報: London : Routledge, 2007  xvi, 276 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
List of tables
List of figures
Acknowledgments
Selected symbols and abbreviations
Introduction / 1:
Travel demand / 2:
Aggregate tabulations and models / 2.1:
Aggregate demand models / 2.1.1:
Cross-sectional studies of metropolitan areas / 2.1.2:
Cross-sectional studies within a metropolitan area / 2.1.3:
Studies using time-series data / 2.1.4:
Summary of key results of aggregate studies / 2.1.5:
Transportation and land use / 2.1.6:
Disaggregate models: methods / 2.2:
Basic discrete-choice models / 2.2.1:
Estimation / 2.2.2:
Interpreting coefficient estimates / 2.2.3:
Data / 2.2.4:
Randomness, scale of utility, and measures of benefit / 2.2.5:
Aggregation and forecasting / 2.2.6:
Specification / 2.2.7:
Ordered and rank-ordered models / 2.2.8:
Disaggregate models: examples / 2.3:
Mode choice / 2.3.1:
Trip-scheduling choice / 2.3.2:
Choice of free or express lanes / 2.3.3:
Advanced discrete-choice modeling / 2.4:
Generalized extreme value models / 2.4.1:
Combined discrete and continuous choice / 2.4.2:
Disaggregate panel data / 2.4.3:
Random parameters and mixed logit / 2.4.4:
Endogenous prices / 2.4.5:
Activity patterns and trip chaining / 2.5:
Value of time and reliability / 2.6:
Value of time: basic theory / 2.6.1:
Empirical specifications / 2.6.2:
Extensions / 2.6.3:
Value of reliability: theory / 2.6.4:
Empirical results / 2.6.5:
Conclusions / 2.7:
Costs / 3:
The nature of cost functions / 3.1:
Cost functions for public transit / 3.2:
Accounting cost studies / 3.2.1:
Engineering cost studies / 3.2.2:
Statistical cost studies / 3.2.3:
Cost functions including user inputs / 3.2.4:
Highway travel: congestion technology / 3.3:
Fundamentals of congestion / 3.3.1:
Empirical speed-flow relationships / 3.3.2:
Dynamic congestion models / 3.3.3:
Congestion modeling: a conclusion / 3.3.4:
Highway travel: short-run cost functions and equilibrium / 3.4:
Stationary-state congestion on a homogeneous road / 3.4.1:
Time-averaged models / 3.4.2:
Dynamic models with endogenous scheduling / 3.4.3:
Network equilibrium / 3.4.4:
Parking search / 3.4.5:
Empirical evidence on short-run variable costs / 3.4.6:
Highway travel: long-run cost functions / 3.5:
Analytic long-run cost functions / 3.5.1:
The role of information technology / 3.5.2:
Empirical evidence on capital costs / 3.5.3:
Is highway travel subsidized? / 3.5.4:
Intermodal cost comparisons / 3.6:
Pricing / 3.7:
First-best congestion pricing of highways / 4.1:
Static congestion / 4.1.1:
Dynamic congestion / 4.1.2:
Second-best pricing / 4.2:
Network aspects / 4.2.1:
Time-of-day aspects / 4.2.2:
User heterogeneity / 4.2.3:
Stochastic congestion and information / 4.2.4:
Interactions with other distorted markets / 4.2.5:
Second-best pricing: a conclusion / 4.2.6:
Congestion pricing in practice / 4.3:
Singapore / 4.3.1:
Norwegian toll rings / 4.3.2:
Value pricing in the US / 4.3.3:
London congestion charging / 4.3.4:
Other applications / 4.3.5:
Technology of road pricing / 4.3.6:
Pricing of parking / 4.4:
Pricing of public transit / 4.5:
Fare level / 4.5.1:
Fare structure / 4.5.2:
Incentive effects of subsidies / 4.5.3:
Political considerations / 4.5.4:
Investment / 4.6:
Capacity choice for highways / 5.1:
Basic results: capacity choice with first-best pricing and static congestion / 5.1.1:
Self-financing in more complex settings / 5.1.2:
Second-best highway capacity / 5.1.3:
Naive investment rules / 5.1.4:
Cost-benefit analysis / 5.2:
Willingness to pay / 5.2.1:
Demand and cost forecasts / 5.2.2:
Discounting future costs and benefits / 5.2.3:
Shifting of costs and benefits / 5.2.4:
External benefits and network effects / 5.2.5:
Conclusion: the use and misuse of cost-benefit analysis / 5.2.6:
Industrial organization of transportation providers / 5.3:
Private highways / 6.1:
Single road with static congestion / 6.1.1:
Single road with dynamic congestion / 6.1.2:
Heterogeneous users / 6.1.3:
Private toll lanes: the two-route problem revisited / 6.1.4:
Competition in networks / 6.1.5:
Regulation and franchising of private roads / 6.2:
Privately provided transit services / 6.3:
Forms of privatization / 6.3.1:
Market structure and competitive practices / 6.3.2:
Efficiency of public and private providers / 6.3.3:
Experience with privatization and deregulation / 6.3.4:
Paratransit / 6.3.5:
Conventional taxi service / 6.3.6:
Conclusion / 6.4:
Emerging themes / 7.1:
Implications for transportation research / 7.2:
Notes
References
Index
List of tables
List of figures
Acknowledgments
75.

電子ブック

EB
Hartmut Obendorf
出版情報: SpringerLink Books - AutoHoldings , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Designing for an Age of Complexity / Part I:
Minimalism: Introduction and Synopsis / 1:
Motivations for Minimalism in HCI / 1.1:
Machine Beauty = Power + Simplicity / 1.1.1:
Reduction-Give Up or Gain? / 1.1.2:
Minimalism: Borrowing the Extreme from the Arts / 1.1.3:
Minimalism in a Nutshell / 1.2:
Four Notions of Minimalism, Their Relationship, and Design / 1.2.1:
An Example Analysis Using Notions of Minimalism / 1.2.2:
Minimalism, Products, and Processes / 1.2.3:
Defining the Scope of Minimalist Terminology / 1.3:
Minimalism-Mathematic Minimalism / 1.3.1:
Minimalism-Linguistic Minimalism / 1.3.2:
Minimalism-Documentation Minimalism / 1.3.3:
Minimalism-Folk Minimalism / 1.3.4:
Finding a Minimalism for Interaction Design / 1.4:
References
Defining Minimalism / Part II:
In Search of "Minimalism"-Roving in Art, Music and Elsewhere / 2:
Minimalism in the Arts / 2.1:
Rauschenberg, Klein and Newman: Birth of Minimal Painting / 2.1.1:
Reinhardt: Art-as-Art / 2.1.2:
Stella: To See What Is There / 2.1.3:
Radical Minimalism and Post-Minimalist Painting / 2.1.4:
Judd, Andre, Flavin, and Morris: Minimal Objects / 2.1.5:
LeWitt: Minimal Structure in Minimalist Sculpture / 2.1.6:
Post-Minimalist Sculpture / 2.1.7:
Minimal Art: Art as Art or Cooperative Sense-Building? / 2.1.8:
Minimalism in Music / 2.2:
The Origins of Minimal Music / 2.2.1:
Terry Riley / 2.2.2:
La Monte Young / 2.2.3:
Philip Glass / 2.2.4:
Steve Reich / 2.2.5:
Summarizing Minimalism in Music / 2.2.6:
Minimalism Found Elsewhere / 2.3:
Literary Minimalism: Roots in Hemingway, Archetype in Carver / 2.3.1:
Minimalism in Architecture / 2.3.2:
Minimalism in Typography / 2.3.3:
Homing in on Minimalism: Summarizing the Art perspective / 2.4:
Minimality of Means / 2.4.1:
Minimality of Meaning / 2.4.2:
Minimality of Structure / 2.4.3:
Use of Patterns / 2.4.4:
Involvement of the recipient / 2.4.5:
The Minimalist Perspective and Criticism / 2.4.6:
Minimalism for Interaction Design: a Proposal / 3:
Meanings of Minimalism in HCI-A Transfer from the Arts / 3.1:
Defining Four Notions of the Minimal for Interaction Design / 3.2:
Minimal Functionality for User Interfaces / 3.2.1:
Minimal Structure for User Interfaces / 3.2.2:
Minimal Architecture for User Interfaces / 3.2.3:
Minimal Composition for User Interfaces / 3.2.4:
A Minimalist Terminology for the Design of Interactive Systems / 3.2.5:
Summary / 3.3:
Rethinking Minimalism / Part III:
Minimalism, Industrial Design and HCI / 4:
Following the Roots in Industrial Design / 4.1:
Standards in Interaction Design and Minimalism / 4.2:
HCI Lore and Minimalism / 4.3:
Rules of Noble Metal and Minimalism / 4.3.1:
Interface Guidelines and Minimalism / 4.3.2:
Discussion / 4.3.3:
Minimalism, Simplicity and Rules of Design / 4.4:
Deep Design: Causes of Clutter and Excise / 5.1:
Visibility of Interface Elements / 5.2:
Access Structure / 5.3:
Minimalism and Consistency / 5.4:
Minimalism and Conceptions of Design / 5.5:
Minimalism and Simplicity / 5.6:
Limits of the Notion of Simplicity / 5.6.1:
Revisiting the Four Notions of Minimalism / 5.7:
Applying Minimalism / Part IV:
Detecting the Minimal / 6:
Functional Minimalism / 6.1:
Cutting Edges / 6.1.1:
Apple GarageBand (i-Series 1) / 6.1.2:
The CommSy Community System / 6.1.3:
Word Processing / 6.1.4:
Refining the Notion of Functional Minimalism / 6.1.5:
Structural Minimalism / 6.2:
Remote Controls / 6.2.1:
The Palm Handheld / 6.2.2:
Minimal Access Structures for Mobile Communication / 6.2.3:
HyperScout: Enhancing Link Preview in the World Wide Web / 6.2.4:
World Processing / 6.2.5:
Refining the Notion of Structural Minimalism / 6.2.6:
Architectural Minimalism / 6.3:
Building Blocks / 6.3.1:
Apple Automator (i-Series 2) / 6.3.2:
Sketch Up / 6.3.3:
Apple iPod / 6.3.4:
Web 2.0 / 6.3.5:
Refining the Notion of Architectural Minimalism / 6.3.6:
Compositional Minimalism / 6.4:
Old Buildings Learn / 6.4.1:
A Sticky Story: The Post-it Note / 6.4.2:
E-mail / 6.4.3:
PowerPoint / 6.4.4:
WikiWikiWebs / 6.4.5:
Refining the Notion of Compositional Minimalism / 6.4.6:
Reflections on the Four Notions of Minimalism / 6.5:
A First Assessment of Suitability for the Analysis of Products / 6.5.1:
Design Advice / 6.5.2:
Designing the Minimal / 7:
Process Matters / 7.1:
A Direct Approach: Reduction as a Design Activity / 7.2:
The Minimal Design Game / 7.2.1:
First Experiences / 7.2.2:
The Indirect Approach: Changing the Process / 7.2.3:
Scoping Reduction / 7.3.1:
Defining Scope: Using Personas / 7.4:
Personas and Notions of Minimalism / 7.4.1:
Reduction and the Use of Personas / 7.4.2:
Defining Use: Scenario Techniques / 7.5:
Scenarios and Notions of Minimalism / 7.5.1:
Scenario-Based Design / 7.5.2:
Reduction and the Use of Scenarios / 7.5.3:
Defining Architecture: Small Steps and Agile Methods / 7.6:
Simplicity in Software Engineering / 7.6.1:
Minimalism in Agile Development / 7.6.2:
Reduction in Agile Methods / 7.6.3:
Defining Growth: Using Values in Design / 7.7:
Values in Software / 7.7.1:
Case Study: CommSy-Designing with Values / 7.7.2:
Sharing Explicit Values in Communities of Interest / 7.7.3:
Reduction in Value-Based Development / 7.7.4:
Engineering Simplicity? A Reality Check / 7.8:
Reflections on Minimalism / Part V:
Minimalism Revisited / 8:
The Minimal Perspective on Design / 8.1:
Minimalism as an Analytic Tool / 8.2:
Minimalism as a Constructive Tool / 8.3:
A Minimalist Design Method: The Minimal Design Game / 8.3.1:
Indirect Minimalism in Existing Methods / 8.3.2:
Refining the Definition of Minimalism / 8.4:
Functional Minimalism Revisited / 8.4.1:
Structural Minimalism Revisited / 8.4.2:
Architectural Minimalism Revisited / 8.4.3:
Compositional Minimalism Revisited / 8.4.4:
Implications of a Minimalist Standpoint for Design / 8.5:
Minimal Aesthetics / 9:
Unconnected Ends / 10:
Conclusion / 11:
Index
Designing for an Age of Complexity / Part I:
Minimalism: Introduction and Synopsis / 1:
Motivations for Minimalism in HCI / 1.1:
76.

電子ブック

EB
Hiroyuki Fujiwara
出版情報: Wiley Online Library - AutoHoldings Books , Chichester : John Wiley & Sons, Inc., 2007
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgments
Introduction to Spectroscopic Ellipsometry / 1:
Features of Spectroscopic Ellipsometry / 1.1:
Applications of Spectroscopic Ellipsometry / 1.2:
Data Analysis / 1.3:
History of Development / 1.4:
Future Prospects / 1.5:
References
Principles of Optics / 2:
Propagation of Light / 2.1:
Propagation of One-Dimensional Waves / 2.1.1:
Electromagnetic Waves / 2.1.2:
Refractive Index / 2.1.3:
Dielectrics / 2.2:
Dielectric Polarization / 2.2.1:
Dielectric Constant / 2.2.2:
Dielectric Function / 2.2.3:
Reflection and Transmission of Light / 2.3:
Refraction of Light / 2.3.1:
p- and s-Polarized Light Waves / 2.3.2:
Reflectance and Transmittance / 2.3.3:
Brewster Angle / 2.3.4:
Total Reflection / 2.3.5:
Optical Interference / 2.4:
Optical Interference in Thin Films / 2.4.1:
Multilayers / 2.4.2:
Polarization of Light / 3:
Representation of Polarized Light / 3.1:
Phase of Light / 3.1.1:
Polarization States of Light Waves / 3.1.2:
Optical Elements / 3.2:
Polarizer (Analyzer) / 3.2.1:
Compensator (Retarder) / 3.2.2:
Photoelastic Modulator / 3.2.3:
Depolarizer / 3.2.4:
Jones Matrix / 3.3:
Jones Vector / 3.3.1:
Transformation of Coordinate Systems / 3.3.2:
Jones Matrices of Optical Elements / 3.3.3:
Representation of Optical Measurement / Jones Matrices3.3.4:
Stokes Parameters / 3.4:
Definition of Stokes Parameters / 3.4.1:
Poincare Sphere / 3.4.2:
Partially Polarized Light / 3.4.3:
Mueller Matrix / 3.4.4:
Principles of Spectroscopic Ellipsometry / 4:
Principles of Ellipsometry Measurement / 4.1:
Measured Values in Ellipsometry / 4.1.1:
Coordinate System in Ellipsometry / 4.1.2:
Jones and Mueller Matrices of Samples / 4.1.3:
Ellipsometry Measurement / 4.2:
Measurement Methods of Ellipsometry / 4.2.1:
Rotating-Analyzer Ellipsometry (RAE) / 4.2.2:
Rotating-Analyzer Ellipsometry with Compensator / 4.2.3:
Rotating-Compensator Ellipsometry (RCE) / 4.2.4:
Phase-Modulation Ellipsometry (PME) / 4.2.5:
Infrared Spectroscopic Ellipsometry / 4.2.6:
Mueller Matrix Ellipsometry / 4.2.7:
Null Ellipsometry and Imaging Ellipsometry / 4.2.8:
Instrumentation for Ellipsometry / 4.3:
Installation of Ellipsometry System / 4.3.1:
Fourier Analysis / 4.3.2:
Calibration of Optical Elements / 4.3.3:
Correction of Measurement Errors / 4.3.4:
Precision and Error of Measurement / 4.4:
Variation of Precision and Error with Measurement Method / 4.4.1:
Precision of ([psi], [Delta]) / 4.4.2:
Precision of Film Thickness and Absorption Coefficient / 4.4.3:
Depolarization Effect of Samples / 4.4.4:
Interpretation of ([psi], [Delta]) / 5:
Variations of ([psi], [Delta]) with Optical Constants / 5.1.1:
Variations of ([psi], [Delta]) in Transparent Films / 5.1.2:
Variations of ([psi], [Delta]) in Absorbing Films / 5.1.3:
Dielectric Function Models / 5.2:
Lorentz Model / 5.2.1:
Interpretation of the Lorentz Model / 5.2.2:
Sellmeier and Cauchy Models / 5.2.3:
Tauc-Lorentz Model / 5.2.4:
Drude Model / 5.2.5:
Kramers-Kronig Relations / 5.2.6:
Effective Medium Approximation / 5.3:
Effective Medium Theories / 5.3.1:
Modeling of Surface Roughness / 5.3.2:
Limitations of Effective Medium Theories / 5.3.3:
Optical Models / 5.4:
Construction of Optical Models / 5.4.1:
Pseudo-Dielectric Function / 5.4.2:
Optimization of Sample Structures / 5.4.3:
Optical Models for Depolarizing Samples / 5.4.4:
Data Analysis Procedure / 5.5:
Linear Regression Analysis / 5.5.1:
Fitting Error Function / 5.5.2:
Mathematical Inversion / 5.5.3:
Ellipsometry of Anisotropic Materials / 6:
Reflection and Transmission of Light by Anisotropic Materials / 6.1:
Light Propagation in Anisotropic Media / 6.1.1:
Index Ellipsoid / 6.1.2:
Dielectric Tensor / 6.1.3:
Jones Matrix of Anisotropic Samples / 6.1.4:
Fresnel Equations for Anisotropic Materials / 6.2:
Anisotropic Substrate / 6.2.1:
Anisotropic Thin Film on Isotropic Substrate / 6.2.2:
4 x 4 Matrix Method / 6.3:
Principles of the 4 x 4 Matrix Method / 6.3.1:
Calculation Method of Partial Transfer Matrix / 6.3.2:
Calculation Methods of Incident and Exit Matrices / 6.3.3:
Calculation Procedure of the 4 x 4 Matrix Method / 6.3.4:
Interpretation of ([psi], [Delta]) for Anisotropic Materials / 6.4:
Variations of ([psi], [Delta]) in Anisotropic Substrates / 6.4.1:
Variations of ([psi], [Delta]) in Anisotropic Thin Films / 6.4.2:
Measurement and Data Analysis of Anisotropic Materials / 6.5:
Measurement Methods / 6.5.1:
Data Analysis Methods / 6.5.2:
Data Analysis Examples / 7:
Insulators / 7.1:
Analysis Examples / 7.1.1:
Advanced Analysis / 7.1.2:
Semiconductors / 7.2:
Optical Transitions in Semiconductors / 7.2.1:
Modeling of Dielectric Functions / 7.2.2:
Analysis of Dielectric Functions / 7.2.3:
Metals/Semiconductors / 7.3:
Dielectric Function of Metals / 7.3.1:
Analysis of Free-Carrier Absorption / 7.3.2:
Organic Materials/Biomaterials / 7.3.3:
Analysis of Organic Materials / 7.4.1:
Analysis of Biomaterials / 7.4.2:
Anisotropic Materials / 7.5:
Analysis of Anisotropic Insulators / 7.5.1:
Analysis of Anisotropic Semiconductors / 7.5.2:
Analysis of Anisotropic Organic Materials / 7.5.3:
Real-Time Monitoring by Spectroscopic Ellipsometry / 8:
Data Analysis in Real-Time Monitoring / 8.1:
Procedures for Real-Time Data Analysis / 8.1.1:
Linear Regression Analysis (LRA) / 8.1.2:
Global Error Minimization (GEM) / 8.1.3:
Virtual Substrate Approximation (VSA) / 8.1.4:
Observation of Thin-Film Growth by Real-Time Monitoring / 8.2:
Process Control by Real-Time Monitoring / 8.2.1:
Data Analysis in Process Control / 8.3.1:
Process Control by Linear Regression Analysis (LRA) / 8.3.2:
Process Control by Virtual Substrate Approximation (VSA) / 8.3.3:
Appendices
Trigonometric Functions
Definitions of Optical Constants
Maxwell's Equations for Conductors
Jones-Mueller Matrix Conversion
Index
Foreword
Preface
Acknowledgments
77.

電子ブック

EB
Helen Wright
出版情報: Springer eBooks Computer Science , Springer London, 2007
所蔵情報: loading…
目次情報: 続きを見る
Preface
About This Book
Acknowledgments
Introduction / 1:
Potential and Pitfalls / 2:
Understanding Data / 2.1:
Using Space / 2.1.1:
Using Colour / 2.1.2:
Using Animation / 2.1.3:
Misunderstanding Data / 2.2:
Using the Right Tool for the Right Job / 2.2.1:
The Perils of Interpolation / 2.2.2:
Problems
Models and Software / 3:
A Dataflow Model of Visualization / 3.1:
Visualization Scenarios / 3.2:
Computational Steering / 3.2.1:
Distributed and Collaborative Visualization / 3.2.2:
Visualization Software / 3.3:
Historical Context / 3.3.1:
Current Approaches / 3.3.2:
Colour in Scientific Visualization / 4:
The Electromagnetic Spectrum / 4.1:
Colour Perception / 4.2:
Modelling Colour / 4.3:
RGB Colour Model / 4.3.1:
HSV Colour Model / 4.3.2:
Relating RGB and HSV / 4.3.3:
Mapping Data to Colours / 4.4:
Nonlinear Colour Mapping / 4.4.1:
'Linear' Colour Mapping / 4.4.2:
Perceptual Effects and Colour Vision Deficiency / 4.4.3:
Choosing Techniques / 5:
Classifying Data / 5.1:
Dependent and Independent Variables / 5.1.1:
Data Domain / 5.1.2:
Scalar and Vector Types / 5.1.3:
Taxonomy of Visualization Techniques / 5.2:
Visualizing Scalars / 6:
1D Data / 6.1:
Bar Chart, Pie Chart, and Scatterplot / 6.1.1:
Histogram and Line Graph / 6.1.2:
2D Data / 6.2:
2D Bar Chart / 6.2.1:
2D Histogram / 6.2.2:
Bounded Region Plot / 6.2.3:
Image Display / 6.2.4:
Making a Framework / 6.2.5:
Contour Plot / 6.2.6:
Surface View / 6.2.7:
Height-field Plot / 6.2.8:
3D Data / 6.3:
Reduction to 2D / 6.3.1:
Isosurface / 6.3.2:
Volume Render / 6.3.3:
Visualizing Vectors / 7:
Arrow Plot / 7.1:
Streamline and Timeline / 7.2:
Streamribbon, Streamsurface, and Streamtube / 7.3:
Time Surface / 7.4:
Flow Texture / 7.5:
Unsteady Flow / 7.6:
Bibliography and Further Reading / 8:
References
Solutions
Useful Information
Web Sites
Abbreviations
Definitions
Index
Preface
About This Book
Acknowledgments
78.

電子ブック

EB
Helen Wright
出版情報: SpringerLink Books - AutoHoldings , Springer London, 2007
所蔵情報: loading…
目次情報: 続きを見る
Preface
About This Book
Acknowledgments
Introduction / 1:
Potential and Pitfalls / 2:
Understanding Data / 2.1:
Using Space / 2.1.1:
Using Colour / 2.1.2:
Using Animation / 2.1.3:
Misunderstanding Data / 2.2:
Using the Right Tool for the Right Job / 2.2.1:
The Perils of Interpolation / 2.2.2:
Problems
Models and Software / 3:
A Dataflow Model of Visualization / 3.1:
Visualization Scenarios / 3.2:
Computational Steering / 3.2.1:
Distributed and Collaborative Visualization / 3.2.2:
Visualization Software / 3.3:
Historical Context / 3.3.1:
Current Approaches / 3.3.2:
Colour in Scientific Visualization / 4:
The Electromagnetic Spectrum / 4.1:
Colour Perception / 4.2:
Modelling Colour / 4.3:
RGB Colour Model / 4.3.1:
HSV Colour Model / 4.3.2:
Relating RGB and HSV / 4.3.3:
Mapping Data to Colours / 4.4:
Nonlinear Colour Mapping / 4.4.1:
'Linear' Colour Mapping / 4.4.2:
Perceptual Effects and Colour Vision Deficiency / 4.4.3:
Choosing Techniques / 5:
Classifying Data / 5.1:
Dependent and Independent Variables / 5.1.1:
Data Domain / 5.1.2:
Scalar and Vector Types / 5.1.3:
Taxonomy of Visualization Techniques / 5.2:
Visualizing Scalars / 6:
1D Data / 6.1:
Bar Chart, Pie Chart, and Scatterplot / 6.1.1:
Histogram and Line Graph / 6.1.2:
2D Data / 6.2:
2D Bar Chart / 6.2.1:
2D Histogram / 6.2.2:
Bounded Region Plot / 6.2.3:
Image Display / 6.2.4:
Making a Framework / 6.2.5:
Contour Plot / 6.2.6:
Surface View / 6.2.7:
Height-field Plot / 6.2.8:
3D Data / 6.3:
Reduction to 2D / 6.3.1:
Isosurface / 6.3.2:
Volume Render / 6.3.3:
Visualizing Vectors / 7:
Arrow Plot / 7.1:
Streamline and Timeline / 7.2:
Streamribbon, Streamsurface, and Streamtube / 7.3:
Time Surface / 7.4:
Flow Texture / 7.5:
Unsteady Flow / 7.6:
Bibliography and Further Reading / 8:
References
Solutions
Useful Information
Web Sites
Abbreviations
Definitions
Index
Preface
About This Book
Acknowledgments
79.

電子ブック

EB
Marc Ehrig, Ramesh Jain, Amit Sheth
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Introduction and Overview / 1:
Motivation / 1.1:
Contribution / 1.2:
Problem Outline / 1.2.1:
Solution Pathway / 1.2.2:
Overview / 1.3:
Structure / 1.3.1:
Reader's Guide / 1.3.2:
Foundations / Part I:
Definitions / 2:
Ontology / 2.1:
Ontology Definition / 2.1.1:
Semantic Web and Web Ontology Language (OWL) / 2.1.2:
Ontology Example / 2.1.3:
Ontology Alignment / 2.2:
Ontology Alignment Definition / 2.2.1:
Ontology Alignment Representation / 2.2.2:
Ontology Alignment Example / 2.2.3:
Related Terms / 2.3:
Ontology Similarity / 2.4:
Ontology Similarity Definition / 2.4.1:
Similarity Layers / 2.4.2:
Specific Similarity Measures / 2.4.3:
Similarity in Related Work / 2.4.4:
Heuristic Definition / 2.4.5:
Scenarios / 3:
Use Cases / 3.1:
Alignment Discovery / 3.1.1:
Agent Negotiation / Web Service Composition / 3.1.2:
Data Integration / 3.1.3:
Ontology Evolution / Versioning / 3.1.4:
Ontology Merging / 3.1.5:
Query and Answer Rewriting / Mapping / 3.1.6:
Reasoning / 3.1.7:
Requirements / 3.2:
Related Work / 4:
Theory of Alignment / 4.1:
Algebraic Approach / 4.1.1:
Information-Flow-based Approach / 4.1.2:
Translation Framework / 4.1.3:
Existing Alignment Approaches / 4.2:
Classification Guidelines for Alignment Approaches / 4.2.1:
Ontology Alignment Approaches / 4.2.2:
Schema Alignment Approaches / 4.2.3:
Global as View / Local as View / 4.2.4:
Ontology Alignment Approach / Part II:
Process / 5:
General Process / 5.1:
Alignment Approach / 5.2:
Input / 5.2.0:
Feature Engineering / 5.2.1:
Search Step Selection / 5.2.2:
Similarity Computation / 5.2.3:
Similarity Aggregation / 5.2.4:
Interpretation / 5.2.5:
Iteration / 5.2.6:
Output / 5.2.7:
Process Description of Related Approaches / 5.3:
Prompt, Anchor-Prompt / 5.3.1:
Glue / 5.3.2:
Ola / 5.3.3:
Evaluation of Alignment Approach / 5.4:
Evaluation Scenario / 5.4.1:
Evaluation Measures / 5.4.2:
Absolute Quality / 5.4.3:
Data Sets / 5.4.4:
Strategies / 5.4.5:
Results / 5.4.6:
Discussion and Lessons Learned / 5.4.7:
Advanced Methods / 6:
Efficiency / 6.1:
Challenge / 6.1.1:
Complexity / 6.1.2:
An Efficient Approach / 6.1.3:
Evaluation / 6.1.4:
Machine Learning / 6.1.5:
Machine Learning for Ontology Alignment / 6.2.1:
Runtime Alignment / 6.2.3:
Explanatory Component of Decision Trees / 6.2.4:
Active Alignment / 6.2.5:
Ontology Alignment with User Interaction / 6.3.1:
Adaptive Alignment / 6.3.3:
Create Utility Function / 6.4.1:
Derive Requirements for Result Dimensions / 6.4.4:
Derive Parameters / 6.4.5:
Example / 6.4.6:
Integrated Approach / 6.4.7:
Integrating the Individual Approaches / 6.5.1:
Summary of Ontology Alignment Approaches / 6.5.2:
Implementation and Application / 6.5.3:
Tools / 7:
Basic Infrastructure for Ontology Alignment and Mapping-Foam / 7.1:
User Example / 7.1.1:
Process Implementation / 7.1.2:
Underlying Software / 7.1.3:
Availability and Open Usage / 7.1.4:
Summary / 7.1.5:
Ontology Mapping Based on Axioms / 7.2:
Logics and Inferencing / 7.2.1:
Formalization of Similarity Rules as Logical Axioms / 7.2.2:
Integration into Ontology Engineering Platform / 7.2.3:
OntoStudio / 7.3.1:
OntoMap / 7.3.2:
Foam in OntoMap / 7.3.3:
Semantic Web and Peer-to-Peer - SWAP / 8:
Project Description / 8.1:
Core Technologies / 8.1.1:
Case Studies / 8.1.2:
Bibster / 8.2:
Scenario / 8.2.1:
Design / 8.2.2:
Ontology Alignment / Duplicate Detection / 8.2.3:
Application / 8.2.4:
Xarop / 8.3:
Semantically Enabled Knowledge Technologies - SEKT / 8.3.1:
Intelligent Integrated Decision Support for Legal Professionals / 9.1:
Retrieving and Sharing Knowledge in a Digital Library / 9.2.1:
Heterogeneous Groups in Consulting / 9.3.1:
Towards Next Generation Semantic Alignment / 9.4.1:
Next Steps / 10:
Generalization / 10.1:
Situation / 10.1.1:
Generalized Process / 10.1.2:
Alignment of Petri Nets / 10.1.3:
Complex Alignments / 10.1.4:
Types of Complex Alignments / 10.2.1:
Extended Process for Complex Alignments / 10.2.3:
Implementation and Discussion / 10.2.4:
Future / 11:
Outlook / 11.1:
Limits for Alignment / 11.2:
Errors / 11.2.1:
Points of Mismatch / 11.2.2:
Implications / 11.2.3:
Conclusion / 12:
Content Summary / 12.1:
Assessment of Contribution / 12.2:
Final Statements / 12.3:
Appendix / Part V:
Ontologies / A:
Complete Evaluation Results / B:
Foam Tool Details / C:
Short description / C.1:
Download and Installation / C.2:
Usage / C.3:
Web Service / C.4:
Parameters / C.5:
Additional features of the tool / C.6:
References
Index
Preface
Acknowledgements
Introduction and Overview / 1:
80.

電子ブック

EB
Stefano Crespi Reghizzi
出版情報: Springer eBooks Computer Science , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Intended Scope and Audience / 1.1:
Compiler Parts and Corresponding Concepts / 1.2:
Syntax / 2:
Artificial and Formal Languages / 2.1:
Language Types / 2.1.2:
Chapter Outline / 2.1.3:
Formal Language Theory / 2.2:
Alphabet and Language / 2.2.1:
Language Operations / 2.2.2:
Set Operations / 2.2.3:
Star and Cross / 2.2.4:
Quotient / 2.2.5:
Regular Expressions and Languages / 2.3:
Definition of Regular Expression / 2.3.1:
Derivation and Language / 2.3.2:
Other Operators / 2.3.3:
Closure Properties of REG Family / 2.3.4:
Linguistic Abstraction / 2.4:
Abstract and Concrete Lists / 2.4.1:
Context-Free Generative Grammars / 2.5:
Limits of Regular Languages / 2.5.1:
Introduction to Context-Free Grammars / 2.5.2:
Conventional Grammar Representations / 2.5.3:
Derivation and Language Generation / 2.5.4:
Erroneous Grammars and Useless Rules / 2.5.5:
Recursion and Language Infinity / 2.5.6:
Syntax Trees and Canonical Derivations / 2.5.7:
Parenthesis Languages / 2.5.8:
Regular Composition of Context-Free Languages / 2.5.9:
Ambiguity / 2.5.10:
Catalogue of Ambiguous Forms and Remedies / 2.5.11:
Weak and Structural Equivalence / 2.5.12:
Grammar Transformations and Normal Forms / 2.5.13:
Grammars of Regular Languages / 2.6:
From Regular Expressions to Context-Free Grammars / 2.6.1:
Linear Grammars / 2.6.2:
Linear Language Equations / 2.6.3:
Comparison of Regular and Context-Free Languages / 2.7:
Limits of Context-Free Languages / 2.7.1:
Closure Properties of REG and CF / 2.7.2:
Alphabetic Transformations / 2.7.3:
Grammars with Regular Expressions / 2.7.4:
More General Grammars and Language Families / 2.8:
Chomsky Classification / 2.8.1:
Finite Automata as Regular Language Recognizers / 3:
Recognition Algorithms and Automata / 3.1:
A General Automation / 3.2.1:
Introduction to Finite Automata / 3.3:
Deterministic Finite Automata / 3.4:
Error State and Total Automata / 3.4.1:
Clean Automata / 3.4.2:
Minimal Automata / 3.4.3:
From Automata to Grammars / 3.4.4:
Nondeterministic Automata / 3.5:
Motivation of Nondeterminism / 3.5.1:
Nondeterministic Recognizers / 3.5.2:
Automata with Spontaneous Moves / 3.5.3:
Correspondence between Automata and Grammars / 3.5.4:
Ambiguity of Automata / 3.5.5:
Left-Linear Grammars and Automata / 3.5.6:
Directly from Automata to Regular Expressions: BMC Method / 3.6:
Elimination of Nondeterminism / 3.7:
Construction of Accessible Subsets / 3.7.1:
From Regular Expression to Recognizer / 3.8:
Thompson Structural Method / 3.8.1:
Algorithm of Glushkov, McNaughton and Yamada / 3.8.2:
Deterministic Recognizer by Berry and Sethi Algorithm / 3.8.3:
Regular Expressions with Complement and Intersection / 3.9:
Product of Automata / 3.9.1:
Summary of Relations between Regular Languages, Grammars, and Automata / 3.10:
Pushdown Automata and Top-down Parsing / 4:
Pushdown Automaton / 4.1:
From Grammar to Pushdown Automaton / 4.1.2:
Definition of Pushdown Automaton / 4.1.3:
One Family for Context-Free Languages and Pushdown Automata / 4.2:
Intersection of Regular and Context-Free Languages / 4.2.1:
Deterministic Pushdown Automata and Languages / 4.2.2:
Syntax Analysis / 4.3:
Top-Down and Bottom-Up Analysis / 4.3.1:
Grammar as Network of Finite Automata / 4.3.2:
Nondeterministic Recognition Algorithm / 4.3.3:
Top-Down Deterministic Syntax Analysis / 4.4:
Condition for LL(1) Parsing / 4.4.1:
How to Obtain LL(1) Grammars / 4.4.2:
Increasing Look-ahead / 4.4.3:
Bottom-Up and General Parsing / 5:
Bottom-Up Deterministic Syntax Analysis / 5.1:
LR(0) Method / 5.2.1:
LR(0) Grammars / 5.2.2:
Shift-Reduce Parser / 5.2.3:
Syntax Analysis with LR(k) Look-Ahead / 5.2.4:
LR(1) Parsing Algorithm / 5.2.5:
Properties of LR(k) Language and Grammar Families / 5.2.6:
How to Obtain LR(1) Grammars / 5.2.7:
LR(1) Parsing with Extended Context-Free Grammars / 5.2.8:
Comparison of Deterministic Families REG, LL(k), and LR(k) / 5.2.9:
A General Parsing Algorithm / 5.3:
Introductory Example / 5.3.1:
Earley Algorithm / 5.3.2:
Computational Complexity / 5.3.3:
Handling of Empty Rules / 5.3.4:
Further Developments / 5.3.5:
How to Choose a Parser / 5.4:
Translation Semantics and Static Analysis / 6:
Translation Relation and Function / 6.1:
Transliteration / 6.3:
Regular Translations / 6.4:
Two-Input Automaton / 6.4.1:
Translation Functions and Finite Transducers / 6.4.2:
Purely Syntactic Translation / 6.5:
Infix and Polish Notations / 6.5.1:
Ambiguity of Source Grammar and Translation / 6.5.2:
Translation Grammars and Pushdown Transducers / 6.5.3:
Syntax Analysis with Online Translation / 6.5.4:
Top-Down Deterministic Translation / 6.5.5:
Bottom-Up Deterministic Translation / 6.5.6:
Comparisons / 6.5.7:
Closure Properties of Translations / 6.5.8:
Semantic Translations / 6.6:
Attribute Grammars / 6.6.1:
Left and Right Attributes / 6.6.2:
Definition of Attribute Grammar / 6.6.3:
Dependence Graph and Attribute Evaluation / 6.6.4:
One Sweep Semantic Evaluation / 6.6.5:
Other Evaluation Methods / 6.6.6:
Combined Syntax and Semantic Analysis / 6.6.7:
Typical Applications of Attribute Grammars / 6.6.8:
Static Program Analysis / 6.7:
A Program as an Automaton / 6.7.1:
Liveness Intervals of Variables / 6.7.2:
Reaching Definitions / 6.7.3:
References
Index
Introduction / 1:
Intended Scope and Audience / 1.1:
Compiler Parts and Corresponding Concepts / 1.2:
81.

電子ブック

EB
Stefano Crespi Reghizzi, Stefano Crespi Reghizzi
出版情報: SpringerLink Books - AutoHoldings , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Intended Scope and Audience / 1.1:
Compiler Parts and Corresponding Concepts / 1.2:
Syntax / 2:
Artificial and Formal Languages / 2.1:
Language Types / 2.1.2:
Chapter Outline / 2.1.3:
Formal Language Theory / 2.2:
Alphabet and Language / 2.2.1:
Language Operations / 2.2.2:
Set Operations / 2.2.3:
Star and Cross / 2.2.4:
Quotient / 2.2.5:
Regular Expressions and Languages / 2.3:
Definition of Regular Expression / 2.3.1:
Derivation and Language / 2.3.2:
Other Operators / 2.3.3:
Closure Properties of REG Family / 2.3.4:
Linguistic Abstraction / 2.4:
Abstract and Concrete Lists / 2.4.1:
Context-Free Generative Grammars / 2.5:
Limits of Regular Languages / 2.5.1:
Introduction to Context-Free Grammars / 2.5.2:
Conventional Grammar Representations / 2.5.3:
Derivation and Language Generation / 2.5.4:
Erroneous Grammars and Useless Rules / 2.5.5:
Recursion and Language Infinity / 2.5.6:
Syntax Trees and Canonical Derivations / 2.5.7:
Parenthesis Languages / 2.5.8:
Regular Composition of Context-Free Languages / 2.5.9:
Ambiguity / 2.5.10:
Catalogue of Ambiguous Forms and Remedies / 2.5.11:
Weak and Structural Equivalence / 2.5.12:
Grammar Transformations and Normal Forms / 2.5.13:
Grammars of Regular Languages / 2.6:
From Regular Expressions to Context-Free Grammars / 2.6.1:
Linear Grammars / 2.6.2:
Linear Language Equations / 2.6.3:
Comparison of Regular and Context-Free Languages / 2.7:
Limits of Context-Free Languages / 2.7.1:
Closure Properties of REG and CF / 2.7.2:
Alphabetic Transformations / 2.7.3:
Grammars with Regular Expressions / 2.7.4:
More General Grammars and Language Families / 2.8:
Chomsky Classification / 2.8.1:
Finite Automata as Regular Language Recognizers / 3:
Recognition Algorithms and Automata / 3.1:
A General Automation / 3.2.1:
Introduction to Finite Automata / 3.3:
Deterministic Finite Automata / 3.4:
Error State and Total Automata / 3.4.1:
Clean Automata / 3.4.2:
Minimal Automata / 3.4.3:
From Automata to Grammars / 3.4.4:
Nondeterministic Automata / 3.5:
Motivation of Nondeterminism / 3.5.1:
Nondeterministic Recognizers / 3.5.2:
Automata with Spontaneous Moves / 3.5.3:
Correspondence between Automata and Grammars / 3.5.4:
Ambiguity of Automata / 3.5.5:
Left-Linear Grammars and Automata / 3.5.6:
Directly from Automata to Regular Expressions: BMC Method / 3.6:
Elimination of Nondeterminism / 3.7:
Construction of Accessible Subsets / 3.7.1:
From Regular Expression to Recognizer / 3.8:
Thompson Structural Method / 3.8.1:
Algorithm of Glushkov, McNaughton and Yamada / 3.8.2:
Deterministic Recognizer by Berry and Sethi Algorithm / 3.8.3:
Regular Expressions with Complement and Intersection / 3.9:
Product of Automata / 3.9.1:
Summary of Relations between Regular Languages, Grammars, and Automata / 3.10:
Pushdown Automata and Top-down Parsing / 4:
Pushdown Automaton / 4.1:
From Grammar to Pushdown Automaton / 4.1.2:
Definition of Pushdown Automaton / 4.1.3:
One Family for Context-Free Languages and Pushdown Automata / 4.2:
Intersection of Regular and Context-Free Languages / 4.2.1:
Deterministic Pushdown Automata and Languages / 4.2.2:
Syntax Analysis / 4.3:
Top-Down and Bottom-Up Analysis / 4.3.1:
Grammar as Network of Finite Automata / 4.3.2:
Nondeterministic Recognition Algorithm / 4.3.3:
Top-Down Deterministic Syntax Analysis / 4.4:
Condition for LL(1) Parsing / 4.4.1:
How to Obtain LL(1) Grammars / 4.4.2:
Increasing Look-ahead / 4.4.3:
Bottom-Up and General Parsing / 5:
Bottom-Up Deterministic Syntax Analysis / 5.1:
LR(0) Method / 5.2.1:
LR(0) Grammars / 5.2.2:
Shift-Reduce Parser / 5.2.3:
Syntax Analysis with LR(k) Look-Ahead / 5.2.4:
LR(1) Parsing Algorithm / 5.2.5:
Properties of LR(k) Language and Grammar Families / 5.2.6:
How to Obtain LR(1) Grammars / 5.2.7:
LR(1) Parsing with Extended Context-Free Grammars / 5.2.8:
Comparison of Deterministic Families REG, LL(k), and LR(k) / 5.2.9:
A General Parsing Algorithm / 5.3:
Introductory Example / 5.3.1:
Earley Algorithm / 5.3.2:
Computational Complexity / 5.3.3:
Handling of Empty Rules / 5.3.4:
Further Developments / 5.3.5:
How to Choose a Parser / 5.4:
Translation Semantics and Static Analysis / 6:
Translation Relation and Function / 6.1:
Transliteration / 6.3:
Regular Translations / 6.4:
Two-Input Automaton / 6.4.1:
Translation Functions and Finite Transducers / 6.4.2:
Purely Syntactic Translation / 6.5:
Infix and Polish Notations / 6.5.1:
Ambiguity of Source Grammar and Translation / 6.5.2:
Translation Grammars and Pushdown Transducers / 6.5.3:
Syntax Analysis with Online Translation / 6.5.4:
Top-Down Deterministic Translation / 6.5.5:
Bottom-Up Deterministic Translation / 6.5.6:
Comparisons / 6.5.7:
Closure Properties of Translations / 6.5.8:
Semantic Translations / 6.6:
Attribute Grammars / 6.6.1:
Left and Right Attributes / 6.6.2:
Definition of Attribute Grammar / 6.6.3:
Dependence Graph and Attribute Evaluation / 6.6.4:
One Sweep Semantic Evaluation / 6.6.5:
Other Evaluation Methods / 6.6.6:
Combined Syntax and Semantic Analysis / 6.6.7:
Typical Applications of Attribute Grammars / 6.6.8:
Static Program Analysis / 6.7:
A Program as an Automaton / 6.7.1:
Liveness Intervals of Variables / 6.7.2:
Reaching Definitions / 6.7.3:
References
Index
Introduction / 1:
Intended Scope and Audience / 1.1:
Compiler Parts and Corresponding Concepts / 1.2:
82.

電子ブック

EB
Marc Ehrig, Ramesh Jain, Amit Sheth
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Introduction and Overview / 1:
Motivation / 1.1:
Contribution / 1.2:
Problem Outline / 1.2.1:
Solution Pathway / 1.2.2:
Overview / 1.3:
Structure / 1.3.1:
Reader's Guide / 1.3.2:
Foundations / Part I:
Definitions / 2:
Ontology / 2.1:
Ontology Definition / 2.1.1:
Semantic Web and Web Ontology Language (OWL) / 2.1.2:
Ontology Example / 2.1.3:
Ontology Alignment / 2.2:
Ontology Alignment Definition / 2.2.1:
Ontology Alignment Representation / 2.2.2:
Ontology Alignment Example / 2.2.3:
Related Terms / 2.3:
Ontology Similarity / 2.4:
Ontology Similarity Definition / 2.4.1:
Similarity Layers / 2.4.2:
Specific Similarity Measures / 2.4.3:
Similarity in Related Work / 2.4.4:
Heuristic Definition / 2.4.5:
Scenarios / 3:
Use Cases / 3.1:
Alignment Discovery / 3.1.1:
Agent Negotiation / Web Service Composition / 3.1.2:
Data Integration / 3.1.3:
Ontology Evolution / Versioning / 3.1.4:
Ontology Merging / 3.1.5:
Query and Answer Rewriting / Mapping / 3.1.6:
Reasoning / 3.1.7:
Requirements / 3.2:
Related Work / 4:
Theory of Alignment / 4.1:
Algebraic Approach / 4.1.1:
Information-Flow-based Approach / 4.1.2:
Translation Framework / 4.1.3:
Existing Alignment Approaches / 4.2:
Classification Guidelines for Alignment Approaches / 4.2.1:
Ontology Alignment Approaches / 4.2.2:
Schema Alignment Approaches / 4.2.3:
Global as View / Local as View / 4.2.4:
Ontology Alignment Approach / Part II:
Process / 5:
General Process / 5.1:
Alignment Approach / 5.2:
Input / 5.2.0:
Feature Engineering / 5.2.1:
Search Step Selection / 5.2.2:
Similarity Computation / 5.2.3:
Similarity Aggregation / 5.2.4:
Interpretation / 5.2.5:
Iteration / 5.2.6:
Output / 5.2.7:
Process Description of Related Approaches / 5.3:
Prompt, Anchor-Prompt / 5.3.1:
Glue / 5.3.2:
Ola / 5.3.3:
Evaluation of Alignment Approach / 5.4:
Evaluation Scenario / 5.4.1:
Evaluation Measures / 5.4.2:
Absolute Quality / 5.4.3:
Data Sets / 5.4.4:
Strategies / 5.4.5:
Results / 5.4.6:
Discussion and Lessons Learned / 5.4.7:
Advanced Methods / 6:
Efficiency / 6.1:
Challenge / 6.1.1:
Complexity / 6.1.2:
An Efficient Approach / 6.1.3:
Evaluation / 6.1.4:
Machine Learning / 6.1.5:
Machine Learning for Ontology Alignment / 6.2.1:
Runtime Alignment / 6.2.3:
Explanatory Component of Decision Trees / 6.2.4:
Active Alignment / 6.2.5:
Ontology Alignment with User Interaction / 6.3.1:
Adaptive Alignment / 6.3.3:
Create Utility Function / 6.4.1:
Derive Requirements for Result Dimensions / 6.4.4:
Derive Parameters / 6.4.5:
Example / 6.4.6:
Integrated Approach / 6.4.7:
Integrating the Individual Approaches / 6.5.1:
Summary of Ontology Alignment Approaches / 6.5.2:
Implementation and Application / 6.5.3:
Tools / 7:
Basic Infrastructure for Ontology Alignment and Mapping-Foam / 7.1:
User Example / 7.1.1:
Process Implementation / 7.1.2:
Underlying Software / 7.1.3:
Availability and Open Usage / 7.1.4:
Summary / 7.1.5:
Ontology Mapping Based on Axioms / 7.2:
Logics and Inferencing / 7.2.1:
Formalization of Similarity Rules as Logical Axioms / 7.2.2:
Integration into Ontology Engineering Platform / 7.2.3:
OntoStudio / 7.3.1:
OntoMap / 7.3.2:
Foam in OntoMap / 7.3.3:
Semantic Web and Peer-to-Peer - SWAP / 8:
Project Description / 8.1:
Core Technologies / 8.1.1:
Case Studies / 8.1.2:
Bibster / 8.2:
Scenario / 8.2.1:
Design / 8.2.2:
Ontology Alignment / Duplicate Detection / 8.2.3:
Application / 8.2.4:
Xarop / 8.3:
Semantically Enabled Knowledge Technologies - SEKT / 8.3.1:
Intelligent Integrated Decision Support for Legal Professionals / 9.1:
Retrieving and Sharing Knowledge in a Digital Library / 9.2.1:
Heterogeneous Groups in Consulting / 9.3.1:
Towards Next Generation Semantic Alignment / 9.4.1:
Next Steps / 10:
Generalization / 10.1:
Situation / 10.1.1:
Generalized Process / 10.1.2:
Alignment of Petri Nets / 10.1.3:
Complex Alignments / 10.1.4:
Types of Complex Alignments / 10.2.1:
Extended Process for Complex Alignments / 10.2.3:
Implementation and Discussion / 10.2.4:
Future / 11:
Outlook / 11.1:
Limits for Alignment / 11.2:
Errors / 11.2.1:
Points of Mismatch / 11.2.2:
Implications / 11.2.3:
Conclusion / 12:
Content Summary / 12.1:
Assessment of Contribution / 12.2:
Final Statements / 12.3:
Appendix / Part V:
Ontologies / A:
Complete Evaluation Results / B:
Foam Tool Details / C:
Short description / C.1:
Download and Installation / C.2:
Usage / C.3:
Web Service / C.4:
Parameters / C.5:
Additional features of the tool / C.6:
References
Index
Preface
Acknowledgements
Introduction and Overview / 1:
83.

図書

図書
Sung Joon Ahn
出版情報: Berlin : Springer, c2004  xx, 125 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3151
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Curves and Surfaces in Space / 1.1:
Mathematical Description / 1.1.1:
Rigid Body Motion of Model Features in Space / 1.1.2:
Model Hierarchy / 1.1.3:
Curve and Surface Fitting / 1.2:
Applications of Curve and Surface Fitting / 1.2.1:
Algebraic Fitting Vs. Geometric Fitting / 1.2.2:
State-of-the-Art Orthogonal Distance Fitting / 1.2.3:
ISO 10360-6 and Requirements of CMM Software Tools / 1.2.4:
Least-Squares Orthogonal Distance Fitting / 2:
Moment Method for Line and Plane Fitting / 2.1:
Line Fitting / 2.1.1:
Plane Fitting / 2.1.2:
Relationship Between Line and Plane Fitting / 2.1.3:
Generalized Orthogonal Distance Fitting / 2.2:
Problem Definition / 2.2.1:
Point-to-Point Matching / 2.2.2:
Template Matching / 2.2.3:
Orthogonal Distance Fitting Algorithms / 2.3:
Distance-Based Algorithm / 2.3.1:
Coordinate-Based Algorithm / 2.3.2:
Model Fitting with Parameter Constraints / 2.3.3:
Parameter Test / 2.3.4:
Application to Circle and Sphere Fitting / 2.3.5:
Orthogonal Distance Fitting of Implicit Curves and Surfaces / 3:
Minimum Distance Point / 3.1:
Generalized Newton Method / 3.1.1:
Method of Lagrangian Multipliers / 3.1.2:
Verification of the Minimum Distance Point / 3.1.3:
Acceleration of Finding the Minimum Distance Point / 3.1.4:
Orthogonal Distance Fitting / 3.2:
Comparison of the Two Algorithms / 3.2.1:
Fitting Examples / 3.3:
Superellipse Fitting / 3.3.1:
Cone Fitting / 3.3.2:
Torus Fitting / 3.3.3:
Superellipsoid Fitting / 3.3.4:
Orthogonal Distance Fitting of Parametric Curves and Surfaces / 4:
Newton Method / 4.1:
Levenberg-MarquardtAlgorithm / 4.1.2:
Initial Values / 4.1.3:
Algorithm I (ETH) / 4.1.4:
Algorithm II (NPL, FhG) / 4.2.2:
Algorithm III (FhG) / 4.2.3:
Comparison of the Three Algorithms / 4.2.4:
Helix Fitting / 4.3:
Ellipsoid Fitting / 4.3.2:
Object Reconstruction from Unordered Point Cloud / 5:
Applications of Object Reconstruction / 5.1:
Semi-automatic Object Recognition / 5.2:
Segmentation, Outlier Elimination, and Model Fitting / 5.2.1:
Domain Volume for Measurement Points / 5.2.2:
Experimental Results with Real 3-D Measurement Points / 5.3:
3-D Point Cloud from Stripe Projection Method / 5.3.1:
3-D Point Cloud from Laser Radar / 5.3.2:
Conclusions / 6:
Summary / 6.1:
Future Work / 6.2:
References
Index
Implementation Examples / A:
Implicit 2-D Ellipse (Chap.3) / A.1:
Parametric 3-D Ellipse (Chap.4) / A.2:
CMM Software Tools Fulfilling ISO 10360-6 / B:
Curves and Surfaces Defined in ISO 10360-6 / B.1:
Competent Parameterization / B.1.1:
Role of the Mass Center / B.1.2:
Rotation Matrix / B.1.3:
Parameter Range / B.1.4:
Minimum Distance Point and FHG/XHG Matrix / B.2:
2-D Line / B.2.1:
3-D Line / B.2.2:
Plane / B.2.3:
2-D Circle / B.2.4:
3-D Circle / B.2.5:
Sphere / B.2.6:
Cylinder / B.2.7:
Cone / B.2.8:
Torus / B.2.9:
FHG Matrix of Superellipse and Superellipsoid / C:
Superellipse / C.1:
Superellipsoid / C.2:
Introduction / 1:
Curves and Surfaces in Space / 1.1:
Mathematical Description / 1.1.1:
84.

電子ブック

EB
Sung Joon Ahn
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2004
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Curves and Surfaces in Space / 1.1:
Mathematical Description / 1.1.1:
Rigid Body Motion of Model Features in Space / 1.1.2:
Model Hierarchy / 1.1.3:
Curve and Surface Fitting / 1.2:
Applications of Curve and Surface Fitting / 1.2.1:
Algebraic Fitting Vs. Geometric Fitting / 1.2.2:
State-of-the-Art Orthogonal Distance Fitting / 1.2.3:
ISO 10360-6 and Requirements of CMM Software Tools / 1.2.4:
Least-Squares Orthogonal Distance Fitting / 2:
Moment Method for Line and Plane Fitting / 2.1:
Line Fitting / 2.1.1:
Plane Fitting / 2.1.2:
Relationship Between Line and Plane Fitting / 2.1.3:
Generalized Orthogonal Distance Fitting / 2.2:
Problem Definition / 2.2.1:
Point-to-Point Matching / 2.2.2:
Template Matching / 2.2.3:
Orthogonal Distance Fitting Algorithms / 2.3:
Distance-Based Algorithm / 2.3.1:
Coordinate-Based Algorithm / 2.3.2:
Model Fitting with Parameter Constraints / 2.3.3:
Parameter Test / 2.3.4:
Application to Circle and Sphere Fitting / 2.3.5:
Orthogonal Distance Fitting of Implicit Curves and Surfaces / 3:
Minimum Distance Point / 3.1:
Generalized Newton Method / 3.1.1:
Method of Lagrangian Multipliers / 3.1.2:
Verification of the Minimum Distance Point / 3.1.3:
Acceleration of Finding the Minimum Distance Point / 3.1.4:
Orthogonal Distance Fitting / 3.2:
Comparison of the Two Algorithms / 3.2.1:
Fitting Examples / 3.3:
Superellipse Fitting / 3.3.1:
Cone Fitting / 3.3.2:
Torus Fitting / 3.3.3:
Superellipsoid Fitting / 3.3.4:
Orthogonal Distance Fitting of Parametric Curves and Surfaces / 4:
Newton Method / 4.1:
Levenberg-MarquardtAlgorithm / 4.1.2:
Initial Values / 4.1.3:
Algorithm I (ETH) / 4.1.4:
Algorithm II (NPL, FhG) / 4.2.2:
Algorithm III (FhG) / 4.2.3:
Comparison of the Three Algorithms / 4.2.4:
Helix Fitting / 4.3:
Ellipsoid Fitting / 4.3.2:
Object Reconstruction from Unordered Point Cloud / 5:
Applications of Object Reconstruction / 5.1:
Semi-automatic Object Recognition / 5.2:
Segmentation, Outlier Elimination, and Model Fitting / 5.2.1:
Domain Volume for Measurement Points / 5.2.2:
Experimental Results with Real 3-D Measurement Points / 5.3:
3-D Point Cloud from Stripe Projection Method / 5.3.1:
3-D Point Cloud from Laser Radar / 5.3.2:
Conclusions / 6:
Summary / 6.1:
Future Work / 6.2:
References
Index
Implementation Examples / A:
Implicit 2-D Ellipse (Chap.3) / A.1:
Parametric 3-D Ellipse (Chap.4) / A.2:
CMM Software Tools Fulfilling ISO 10360-6 / B:
Curves and Surfaces Defined in ISO 10360-6 / B.1:
Competent Parameterization / B.1.1:
Role of the Mass Center / B.1.2:
Rotation Matrix / B.1.3:
Parameter Range / B.1.4:
Minimum Distance Point and FHG/XHG Matrix / B.2:
2-D Line / B.2.1:
3-D Line / B.2.2:
Plane / B.2.3:
2-D Circle / B.2.4:
3-D Circle / B.2.5:
Sphere / B.2.6:
Cylinder / B.2.7:
Cone / B.2.8:
Torus / B.2.9:
FHG Matrix of Superellipse and Superellipsoid / C:
Superellipse / C.1:
Superellipsoid / C.2:
Introduction / 1:
Curves and Surfaces in Space / 1.1:
Mathematical Description / 1.1.1:
85.

図書

図書
editor, H. Fischer ; authors, J.A. Howard ... [et al.]
出版情報: Berlin : Springer, c2004  xi, 535 p. ; 28 cm
シリーズ名: Landolt-Börnstein Zahlenwerte und Funktionen aus Naturwissenschaften und Technik, Neue Serie / Gesamtherausgabe, K.-H. Hellwege ; group 2 . Molecules and radicals ; v. 26 . Magnetic properties of free radicals ; subv. C
所蔵情報: loading…
目次情報: 続きを見る
Molecules and Radicals / Landolt-BörnsteinGroup II:
Magnetic Properties of Free Radicals / Volume 26:
Nitrogen and Oxygen Centered Radicals / Subvolume C:
Title Pages, Contributors, Preface, Table of Contents
Title Pages
Contributors
Preface
Table of Contents
General introduction / H. FischerI:
Definition and substances / A:
Magnetic properties / B:
Arrangements of the tables / C:
Monographs, reviews and important conference proceedings / D:
Data / II:
Nitrogen-centered monoradicals, biradicals and high-spin nitrenes / F.A. Neugebauer9:
Introduction / 9.1:
General remarks / 9.1.1:
Arrangement of tables / 9.1.2:
Abbreviations / 9.1.3:
Aminyl radicals of type R&sbond;N&sbond;R (R &dbond; H, C) / 9.2:
Acyclic aminyl radicals / 9.2.1:
Alkylaminyl radicals / 9.2.1.1:
Vinylaminyl radicals / 9.2.1.2:
Arylaminyls / 9.2.1.3:
Aminyl radicals with heterocyclic substituent / 9.2.1.4:
Cyano- and acylaminyl radicals / 9.2.1.5:
Cyclic aminyl radicals / 9.2.2:
Monocyclic aminyl radicals / 9.2.2.1:
Aminyl radicals from four-membered rings / 9.2.2.1.1:
Aminyl radicals from five-membered rings / 9.2.2.1.2:
Aminyl radicals from six-membered rings / 9.2.2.1.3:
Fused polycyclic aminyl radicals / 9.2.2.2:
Based on five-membered rings / 9.2.2.2.1:
Based on six-membered rings / 9.2.2.2.2:
Based on seven-membered rings / 9.2.2.2.3:
Germylaminyl radicals of type R&sbond;N&sbond;GeR3 / 9.3:
Hydrazyl and hydrazonyl radicals: R1&sbond;N&sbond;NR2R3, R1&sbond;N&sbond;N&dbond;CR2R3 / 9.4:
Acyclic hydrazyl radicals / 9.4.1:
Leading atom of R1, R2, and R3: Hydrogen or carbon / 9.4.1.1:
Alkylhydrazyl radicals / 9.4.1.1.1:
Arylhydrazyl radicals / 9.4.1.1.2:
Cyano- and acylhydrazyl radicals / 9.4.1.1.3:
Leading atom of R1 : Other than hydrogen or carbon / 9.4.1.2:
Leading atom of R2: Other than hydrogen or carbon / 9.4.1.3:
Leading atom of R1 and R2: Other than hydrogen or carbon / 9.4.1.4:
Cyclic hydrazyl radicals / 9.4.2:
Monocyclic hydrazyl radicals / 9.4.2.1:
Hydrazyl radicals from three-membered rings / 9.4.2.1.1:
Hydrazyl radicals from five-membered rings / 9.4.2.1.2:
Hydrazyl radicals from six-membered rings / 9.4.2.1.3:
Fused polycyclic hydrazyl radicals / 9.4.2.2:
Acyclic and cyclic hydrazonyl radicals / 9.4.3:
Acyclic hydrazonyl radicals / 9.4.3.1:
Cyclic hydrazonyl radicals / 9.4.3.2:
Oxyaminyl radicals: &sbond;N&sbond;O&sbond; / 9.5:
Acyclic oxyaminyl radicals: R1&sbond;N&sbond;O&sbond;R2 / 9.5.1:
Leading atom of R1 and R2: Carbon / 9.5.1.1:
Leading atom of R2: Other than carbon / 9.5.1.2:
Leading atom of R1: Other than carbon / 9.5.1.3:
Cyclic oxyaminyl radicals / 9.5.2:
Thioaminyl radicals: &sbond;N&sbond;S&sbond;, &sbond;N&sbond;S(&dbond;O)&sbond;, &sbond;N&sbond;SO2&sbond; / 9.6:
Acyclic thioaminyl radicals / 9.6.1:
Sulfenamidyl radicals: R1&sbond;N&sbond;S&sbond;R2 / 9.6.1.1:
Sulfinamidyl radicals: R1&sbond;N&sbond;S(&dbond;O)&sbond;R2 / 9.6.1.1.1:
Sulfonamidyl radicals: R1&sbond;N&sbond;SO2&sbond;R2 / 9.6.1.3:
Cyclic thioaminyl radicals / 9.6.2:
Monocyclic thioaminyl radicals / 9.6.2.1:
Thioaminyl radicals from five-membered rings / 9.6.2.1.1:
Thioaminyl radicals from six-membered rings / 9.6.2.1.2:
Thioaminyl radicals from eight-membered rings / 9.6.2.1.3:
Fused polycyclic thioaminyl radicals / 9.6.2.2:
Bridged thioaminyl radicals / 9.6.2.3:
Selenoaminyl radicals: &sbond;N&sbond;Se&sbond; / 9.7:
Iminyl radicals: >C&dbond;N / 9.8:
Iminyl radicals of type RCH&dbond;N / 9.8.1:
Iminyl radicals of type R1R2C&dbond;N / 9.8.2:
Diazenyl radicals: R&sbond;N•+&dbond;N / 9.9:
Iminoxyl radicals: >C&dbond;N&sbond;O / 9.10:
Acyclic iminoxyl radicals / 9.10.1:
Iminoxyl radicals of type RCH&dbond;N&sbond;O, leading atom of R: Carbon / 9.10.1.1:
Iminoxyl radicals of type R1R2C&dbond;N&sbond;O / 9.10.1.2:
Leading atom of R1 and R2: Other than carbon / 9.10.1.2.1:
Cyclic iminoxyl radicals / 9.10.2:
Monocyclic iminoxyl radicals / 9.10.2.1:
Fused polycyclic iminoxyl radicals / 9.10.2.2:
Bridged iminoxyl radicals / 9.10.2.3:
Nitrogen-centered biradicals / 9.11:
Aminyl biradicals / 9.11.1:
Hydrazyl biradicals / 9.11.2:
Acyclic hydrazyl biradicals / 9.11.2.1:
Cyclic hydrazyl biradicals / 9.11.2.2:
Thioaminyl biradicals / 9.11.3:
Acyclic thioaminyl biradicals / 9.11.3.1:
Cyclic thioaminyl biradicals / 9.11.3.2:
Cyclic selenoaminyl biradical / 9.11.4:
Biradicals with different kinds of radical centers / 9.11.5:
Type R1N.....CR2R3 / 9.11.5.1:
Type R1N.....N(O)R2 / 9.11.5.2:
Type R1N.....O / 9.11.5.3:
High-spin mono- and polynitrenes / 9.12:
Mononitrenes / 9.12.1:
Alkyl nitrenes / 9.12.1.1:
Cyano nitrene / 9.12.1.2:
Carbonyl nitrene / 9.12.1.3:
Aryl nitrenes / 9.12.1.4:
Heterocyclic nitrenes / 9.12.1.5:
Boryl nitrene / 9.12.1.6:
Phosphoryl nitrene / 9.12.1.7:
Sulfonyl nitrenes / 9.12.1.8:
Silyl nitrenes / 9.12.1.9:
Stannyl nitrene / 9.12.1.10:
Mononitrenes and additional radicals (S = 3/2, S = 2) / 9.12.2:
Nitrene and benzyl / 9.12.2.1:
Nitrene and aminyl / 9.12.2.2:
Nitrene and hydrazyl / 9.12.2.3:
Nitrene and nitroxyde / 9.12.2.4:
Nitrene, alkyl and aminyl / 9.12.2.5:
Nitrene and carbine / 9.12.2.6:
Quinonoidal dinitrenes (iminyl biradicals) / 9.12.3:
Dinitrenes (S = 2) / 9.12.4:
Arylene dinitrenes / 9.12.4.1:
Bis(arylnitrenes) linked by >C&dbond;CH2 or >C&dbond;O / 9.12.4.2:
Bis(arylnitrenes) linked by &sbond;HC&dbond;CH&sbond;, &sbond;[C&tbond;C]n&sbond;, &sbond;(1,3-C6H4)&sbond;,.or &sbond;C&tbond;C&sbond;(1,3-C6H4)&sbond;C&tbond;C&sbond; / 9.12.4.3:
Bis(arylnitrenes) linked by carbocyclic or heterocyclic bridges / 9.12.4.4:
Bis(arylnitrenes) linked by &sbond;CONH&sbond; / 9.12.4.5:
Bis(arylnitrenes) linked by hetero atoms: O, S, Si / 9.12.4.6:
Heterocyclic dinitrenes / 9.12.4.7:
Polynitrenes (S ≥ 3) / 9.12.5:
References for 9 / 9.13:
Review articles / 9.13.1:
References for 9.2-9.12 / 9.13.2:
Oxy- and peroxyalkyl radicals / J.A. Howard10:
Carbonyloxy radicals / 10.1:
Sulfinyl radicals / 10.3:
Alkylperoxy radicals / 10.4:
Alkenylperoxy radicals / 10.5:
Substituted alkylperoxy radicals / 10.6:
Aromatic peroxy radicals / 10.7:
Thiylperoxy radicals / 10.8:
Sulphonylperoxyl radicals / 10.9:
Peroxyl radicals from biological molecules / 10.10:
Polymer peroxyl radical / 10.11:
Metal centered peroxyl radical / 10.12:
References for 10 / 10.13:
Aroxyl radicals / R. Mecke ; H.H. Jäger ; M. Jäger11:
Arrangement of the tables / 11.1:
Carbocycles / 11.1.3:
Monocyclic compounds / 11.2.1:
Phenoxyls / 11.2.1.1:
Phenoxyl / 11.2.1.1.1:
Monosubstituted phenoxyls / 11.2.1.1.2:
Tyrosyl / 11.2.1.1.2.1:
Tyrosine derived radicals / 11.2.1.1.2.2:
Tyrosine radicals in biological systems / 11.2.1.1.2.3:
Disubstituted phenoxyls / 11.2.1.1.3:
Trisubstituted phenoxyls / 11.2.1.1.4:
2,3,4-trisubstituted phenoxyls / 11.2.1.1.4.1:
2,3,5-trisubstituted phenoxyls / 11.2.1.1.4.2:
2,3,6-trisubstituted phenoxyls / 11.2.1.1.4.3:
2,4,5-trisubstituted phenoxyls / 11.2.1.1.4.4:
2,4,6-trisubstituted phenoxyls (1/6) / 11.2.1.1.4.5:
2,4,6-trisubstituted phenoxyls (2/6)
2,4,6-trisubstituted phenoxyls (3/6)
2,4,6-trisubstituted phenoxyls (4/6)
2,4,6-trisubstituted phenoxyls (5/6)
2,4,6-trisubstituted phenoxyls (6/6)
3,4,5-trisubstituted phenoxyls / 11.2.1.1.4.6:
Tetrasubstituted phenoxyls / 11.2.1.1.5:
Pentasubstituted phenoxyls / 11.2.1.1.6:
Condensed ring systems / 11.2.2:
Systems with condensed non-aromatic rings / 11.2.2.1:
Naphthoxyls / 11.2.2.2:
Anthroxyls / 11.2.2.3:
Polycondensed systems / 11.2.2.4:
Heterocycles / 11.3:
N-heterocycles / 11.3.1:
O-heterocycles / 11.3.2:
5-membered heterocyclic systems / 11.3.2.1:
6-membered heterocyclic systems / 11.3.2.2:
Condensed dioxol systems / 11.3.2.3:
S-heterocycles / 11.3.3:
Cations / 11.4:
Bi- and polyradicals / 11.5:
References for 11 / 11.6:
General symbols and abbreviations / III:
Symbols
Substances or part of substances
Molecules and Radicals / Landolt-BörnsteinGroup II:
Magnetic Properties of Free Radicals / Volume 26:
Nitrogen and Oxygen Centered Radicals / Subvolume C:
86.

電子ブック

EB
David Makinson
出版情報: Springer eBooks Computer Science , Springer London, 2008
所蔵情報: loading…
目次情報: 続きを見る
Collecting Things Together: Sets / 1:
The Intuitive Concept of a Set / 1.1:
Basic Relations between Sets / 1.2:
Inclusion / 1.2.1:
Identity / 1.2.2:
Proper Inclusion / 1.2.3:
Euler Diagrams / 1.2.4:
Venn Diagrams / 1.2.5:
Ways of Defining a Set / 1.2.6:
The Empty Set / 1.3:
Emptiness / 1.3.1:
Disjoint Sets / 1.3.2:
Boolean Operations on Sets / 1.4:
Intersection / 1.4.1:
Union / 1.4.2:
Difference and Complement / 1.4.3:
Generalised Union and Intersection / 1.5:
Power Sets / 1.6:
Some Important Sets of Numbers / 1.7:
Comparing Things: Relations / 2:
Ordered Tuples, Cartesian Products, Relations / 2.1:
Ordered Tuples / 2.1.1:
Cartesian Products / 2.1.2:
Relations / 2.1.3:
Tables and Digraphs for Relations / 2.2:
Tables for Relations / 2.2.1:
Digraphs for Relations / 2.2.2:
Operations on Relations / 2.3:
Converse / 2.3.1:
Join of Relations / 2.3.2:
Composition of Relations / 2.3.3:
Image / 2.3.4:
Reflexivity and Transitivity / 2.4:
Reflexivity / 2.4.1:
Transitivity / 2.4.2:
Equivalence Relations and Partitions / 2.5:
Symmetry / 2.5.1:
Equivalence Relations / 2.5.2:
Partitions / 2.5.3:
The Correspondence between Partitions and Equivalence Relations / 2.5.4:
Relations for Ordering / 2.6:
Partial Order / 2.6.1:
Linear Orderings / 2.6.2:
Strict Orderings / 2.6.3:
Closing with Relations / 2.7:
Transitive Closure of a Relation / 2.7.1:
Closure of a Set under a Relation / 2.7.2:
Associating One Item with Another: Functions / 3:
What is a Function? / 3.1:
Operations on Functions / 3.2:
Domain and Range / 3.2.1:
Image, Restriction, Closure / 3.2.2:
Composition / 3.2.3:
Inverse / 3.2.4:
Injections, Surjections, Bijections / 3.3:
Injectivity / 3.3.1:
Surjectivity / 3.3.2:
Bijective Functions / 3.3.3:
Using Functions to Compare Size / 3.4:
The Equinumerosity Principle / 3.4.1:
The Principle of Comparison / 3.4.2:
The Pigeonhole Principle / 3.4.3:
Some Handy Functions / 3.5:
Identity Functions / 3.5.1:
Constant Functions / 3.5.2:
Projection Functions / 3.5.3:
Characteristic Functions / 3.5.4:
Families of Sets / 3.5.5:
Sequences / 3.5.6:
Recycling Outputs as Inputs: Induction and Recursion / 4:
What are Induction and Recursion? / 4.1:
Proof by Simple Induction on the Positive Integers / 4.2:
An Example / 4.2.1:
The Principle behind the Example / 4.2.2:
Definition by Simple Recursion on the Natural Numbers / 4.3:
Evaluating Functions Defined by Recursion / 4.4:
Cumulative Induction and Recursion / 4.5:
Recursive Definitions Reaching Back more than One Unit / 4.5.1:
Proof by Cumulative Induction / 4.5.2:
Simultaneous Recursion and Induction / 4.5.3:
Structural Recursion and Induction / 4.6:
Defining Sets by Structural Recursion / 4.6.1:
Proof by Structural Induction / 4.6.2:
Defining Functions by Structural Recursion on their Domains / 4.6.3:
Condition for Defining a Function by Structural Recursion / 4.6.4:
When the Unique Decomposition Condition Fails? / 4.6.5:
Recursion and Induction on Well-Founded Sets / 4.7:
Well-Founded Sets / 4.7.1:
The Principle of Proof by Well-Founded Induction / 4.7.2:
Definition of a Function by Well-Founded Recursion on its Domain / 4.7.3:
Recursive Programs / 4.8:
Counting Things: Combinatorics / 5:
Two Basic Principles: Addition and Multiplication / 5.1:
Using the Two Basic Principles Together / 5.2:
Four Ways of Selecting k Items out of n / 5.3:
Counting Formulae: Permutations and Combinations / 5.4:
The Formula for Permutations (O+R-) / 5.4.1:
The Formula for Combinations (O-R-) / 5.4.2:
Counting Formulae: Perms and Coms with Repetition / 5.5:
The Formula for Permutations with Repetition Allowed (O+R+) / 5.5.1:
The Formula for Combinations with Repetition Allowed (O-R+) / 5.5.2:
Rearrangements and Partitions / 5.6:
Rearrangements / 5.6.1:
Counting Partitions with a Given Numerical Configuration / 5.6.2:
Weighing the Odds: Probability / 6:
Finite Probability Spaces / 6.1:
Basic Definitions / 6.1.1:
Properties of Probability Functions / 6.1.2:
Philosophy and Applications / 6.2:
Some Simple Problems / 6.3:
Conditional Probability / 6.4:
Interlude: Simpson's Paradox / 6.5:
Independence / 6.6:
Bayes' Theorem / 6.7:
Random Variables and Expected Values / 6.8:
Random Variables / 6.8.1:
Expectation / 6.8.2:
Induced Probability Distributions / 6.8.3:
Expectation Expressed using Induced Probability Functions / 6.8.4:
Squirrel Math: Trees / 7:
My First Tree / 7.1:
Rooted Trees / 7.2:
Labelled Trees / 7.3:
Interlude: Parenthesis-Free Notation / 7.4:
Binary Search Trees / 7.5:
Unrooted Trees / 7.6:
Definition of Unrooted Tree / 7.6.1:
Properties of Unrooted Trees / 7.6.2:
Finding Spanning Trees / 7.6.3:
Yea and Nay: Propositional Logic / 8:
What is Logic? / 8.1:
Structural Features of Consequence / 8.2:
Truth-Functional Connectives / 8.3:
Tautologicality / 8.4:
The Language of Propositional Logic / 8.4.1:
Assignments and Valuations / 8.4.2:
Tautological Implication / 8.4.3:
Tautological Equivalence / 8.4.4:
Tautologies and Contradictions / 8.4.5:
Normal Forms, Least letter-Sets, Greatest Modularity / 8.5:
Disjunctive Normal Form / 8.5.1:
Conjunctive Normal Form / 8.5.2:
Eliminating Redundant Letters / 8.5.3:
Most Modular Representation / 8.5.4:
Semantic Decomposition Trees / 8.6:
Natural Deduction / 8.7:
Enchainment / 8.7.1:
Second-Level (alias Indirect) Inference / 8.7.2:
Something about Everything: Quantificational Logic / 9:
The Language of Quantifiers / 9.1:
Some Examples / 9.1.1:
Systematic Presentation of the Language / 9.1.2:
Freedom and Bondage / 9.1.3:
Some Basic Logical Equivalences / 9.2:
Semantics for Quantificational Logic / 9.3:
Interpretations / 9.3.1:
Valuating Terms under an Interpretation / 9.3.2:
Valuating Formulae under an Interpretation: Basis / 9.3.3:
Valuating Formulae under an Interpretation: Recursion Step / 9.3.4:
The x-Variant Reading of the Quantifiers / 9.3.5:
The Substitutional Reading of the Quantifiers / 9.3.6:
Logical Consequence etc / 9.4:
Natural Deduction with Quantifiers / 9.5:
Index
Collecting Things Together: Sets / 1:
The Intuitive Concept of a Set / 1.1:
Basic Relations between Sets / 1.2:
87.

電子ブック

EB
Burdea
出版情報: EBSCOhost Academic Search Premier , John Wiley & Sons, Inc. / Engineering, 2003
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Introduction / 1:
The Three I's of Virtual Reality / 1.1:
A Short History of Early Virtual Reality / 1.2:
Early Commercial VR Technology / 1.3:
VR Becomes an Industry / 1.4:
The Five Classic Components of a VR System / 1.5:
Review Questions / 1.6:
References
Input Devices: Trackers, Navigation, and Gesture Interfaces / 2:
Three-Dimensional Position Trackers / 2.1:
Tracker Performance Parameters / 2.1.1:
Mechanical Trackers / 2.1.2:
Magnetic Trackers / 2.1.3:
Ultrasonic Trackers / 2.1.4:
Optical Trackers / 2.1.5:
Hybrid Intertial Trackers / 2.1.6:
Navigation and Manipulation Interfaces / 2.2:
Tracker-Based Navigation/Manipulation Interfaces / 2.2.1:
Trackballs / 2.2.2:
Three-Dimensional Probes / 2.2.3:
Gesture Interfaces / 2.3:
The Pinch Glove / 2.3.1:
The 5DT Data Glove / 2.3.2:
The Didjiglove / 2.3.3:
The CyberGlove / 2.3.4:
Conclusion / 2.4:
Output Devices: Graphics, Three-Dimensional Sound, and Haptic Displays / 2.5:
Graphics Displays / 3.1:
The Human Visual System / 3.1.1:
Personal Graphics Displays / 3.1.2:
Large-Volume Displays / 3.1.3:
Sound Displays / 3.2:
The Human Auditory System / 3.2.1:
The Convolvotron / 3.2.2:
Speaker-Based Three-Dimensional Sound / 3.2.3:
Haptic Feedback / 3.3:
The Human Haptic System / 3.3.1:
Tactile Feedback Interfaces / 3.3.2:
Force Feedback Interfaces / 3.3.3:
Computing Architectures for VR / 3.4:
The Rendering Pipeline / 4.1:
The Graphics Rendering Pipeline / 4.1.1:
The Haptics Rendering Pipeline / 4.1.2:
PC Graphics Architecture / 4.2:
PC Graphics Accelerators / 4.2.1:
Graphics Benchmarks / 4.2.2:
Workstation-Based Architectures / 4.3:
The Sun Blade 1000 Architecture / 4.3.1:
The SGI Infinite Reality Architecture / 4.3.2:
Distributed VR Architectures / 4.4:
Multipipeline Synchronization / 4.4.1:
Colocated Rendering Pipelines / 4.4.2:
Distributed Virtual Environments / 4.4.3:
Modeling / 4.5:
Geometric Modeling / 5.1:
Virtual Object Shape / 5.1.1:
Object Visual Appearance / 5.1.2:
Kinematics Modeling / 5.2:
Homogeneous Transformation Matrices / 5.2.1:
Object Position / 5.2.2:
Transformation Invariants / 5.2.3:
Object Hierarchies / 5.2.4:
Viewing the Three-Dimensional World / 5.2.5:
Physical Modeling / 5.3:
Collision Detection / 5.3.1:
Surface Deformation / 5.3.2:
Force Computation / 5.3.3:
Force Smoothing and Mapping / 5.3.4:
Haptic Texturing / 5.3.5:
Behavior Modeling / 5.4:
Model Management / 5.5:
Level-of-Detail Management / 5.5.1:
Cell Segmentation / 5.5.2:
VR Programming / 5.6:
Toolkits and Scene Graphs / 6.1:
WorldToolKit / 6.2:
Model Geometry and Appearance / 6.2.1:
The WTK Scene Graph / 6.2.2:
Sensors and Action Functions / 6.2.3:
WTK Networking / 6.2.4:
Java 3D / 6.3:
Java 3D Scene Graph / 6.3.1:
Sensors and Behaviors / 6.3.3:
Java 3D Networking / 6.3.4:
WTK and Java 3D Performance Comparison / 6.3.5:
General Haptics Open Software Toolkit / 6.4:
GHOST Integration with the Graphics Pipeline / 6.4.1:
The GHOST Haptics Scene Graph / 6.4.2:
Collision Detection and Response / 6.4.3:
Graphics and PHANToM Calibration / 6.4.4:
PeopleShop / 6.5:
DI-Guy Geometry and Path / 6.5.1:
PeopleShop Networking / 6.5.2:
Human Factors in VR / 6.6:
Methodology and Terminology / 7.1:
Data Collection and Analysis / 7.1.1:
Usability Engineering Methodology / 7.1.2:
User Performance Studies / 7.2:
Testbed Evaluation of Universal VR Tasks / 7.2.1:
Influence of System Responsiveness on User Performance / 7.2.2:
Influence of Feedback Multimodality / 7.2.3:
VR Health and Safety Issues / 7.3:
Direct Effects of VR Simulations on Users / 7.3.1:
Cybersickness / 7.3.2:
Adaptation and Aftereffects / 7.3.3:
Guidelines for Proper VR Usage / 7.3.4:
VR and Society / 7.4:
Impact on Professional Life / 7.4.1:
Impact on Private Life / 7.4.2:
Impact on Public Life / 7.4.3:
Traditional VR Applications / 7.5:
Medical Applications of VR / 8.1:
Virtual Anatomy / 8.1.1:
Triage and Diagnostic / 8.1.2:
Surgery / 8.1.3:
Rehabilitation / 8.1.4:
Education, Arts, and Entertainment / 8.2:
VR in Education / 8.2.1:
VR and the Arts / 8.2.2:
Entertainment Applications of VR / 8.2.3:
Military VR Applications / 8.3:
Army Use of VR / 8.3.1:
VR Applications in the Navy / 8.3.2:
Air Force Use of VR / 8.3.3:
Emerging Applications of VR / 8.4:
VR Applications in Manufacturing / 9.1:
Virtual Prototyping / 9.1.1:
Other VR Applications in Manufacturing / 9.1.2:
Applications of VR in Robotics / 9.2:
Robot Programming / 9.2.1:
Robot Teleoperation / 9.2.2:
Information Visualization / 9.3:
Oil Exploration and Well Management / 9.3.1:
Volumetric Data Visualization / 9.3.2:
Index / 9.4:
Foreword
Preface
Introduction / 1:
88.

図書

図書
Ivan Kozhevnikov
出版情報: Chichester : J. Wiley & Sons, c2002  xiv, 201 p. ; 24 cm
シリーズ名: Catalysts for fine chemical synthesis ; v. 2
所蔵情報: loading…
目次情報: 続きを見る
Series Preface
Preface to Volume 2
Introduction / 1:
Scope and definitions / 1.1:
Nomenclature / 1.2:
Historical background / 1.3:
Introduction to catalysis by polyoxometalates / 1.4:
References
Properties of Polyoxometalates / 2:
Structures of polyoxometalates / 2.1:
General principles / 2.1.1:
The Keggin structure / 2.1.2:
The Wells-Dawson structure / 2.1.3:
The Anderson-Evans structure / 2.1.4:
The Dexter-Silverton structure / 2.1.5:
Crystal structure of heteropoly compounds / 2.2:
Thermal stability / 2.3:
Solubility / 2.4:
Formation and state in solution / 2.5:
Stability of polyoxometalates in solution / 2.5.1:
Polyoxometalates as ligands / 2.5.2:
Isotope exchange / 2.5.3:
Kinetics and mechanism of substitution in polyoxmetalates / 2.5.4:
Acid properties / 2.6:
Proton structure / 2.6.1:
Heteropoly acids in solutions / 2.6.2:
Acidity of solid heteropoly acids / 2.6.3:
Redox properties / 2.7:
Synthesis of Polyoxometalates / 3:
General methods of synthesis / 3.1:
Keggin polyoxometalates / 3.2:
12-Molybdosilicic acid, [alpha]-H[subscript 4 SiMo[subscript 12]O[subscript 40] / 3.2.1:
12-Tungstosilicic acid, [alpha]-H[subscript 4 SiW[subscript 12]O[subscript 40] / 3.2.2:
12-Tungstophosphoric acid, [alpha]-H[subscript 3 PW[subscript 12]O[subscript 40] / 3.2.3:
12-Molybdophosphoric acid, [alpha]-H[subscript 3 PMo[subscript 12]O[subscript 40] / 3.2.4:
12-Tungstogermanic acid, [alpha]-[H[subscript 4 GeW[subscript 12]O[subscript 40] / 3.2.5:
11-Molybdo-1-vanadophosphoric acid, H[subscript 4 PMo[subscript 11] VO[subscript 40] / 3.2.6:
10-Molybdo-2-vanadophosphoric acid, H[subscript 5 PMo[subscript 10]V[subscript 2]O[subscript 40] / 3.2.7:
9-Molybdo-3-vanadophosphoric acid, H[subscript 6 PMo[subscript 9] V[subscript 3]O[subscript 40] / 3.2.8:
Transition-metal-substituted tungstophosphates, {PW[subscript 11]MO[subscript 39]} / 3.2.9:
Wells-Dawson polyoxometalates / 3.3:
18-Tungstodiphosphoric acid, H[subscript 6 P[subscript 2]W[subscript 18]O[subscript 62] / 3.3.1:
Sandwich-type polyoxometalates / 3.4:
Na[subscript 12 WZn[subscript 3](H[subscript 2]O)[subscript 2](ZnW[subscript 9]O[subscript 34])[subscript 2] / 3.4.1:
Na[subscript 12 WCo[subscript 3 superscript II](H[subscript 2]O)[subscript 2] (Co[superscript II]W[subscript 9]O[subscript 34])[subscript 2] / 3.4.2:
K[subscript 11 WZnRu[subscript 2 superscript III](OH)(H[subscript 2]O) (ZnW[subscript 9]O[subscript 34])[subscript 2] / 3.4.3:
K[subscript 10 WZnRh[superscript III subscript 2](H[subscript 2]O)(ZnW[subscript 9]O[subscript 34])[subscript 2] / 3.4.4:
Peroxo polyoxometalates / 3.5:
Venturello complex, {PO[subscript 4 WO(O[subscript 2])[subscript 2 subscript 4]}[superscript 3-] / 3.5.1:
Polyoxometalate catalysts / 3.6:
Solid acid catalysts / 3.6.1:
Homogeneous catalysts / 3.6.2:
Acid Catalysis by Heteropoly Compounds / 4:
General overview / 4.1:
The scope of applications / 4.1.1:
Mechanistic principles / 4.1.2:
Homogeneous acid catalysis / 4.2:
Acid-catalysed reactions / 4.2.1:
Acid-catalysed reactions in biphasic liquid-liquid systems / 4.3:
Biphasic reactions / 4.3.1:
Heterogeneous acid catalysts / 4.4:
Heteropoly acid catalysts / 4.4.1:
Heterogeneous catalysis in liquid-solid systems / 4.4.2:
Heterogeneous catalysis in gas-solid systems / 4.4.3:
Deactivation and regeneration of solid heteropoly acid catalysts / 4.5:
Polyoxometalates as Catalysts for Selective Oxidation / 5:
Liquid-phase oxidation / 5.1:
Oxidation with dioxygen / 5.1.1:
Oxidation with hydrogen peroxide / 5.1.2:
Oxidation with organic peroxides / 5.1.3:
Miscellaneous oxidations / 5.1.4:
Gas-phase oxidation / 5.2:
Oxidation catalysts / 5.2.1:
Reactions / 5.2.3:
Miscellaneous Catalytic Applications of Polyoxometalates / 6:
Hydrogenation, carbonylation and related reactions / 6.1:
Polyanion-stabilised clusters / 6.2:
Polyoxometalates as catalyst precursors / 6.3:
Catalysis by Polyoxometalates in Industry / 7:
Acid catalysis / 7.1:
Hydration of olefins / 7.1.1:
Synthesis of ethyl acetate from ethylene and acetic acid / 7.1.2:
Selective oxidation / 7.2:
Oxidation of methacrolein in methacrylic acid / 7.2.1:
Oxidation of ethylene to acetic acid / 7.2.2:
Other Applications of Polyoxometalates / 8:
Analytical chemistry / 8.1:
Elemental analysis / 8.1.1:
Analysis of biomaterials / 8.1.2:
Separation / 8.2:
Processing of radioactive waste / 8.2.1:
Sorption of gases / 8.2.2:
Corrosion-resistant coatings / 8.3:
Polyoxometalates as additives to inorganic and organic matrices / 8.4:
Additives in sol-gel matrices / 8.4.1:
Additives in polymer matrices / 8.4.2:
Membranes / 8.5:
Fuel cells / 8.5.1:
Selective electrodes / 8.5.2:
Gas sensors / 8.5.3:
Polyoxometalates in medicine: antiviral and antitumoral activity / 8.6:
Index
Series Preface
Preface to Volume 2
Introduction / 1:
89.

電子ブック

EB
David Makinson
出版情報: SpringerLink Books - AutoHoldings , Springer London, 2008
所蔵情報: loading…
目次情報: 続きを見る
Collecting Things Together: Sets / 1:
The Intuitive Concept of a Set / 1.1:
Basic Relations between Sets / 1.2:
Inclusion / 1.2.1:
Identity / 1.2.2:
Proper Inclusion / 1.2.3:
Euler Diagrams / 1.2.4:
Venn Diagrams / 1.2.5:
Ways of Defining a Set / 1.2.6:
The Empty Set / 1.3:
Emptiness / 1.3.1:
Disjoint Sets / 1.3.2:
Boolean Operations on Sets / 1.4:
Intersection / 1.4.1:
Union / 1.4.2:
Difference and Complement / 1.4.3:
Generalised Union and Intersection / 1.5:
Power Sets / 1.6:
Some Important Sets of Numbers / 1.7:
Comparing Things: Relations / 2:
Ordered Tuples, Cartesian Products, Relations / 2.1:
Ordered Tuples / 2.1.1:
Cartesian Products / 2.1.2:
Relations / 2.1.3:
Tables and Digraphs for Relations / 2.2:
Tables for Relations / 2.2.1:
Digraphs for Relations / 2.2.2:
Operations on Relations / 2.3:
Converse / 2.3.1:
Join of Relations / 2.3.2:
Composition of Relations / 2.3.3:
Image / 2.3.4:
Reflexivity and Transitivity / 2.4:
Reflexivity / 2.4.1:
Transitivity / 2.4.2:
Equivalence Relations and Partitions / 2.5:
Symmetry / 2.5.1:
Equivalence Relations / 2.5.2:
Partitions / 2.5.3:
The Correspondence between Partitions and Equivalence Relations / 2.5.4:
Relations for Ordering / 2.6:
Partial Order / 2.6.1:
Linear Orderings / 2.6.2:
Strict Orderings / 2.6.3:
Closing with Relations / 2.7:
Transitive Closure of a Relation / 2.7.1:
Closure of a Set under a Relation / 2.7.2:
Associating One Item with Another: Functions / 3:
What is a Function? / 3.1:
Operations on Functions / 3.2:
Domain and Range / 3.2.1:
Image, Restriction, Closure / 3.2.2:
Composition / 3.2.3:
Inverse / 3.2.4:
Injections, Surjections, Bijections / 3.3:
Injectivity / 3.3.1:
Surjectivity / 3.3.2:
Bijective Functions / 3.3.3:
Using Functions to Compare Size / 3.4:
The Equinumerosity Principle / 3.4.1:
The Principle of Comparison / 3.4.2:
The Pigeonhole Principle / 3.4.3:
Some Handy Functions / 3.5:
Identity Functions / 3.5.1:
Constant Functions / 3.5.2:
Projection Functions / 3.5.3:
Characteristic Functions / 3.5.4:
Families of Sets / 3.5.5:
Sequences / 3.5.6:
Recycling Outputs as Inputs: Induction and Recursion / 4:
What are Induction and Recursion? / 4.1:
Proof by Simple Induction on the Positive Integers / 4.2:
An Example / 4.2.1:
The Principle behind the Example / 4.2.2:
Definition by Simple Recursion on the Natural Numbers / 4.3:
Evaluating Functions Defined by Recursion / 4.4:
Cumulative Induction and Recursion / 4.5:
Recursive Definitions Reaching Back more than One Unit / 4.5.1:
Proof by Cumulative Induction / 4.5.2:
Simultaneous Recursion and Induction / 4.5.3:
Structural Recursion and Induction / 4.6:
Defining Sets by Structural Recursion / 4.6.1:
Proof by Structural Induction / 4.6.2:
Defining Functions by Structural Recursion on their Domains / 4.6.3:
Condition for Defining a Function by Structural Recursion / 4.6.4:
When the Unique Decomposition Condition Fails? / 4.6.5:
Recursion and Induction on Well-Founded Sets / 4.7:
Well-Founded Sets / 4.7.1:
The Principle of Proof by Well-Founded Induction / 4.7.2:
Definition of a Function by Well-Founded Recursion on its Domain / 4.7.3:
Recursive Programs / 4.8:
Counting Things: Combinatorics / 5:
Two Basic Principles: Addition and Multiplication / 5.1:
Using the Two Basic Principles Together / 5.2:
Four Ways of Selecting k Items out of n / 5.3:
Counting Formulae: Permutations and Combinations / 5.4:
The Formula for Permutations (O+R-) / 5.4.1:
The Formula for Combinations (O-R-) / 5.4.2:
Counting Formulae: Perms and Coms with Repetition / 5.5:
The Formula for Permutations with Repetition Allowed (O+R+) / 5.5.1:
The Formula for Combinations with Repetition Allowed (O-R+) / 5.5.2:
Rearrangements and Partitions / 5.6:
Rearrangements / 5.6.1:
Counting Partitions with a Given Numerical Configuration / 5.6.2:
Weighing the Odds: Probability / 6:
Finite Probability Spaces / 6.1:
Basic Definitions / 6.1.1:
Properties of Probability Functions / 6.1.2:
Philosophy and Applications / 6.2:
Some Simple Problems / 6.3:
Conditional Probability / 6.4:
Interlude: Simpson's Paradox / 6.5:
Independence / 6.6:
Bayes' Theorem / 6.7:
Random Variables and Expected Values / 6.8:
Random Variables / 6.8.1:
Expectation / 6.8.2:
Induced Probability Distributions / 6.8.3:
Expectation Expressed using Induced Probability Functions / 6.8.4:
Squirrel Math: Trees / 7:
My First Tree / 7.1:
Rooted Trees / 7.2:
Labelled Trees / 7.3:
Interlude: Parenthesis-Free Notation / 7.4:
Binary Search Trees / 7.5:
Unrooted Trees / 7.6:
Definition of Unrooted Tree / 7.6.1:
Properties of Unrooted Trees / 7.6.2:
Finding Spanning Trees / 7.6.3:
Yea and Nay: Propositional Logic / 8:
What is Logic? / 8.1:
Structural Features of Consequence / 8.2:
Truth-Functional Connectives / 8.3:
Tautologicality / 8.4:
The Language of Propositional Logic / 8.4.1:
Assignments and Valuations / 8.4.2:
Tautological Implication / 8.4.3:
Tautological Equivalence / 8.4.4:
Tautologies and Contradictions / 8.4.5:
Normal Forms, Least letter-Sets, Greatest Modularity / 8.5:
Disjunctive Normal Form / 8.5.1:
Conjunctive Normal Form / 8.5.2:
Eliminating Redundant Letters / 8.5.3:
Most Modular Representation / 8.5.4:
Semantic Decomposition Trees / 8.6:
Natural Deduction / 8.7:
Enchainment / 8.7.1:
Second-Level (alias Indirect) Inference / 8.7.2:
Something about Everything: Quantificational Logic / 9:
The Language of Quantifiers / 9.1:
Some Examples / 9.1.1:
Systematic Presentation of the Language / 9.1.2:
Freedom and Bondage / 9.1.3:
Some Basic Logical Equivalences / 9.2:
Semantics for Quantificational Logic / 9.3:
Interpretations / 9.3.1:
Valuating Terms under an Interpretation / 9.3.2:
Valuating Formulae under an Interpretation: Basis / 9.3.3:
Valuating Formulae under an Interpretation: Recursion Step / 9.3.4:
The x-Variant Reading of the Quantifiers / 9.3.5:
The Substitutional Reading of the Quantifiers / 9.3.6:
Logical Consequence etc / 9.4:
Natural Deduction with Quantifiers / 9.5:
Index
Collecting Things Together: Sets / 1:
The Intuitive Concept of a Set / 1.1:
Basic Relations between Sets / 1.2:
90.

電子ブック

EB
John Daniel Aycock
出版情報: Springer eBooks Computer Science , Springer US, 2006
所蔵情報: loading…
目次情報: 続きを見る
Dedication
List of Figures
Preface
We've Got Problems / 1:
Dramatis Personae / 1.1:
The Myth of Absolute Security / 1.2:
The Cost of Malware / 1.3:
The Number of Threats / 1.4:
Speed of Propagation / 1.5:
People / 1.6:
About this Book / 1.7:
Some Words of Warning / 1.8:
Definitions and Timeline / 2:
Malware Types / 2.1:
Logic Bomb / 2.1.1:
Trojan Horse / 2.1.2:
Back Door / 2.1.3:
Virus / 2.1.4:
Worm / 2.1.5:
Rabbit / 2.1.6:
Spyware / 2.1.7:
Adware / 2.1.8:
Hybrids, Droppers, and Blended Threats / 2.1.9:
Zombies / 2.1.10:
Naming / 2.2:
Authorship / 2.3:
Timeline / 2.4:
Viruses / 3:
Classification by Target / 3.1:
Boot-Sector Infectors / 3.1.1:
File Infectors / 3.1.2:
Macro Viruses / 3.1.3:
Classification by Concealment Strategy / 3.2:
No Concealment / 3.2.1:
Encryption / 3.2.2:
Stealth / 3.2.3:
Oligomorphism / 3.2.4:
Polymorphism / 3.2.5:
Metamorphism / 3.2.6:
Strong Encryption / 3.2.7:
Virus Kits / 3.3:
Anti-Virus Techniques / 4:
Detection: Static Methods / 4.1:
Scanners / 4.1.1:
Static Heuristics / 4.1.2:
Integrity Checkers / 4.1.3:
Detection: Dynamic Methods / 4.2:
Behavior Monitors/Blockers / 4.2.1:
Emulation / 4.2.2:
Comparison of Anti-Virus Detection Techniques / 4.3:
Verification, Quarantine, and Disinfection / 4.4:
Verification / 4.4.1:
Quarantine / 4.4.2:
Disinfection / 4.4.3:
Virus Databases and Virus Description Languages / 4.5:
Short Subjects / 4.6:
Anti-Stealth Techniques / 4.6.1:
Macro Virus Detection / 4.6.2:
Compiler Optimization / 4.6.3:
Anti-Anti-Virus Techniques / 5:
Retroviruses / 5.1:
Entry Point Obfuscation / 5.2:
Anti-Emulation / 5.3:
Outlast / 5.3.1:
Outsmart / 5.3.2:
Overextend / 5.3.3:
Armoring / 5.4:
Anti-Debugging / 5.4.1:
Anti-Disassembly / 5.4.2:
Tunneling / 5.5:
Integrity Checker Attacks / 5.6:
Avoidance / 5.7:
Weaknesses Exploited / 6:
Technical Weaknesses / 6.1:
Background / 6.1.1:
Buffer Overflows / 6.1.2:
Integer Overflows / 6.1.3:
Format String Vulnerabilities / 6.1.4:
Defenses / 6.1.5:
Finding Weaknesses / 6.1.6:
Human Weaknesses / 6.2:
Virus Hoaxes / 6.2.1:
Worms / 7:
Worm History / 7.1:
Xerox PARC, c. 1982 / 7.1.1:
The Internet Worm, November 1988 / 7.1.2:
Propagation / 7.2:
Initial Seeding / 7.2.1:
Finding Targets / 7.2.2:
Deworming / 8:
Defense / 8.1:
User / 8.1.1:
Host / 8.1.2:
Perimeter / 8.1.3:
Capture and Containment / 8.2:
Honeypots / 8.2.1:
Reverse Firewalls / 8.2.2:
Throttling / 8.2.3:
Automatic Countermeasures / 8.3:
"Applications" / 9:
Benevolent Malware / 9.1:
Spam / 9.2:
Access-for-Sale Worms / 9.3:
Cryptovirology / 9.4:
Information Warfare / 9.5:
Cyberterrorism / 9.6:
People and Communities / 10:
Malware Authors / 10.1:
Who? / 10.1.1:
Why? / 10.1.2:
The Anti-Virus Community / 10.2:
Perceptions / 10.2.1:
Another Day in Paradise / 10.2.2:
Customer Demands / 10.2.3:
Engineering / 10.2.4:
Open Questions / 10.2.5:
What Should We Do? / 11:
References
Index
Dedication
List of Figures
Preface
91.

図書

図書
by Robert J. Hilderman, Howard J. Hamilton
出版情報: Boston, MA : Kluwer Academic Publishers, c2001  xvii, 162 p. ; 25 cm
シリーズ名: The Kluwer international series in engineering and computer science ; SECS 638
所蔵情報: loading…
目次情報: 続きを見る
List of Figures
List of Tables
Preface
Acknowledgments
Introduction / 1.:
KDD in a Nutshell / 1.1:
The Mining Step / 1.1.1:
The Interpretation and Evaluation Step / 1.1.2:
Objective of the Book / 1.2:
Background and Related Work / 2.:
Data Mining Techniques / 2.1:
Classification / 2.1.1:
Association / 2.1.2:
Clustering / 2.1.3:
Correlation / 2.1.4:
Other Techniques / 2.1.5:
Interestingness Measures / 2.2:
Rule Interest Function / 2.2.1:
J-Measure / 2.2.2:
Itemset Measures / 2.2.3:
Rule Templates / 2.2.4:
Projected Savings / 2.2.5:
I-Measures / 2.2.6:
Silbershatz and Tuzhilin's Interestingness / 2.2.7:
Kamber and Shinghal's Interestingness / 2.2.8:
Credibility / 2.2.9:
General Impressions / 2.2.10:
Distance Metric / 2.2.11:
Surprisingness / 2.2.12:
Gray and Orlowska's Interestingness / 2.2.13:
Dong and Li's Interestingness / 2.2.14:
Reliable Exceptions / 2.2.15:
Peculiarity / 2.2.16:
A Data Mining Technique / 3.:
Definitions / 3.1:
The Serial Algorithm / 3.2:
General Overview / 3.2.1:
Detailed Walkthrough / 3.2.2:
The Parallel Algorithm / 3.3:
Complexity Analysis / 3.3.1:
Attribute-Oriented Generalization / 3.4.1:
The All_Gen Algorithm / 3.4.2:
A Comparison with Commercial OLAP Systems / 3.5:
Heuristic Measures of Interestingness / 4.:
Diversity / 4.1:
Notation / 4.2:
The Sixteen Diversity Measures / 4.3:
The I[subscript Variance] Measure / 4.3.1:
The I[subscript Simpson] Measure / 4.3.2:
The I[subscript Shannon] Measure / 4.3.3:
The I[subscript Total] Measure / 4.3.4:
The I[subscript Max] Measure / 4.3.5:
The I[subscript McIntosh] Measure / 4.3.6:
The I[subscript Lorenz] Measure / 4.3.7:
The I[subscript Gini] Measure / 4.3.8:
The I[subscript Berger] Measure / 4.3.9:
The I[subscript Schutz] Measure / 4.3.10:
The I[subscript Bray] Measure / 4.3.11:
The I[subscript Whittaker] Measure / 4.3.12:
The I[subscript Kullback] Measure / 4.3.13:
The I[subscript MacArthur] Measure / 4.3.14:
The I[subscript Theil] Measure / 4.3.15:
The I[subscript Atkinson] Measure / 4.3.16:
An Interestingness Framework / 5.:
Interestingness Principles / 5.1:
Summary / 5.2:
Theorems and Proofs / 5.3:
Minimum Value Principle / 5.3.1:
Maximum Value Principle / 5.3.2:
Skewness Principle / 5.3.3:
Permutation Invariance Principle / 5.3.4:
Transfer Principle / 5.3.5:
Experimental Analyses / 6.:
Evaluation of the All_Gen Algorithm / 6.1:
Serial vs Parallel Performance / 6.1.1:
Speedup and Efficiency Improvements / 6.1.2:
Evaluation of the Sixteen Diversity Measures / 6.2:
Comparison of Assigned Ranks / 6.2.1:
Analysis of Ranking Similarities / 6.2.2:
Analysis of Summary Complexity / 6.2.3:
Distribution of Index Values / 6.2.4:
Conclusion / 7.:
Areas for Future Research / 7.1:
Appendices
Ranking Similarities
Summary Complexity
Index
List of Figures
List of Tables
Preface
92.

図書

図書
V. L. Cherginets
出版情報: Amsterdam ; Tokyo : Elsevier, 2005  xix, 382 p. ; 25 cm
シリーズ名: Comprehensive chemical kinetics ; v. 41
所蔵情報: loading…
目次情報: 続きを見る
List of symbols
Introduction
Homogeneous acid-base equilibria and acidity scales in ionic melts / 1:
Definitions of acids and bases / Part 1:
Definitions of particles possessing acid or base properties / 1.1.1:
Definitions of solvents system / 1.1.2:
Hard and soft acids and bases (Pearson's concept) / 1.1.3:
Generalized definition of solvent system. Solvents of kinds I and II / 1.1.4:
Studies of homogeneous acid-base reactions in ionic melts / Part 2:
Features of high-temperature ionic solvents as media for Lux acid-base interactions / 1.2.1:
Methods of investigations / 1.2.2:
Ionic solvents based on alkali metal nitrates / 1.2.3:
Molten alkali metal sulfates / 1.2.4:
Silicate melts / 1.2.5:
KCl-NaCl equimolar mixture / 1.2.6:
Oxocompounds of chromium(VI) / 1.2.6.1:
Oxoacids of molybdenum(VI) / 1.2.6.2:
Oxocompounds of tungsten(VI) / 1.2.6.3:
Oxoacidic properties of phosphates / 1.2.6.4:
Oxoacids of vanadium(V) / 1.2.6.5:
Oxoacids of boron(III) / 1.2.6.6:
Acidic properties of Ge(IV) and Nb(V) oxocompounds / 1.2.6.7:
Molten KCl-LiCl (0.41:0.59) EUTECTIC / 1.2.7:
Molten NaI / 1.2.8:
Other alkaline-metal halides / 1.2.9:
Conclusion / 1.2.10:
Acid-base ranges in ionic melts. Estimation of relative acidic properties of ionic melts / Part 3:
The oxobasicity index as a measure of relative oxoacidic properties of high-temperature ionic solvents / 1.3.1:
Oxoacidity scales for melts based on alkali- and alkaline-earth metal halides / 1.3.2:
Oxygen electrodes in ionic melts. Oxide ion donors / 1.3.3:
Oxygen electrode reversibility in ionic melts / Part 4:
Potentiometric method of study of oxygen electrode reversibility / 2.4.1:
Direct calibration / 2.4.1.1:
Indirect calibration of oxygen electrodes / 2.4.1.2:
Experimental results / 2.4.2:
Oxygen-containing melts / 2.4.2.1:
Melts based on alkali metal halides / 2.4.2.2:
Melts based on alkali- and alkaline-earth halides / 2.4.2.3:
KCl-NaCl-NaF eutectic / 2.4.2.4:
Conclusions / 2.4.3:
Investigations of dissociation of Lux bases in ionic melts / Part 5:
Reactions of ionic melts with gases of acidic or base character / 2.5.1:
High-temperature hydrolysis of melts based on alkali metal halides / 2.5.1.1:
Purification of halide ionic melts from oxide-ion admixtures / 2.5.1.2:
Behaviour of Lux bases in ionic melts / 2.5.2:
Sodium peroxide, Na[subscript 2]O[subscript 2] / 2.5.2.1:
Alkali metal carbonates, Me[subscript 2]CO[subscript 3] / 2.5.2.2:
Alkali metal hydroxides, MeOH / 2.5.2.3:
Equilibria in "solid oxide-ionic melt" systems / 3:
Characteristics of oxide solubilities and methods of their determination / Part 6:
Parameters describing solubilities of solid substances in ionic solvents / 3.6.1:
Methods of oxide solubility determination / 3.6.2:
Isothermal saturation method / 3.6.2.1:
Potentiometric titration method / 3.6.2.2:
Sequential addition method / 3.6.2.3:
Regularities of oxide solubilities in melts based on alkali and alkaline-earth metal halides / Part 7:
Molten alkali-metal halides and their mixtures / 3.7.1:
KCl-LiCl (0.41:0.59) eutectic mixture / 3.7.1.1:
KCl-NaCl (0.50:0.50) equimolar mixture / 3.7.1.2:
CsCl-KCl-NaCl (0.455:0.245:0.30) eutectic / 3.7.1.3:
CsBr-KBr (0.66:0.34) melt / 3.7.1.4:
Molten CsI, 700[degree]C / 3.7.1.5:
Molten potassium halides / 3.7.1.6:
Other solvents based on alkali-metal halides / 3.7.1.7:
Oxide solubilities in melts based on alkali- and alkaline-earth metal halides / 3.7.2:
Solubilities of alkali earth metal carbonates in KCl-NaCl eutectic / 3.7.3:
Afterword / 3.7.4:
References
Formula Index
Subject Index
List of symbols
Introduction
Homogeneous acid-base equilibria and acidity scales in ionic melts / 1:
93.

電子ブック

EB
John Daniel Aycock
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2006
所蔵情報: loading…
目次情報: 続きを見る
Dedication
List of Figures
Preface
We've Got Problems / 1:
Dramatis Personae / 1.1:
The Myth of Absolute Security / 1.2:
The Cost of Malware / 1.3:
The Number of Threats / 1.4:
Speed of Propagation / 1.5:
People / 1.6:
About this Book / 1.7:
Some Words of Warning / 1.8:
Definitions and Timeline / 2:
Malware Types / 2.1:
Logic Bomb / 2.1.1:
Trojan Horse / 2.1.2:
Back Door / 2.1.3:
Virus / 2.1.4:
Worm / 2.1.5:
Rabbit / 2.1.6:
Spyware / 2.1.7:
Adware / 2.1.8:
Hybrids, Droppers, and Blended Threats / 2.1.9:
Zombies / 2.1.10:
Naming / 2.2:
Authorship / 2.3:
Timeline / 2.4:
Viruses / 3:
Classification by Target / 3.1:
Boot-Sector Infectors / 3.1.1:
File Infectors / 3.1.2:
Macro Viruses / 3.1.3:
Classification by Concealment Strategy / 3.2:
No Concealment / 3.2.1:
Encryption / 3.2.2:
Stealth / 3.2.3:
Oligomorphism / 3.2.4:
Polymorphism / 3.2.5:
Metamorphism / 3.2.6:
Strong Encryption / 3.2.7:
Virus Kits / 3.3:
Anti-Virus Techniques / 4:
Detection: Static Methods / 4.1:
Scanners / 4.1.1:
Static Heuristics / 4.1.2:
Integrity Checkers / 4.1.3:
Detection: Dynamic Methods / 4.2:
Behavior Monitors/Blockers / 4.2.1:
Emulation / 4.2.2:
Comparison of Anti-Virus Detection Techniques / 4.3:
Verification, Quarantine, and Disinfection / 4.4:
Verification / 4.4.1:
Quarantine / 4.4.2:
Disinfection / 4.4.3:
Virus Databases and Virus Description Languages / 4.5:
Short Subjects / 4.6:
Anti-Stealth Techniques / 4.6.1:
Macro Virus Detection / 4.6.2:
Compiler Optimization / 4.6.3:
Anti-Anti-Virus Techniques / 5:
Retroviruses / 5.1:
Entry Point Obfuscation / 5.2:
Anti-Emulation / 5.3:
Outlast / 5.3.1:
Outsmart / 5.3.2:
Overextend / 5.3.3:
Armoring / 5.4:
Anti-Debugging / 5.4.1:
Anti-Disassembly / 5.4.2:
Tunneling / 5.5:
Integrity Checker Attacks / 5.6:
Avoidance / 5.7:
Weaknesses Exploited / 6:
Technical Weaknesses / 6.1:
Background / 6.1.1:
Buffer Overflows / 6.1.2:
Integer Overflows / 6.1.3:
Format String Vulnerabilities / 6.1.4:
Defenses / 6.1.5:
Finding Weaknesses / 6.1.6:
Human Weaknesses / 6.2:
Virus Hoaxes / 6.2.1:
Worms / 7:
Worm History / 7.1:
Xerox PARC, c. 1982 / 7.1.1:
The Internet Worm, November 1988 / 7.1.2:
Propagation / 7.2:
Initial Seeding / 7.2.1:
Finding Targets / 7.2.2:
Deworming / 8:
Defense / 8.1:
User / 8.1.1:
Host / 8.1.2:
Perimeter / 8.1.3:
Capture and Containment / 8.2:
Honeypots / 8.2.1:
Reverse Firewalls / 8.2.2:
Throttling / 8.2.3:
Automatic Countermeasures / 8.3:
"Applications" / 9:
Benevolent Malware / 9.1:
Spam / 9.2:
Access-for-Sale Worms / 9.3:
Cryptovirology / 9.4:
Information Warfare / 9.5:
Cyberterrorism / 9.6:
People and Communities / 10:
Malware Authors / 10.1:
Who? / 10.1.1:
Why? / 10.1.2:
The Anti-Virus Community / 10.2:
Perceptions / 10.2.1:
Another Day in Paradise / 10.2.2:
Customer Demands / 10.2.3:
Engineering / 10.2.4:
Open Questions / 10.2.5:
What Should We Do? / 11:
References
Index
Dedication
List of Figures
Preface
94.

電子ブック

EB
Elisa Quintarelli
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2004
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Motivations / 1.1:
Overview of the Book / 1.2:
Contributions / 1.3:
Semantics Based on Bisimulation / 2:
G-Log: a Language for Semistructured Data / 2.1:
An Informal Presentation / 2.1.1:
Syntax of G-Log / 2.1.2:
Bisimulation Semantics of G-Log / 2.2:
Semantics of Rules / 2.2.1:
Programming in G-Log / 2.2.2:
Basic Semantic Results / 2.3:
Applicability / 2.3.1:
Satisfiability / 2.3.2:
Simple Edge-Adding Rules / 2.3.3:
Very Simple Queries / 2.3.4:
Abstract Graphs and Semantics / 2.4:
Logical Semantics of G-Log / 2.5:
Formulae for G-Log Rules / 2.5.1:
Concrete Graphs as Models / 2.5.2:
Model Theoretic Semantics / 2.5.3:
Relationship with the Original G-Log Semantics / 2.6:
G-Log Graphs with Negation / 2.7:
Computational Issues / 2.8:
Other Languages for Semistructured Data / 2.9:
UnQL / 2.9.1:
GraphLog / 2.9.2:
Model-Checking Based Data Retrieval / 3:
An Introduction to Model-Checking / 3.1:
Transition Systems and CTL / 3.1.1:
A Linear Time Algorithm to Solve the Model-Checking Problem / 3.1.2:
Syntax of the Query Language W / 3.2:
W-Instances as KTS / 3.3:
CTL-Based Semantics of W-Queries / 3.4:
Technique Overview / 3.4.1:
Admitted Queries / 3.4.2:
Query Translation / 3.4.3:
Acyclic Graphs / 3.4.4:
Cyclic Queries / 3.4.5:
Complexity Issues / 3.5:
Implementation of the Method / 3.6:
Applications to Existing Languages / 3.7:
G-Log / 3.7.1:
Expressive Power of Temporal Logics / 3.8:
Temporal Aspects of Semistructured Data / 4:
An Introduction to Temporal Databases / 4.1:
A Graphical Temporal Data Model for Semistructured Data / 4.2:
Operations on Temporal Data / 4.3:
TSS-QL: Temporal Semistructured Query Language / 4.4:
Grammar of TSS-QL / 4.4.1:
Some Examples of TSS-QL Queries / 4.4.2:
A Graphical Model for User Navigation History / 4.5:
Analyzing User History Navigation / 4.5.1:
Using the Query Language TSS-QL to Obtain Relevance Information / 4.6:
Semistructured Temporal Graph as a KTS / 4.6.1:
Complexity Results on TSS-QL Fragments / 4.6.2:
Related Works / 5:
Semantics Aspects of Query Languages / 5.1:
Efficient Query Retrieval / 5.2:
Temporal Models and Query Languages for Semistructured Data / 5.3:
Comparison with the DOEM Model / 5.3.1:
Conclusion / 6:
References
Introduction / 1:
Motivations / 1.1:
Overview of the Book / 1.2:
95.

図書

図書
Larry L. Peterson & Bruce S. Davie
出版情報: San Francisco, Calif. : Morgan Kaufmann Publishers, c2000  xxvi, 748 p. ; 25 cm
シリーズ名: The Morgan Kaufmann series in networking
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Foreword to the First Edition
Preface / Chapter 1:
Foundation
Direct Link Networks / 1:
Problem: Building a Network / Chapter 3:
Packet Switching
Internetworking / 1.1:
Applications
End-to-End Protocols / Chapter 5:
Requirements / Chapter 6:
Congestion Control & Resource Allocation
End-to-end Data / 1.2.1:
Connectivity
Security / Chapter 8:
Cost-Effective Resource Sharing / Chapter 9:
Support for Common Services / 1.2.3:
Network Architecture / 1.3:
Layering and Protocols / 1.3.1:
OSI Architecture / 1.3.2:
Internet Architecture / 1.3.3:
Implementing Network Software / 1.4:
Application Programming Interface (Sockets) / 1.4.1:
Example Application / 1.4.2:
Protocol Implementation Issues / 1.4.3:
Performance / 1.5:
Bandwidth and Latency / 1.5.1:
Delay x Bandwidth Product / 1.5.2:
High-Speed Networks / 1.5.3:
Application Performance Needs / 1.5.4:
Summary / 1.6:
Open Issue: Ubiquitous Networking
Further Reading
Exercises
Problem: Physically Connecting Hosts / 2:
Hardware Building Blocks / 2.1:
Nodes / 2.1.1:
Links / 2.1.2:
Encoding (NRZ, NRZI, Manchester, 4B/5B) / 2.2:
Framing / 2.3:
Byte-Oriented Protocols (BISYNC, PPP, DDCMP) / 2.3.1:
Bit-Oriented Protocols (HDLC) / 2.3.2:
Clock-Based Framing (SONET) / 2.3.3:
Error Detection / 2.4:
Two-Dimensional Parity / 2.4.1:
Internet Checksum Algorithm / 2.4.2:
Cyclic Redundancy Check / 2.4.3:
Reliable Transmission / 2.5:
Stop-and-Wait / 2.5.1:
Sliding Window / 2.5.2:
Concurrent Logical Channels / 2.5.3:
Ethernet (802.3) / 2.6:
Physical Properties / 2.6.1:
Access Protocol / 2.6.2:
Experience with Ethernet / 2.6.3:
Token Rings (802.5, FDDI) / 2.7:
Token Ring Media Access Control / 2.7.1:
Token Ring Maintenance / 2.7.3:
Frame Format / 2.7.4:
FDDI / 2.7.5:
Wireless (802.11) / 2.8:
Collision Avoidance / 2.8.1:
Distribution System / 2.8.3:
Network Adaptors / 2.8.4:
Components / 2.9.1:
View from the Host / 2.9.2:
Memory Bottleneck / 2.9.3:
Open Issue: Does It Belong in Hardware? / 2.10:
Problem: Not All Networks Are Directly Connected / 3:
Switching and Forwarding / 3.1:
Datagrams / 3.1.1:
Virtual Circuit Switching / 3.1.2:
Source Routing / 3.1.3:
Bridges and LAN Switches / 3.2:
Learning Bridges / 3.2.1:
Spanning Tree Algorithm / 3.2.2:
Broadcast and Multicast / 3.2.3:
Limitations of Bridges / 3.2.4:
Cell Switching (ATM) / 3.3:
Cells / 3.3.1:
Segmentation and Reassembly / 3.3.2:
Virtual Paths / 3.3.3:
Physical Layers for ATM / 3.3.4:
ATM in the LAN / 3.3.5:
Implementation and Performance / 3.4:
Ports / 3.4.1:
Fabrics / 3.4.2:
Open Issue: The Future of ATM / 3.5:
Problem: There Is More Than One Network / 4:
Simple Internetworking (IP) / 4.1:
What Is an Internetwork? / 4.1.1:
Service Model / 4.1.2:
Global Addresses / 4.1.3:
Datagram Forwarding in IP / 4.1.4:
Address Translation (ARP) / 4.1.5:
Host Configuration (DHCP) / 4.1.6:
Error Reporting (ICMP) / 4.1.7:
Virtual Networks and Tunnels / 4.1.8:
Routing / 4.2:
Network as a Graph / 4.2.1:
Distance Vector (RIP) / 4.2.2:
Link State (OSPF) / 4.2.3:
Metrics / 4.2.4:
Routing for Mobile Hosts / 4.2.5:
Global Internet / 4.3:
Subnetting / 4.3.1:
Classless Routing (CIDR) / 4.3.2:
Interdomain Routing (BGP) / 4.3.3:
Routing Areas / 4.3.4:
IP Version 6 (IPv6) / 4.3.5:
Multicast / 4.4:
Link-State Multicast / 4.4.1:
Distance-Vector Multicast / 4.4.2:
Protocol Independent Multicast (PIM) / 4.4.3:
Multiprotocol Label Switching (MPLS) / 4.5:
Destination-Based Forwarding / 4.5.1:
Explicit Routing / 4.5.2:
Virtual Private Networks and Tunnels / 4.5.3:
Open Issue: Deployment of IPV6 / 4.6:
Problem: Getting Processess to Communicate / 5:
Simple Demultiplexer (UDP) / 5.1:
Reliable Byte Stream (TCP) / 5.2:
End-to-End Issues / 5.2.1:
Segment Format / 5.2.2:
Connection Establishment and Termination / 5.2.3:
Sliding Window Revisited / 5.2.4:
Triggering Transmission / 5.2.5:
Adaptive Retransmission / 5.2.6:
Record Boundaries / 5.2.7:
TCP Extensions / 5.2.8:
Alternative Design Choices / 5.2.9:
Remote Procedure Call / 5.3:
Bulk Transfer (BLAST) / 5.3.1:
Request/Reply (CHAN) / 5.3.2:
Dispatcher (SELECT) / 5.3.3:
Putting It All Together (SunRPC, DCE) / 5.3.4:
Open Issue: Application-Specific Protocols / 5.4:
Congestion Control and Resource Allocation / 6:
Problem: Allocating Resources
Issues in Resource Allocation / 6.1:
Network Model / 6.1.1:
Taxonomy / 6.1.2:
Evaluation Criteria / 6.1.3:
Queuing Disciplines / 6.2:
FIFO / 6.2.1:
Fair Queuing / 6.2.2:
TCP Congestion Control / 6.3:
Additive Increase/Multiplicative Decrease / 6.3.1:
Slow Start / 6.3.2:
Fast Retransmit and Fast Recovery / 6.3.3:
Congestion-Avoidance Mechanisms / 6.4:
DECbit / 6.4.1:
Random Early Detection (RED) / 6.4.2:
Source-Based Congestion Avoidance / 6.4.3:
Quality of Service / 6.5:
Application Requirements / 6.5.1:
Integrated Services (RSVP) / 6.5.2:
Differentiated Services (EF, AF) / 6.5.3:
ATM Quality of Service / 6.5.4:
Equation-Based Congestion Control / 6.5.5:
Open Issue: Inside versus Outside the Network / 6.6:
End-to-End Data / 7:
Problem: What Do We Do with the Data?
Presentation Formatting / 7.1:
Examples (XDR, ASN. 1, NDR) / 7.1.1:
Markup Languages (XML) / 7.1.3:
Data Compression / 7.2:
Lossless Compression Algorithms / 7.2.1:
Image Compression (JPEG) / 7.2.2:
Video Compression (MPEG) / 7.2.3:
Transmitting MPEG over a Network / 7.2.4:
Audio Compression (MP3) / 7.2.5:
Open Issue: Computer Networks Meet Consumer Electronics / 7.3:
Network Security / 8:
Problem: Securing the Data
Cryptographic Algorithms / 8.1:
Secret Key Encryption (DES) / 8.1.1:
Public Key Encryption (RSA) / 8.1.3:
Message Digest Algorithms (MD5) / 8.1.4:
Security Mechanisms / 8.1.5:
Authentication Protocols / 8.2.1:
Message Integrity Protocols / 8.2.2:
Public Key Distribution (X.509) / 8.2.3:
Example Systems / 8.3:
Pretty Good Privacy (PGP) / 8.3.1:
Secure Shell (SSH) / 8.3.2:
Transport Layer Security (TLS, SSL, HTTPS) / 8.3.3:
IP Security (IPSEC) / 8.3.4:
Firewalls / 8.4:
Filter-Based Firewalls / 8.4.1:
Proxy-Based Firewalls / 8.4.2:
Limitations / 8.4.3:
Open Issue: Denial-of-Service Attacks / 8.5:
Problem: Applications Need Their Own Protocols / 9:
Name Service (DNS) / 9.1:
Domain Hierarchy / 9.1.1:
Name Servers / 9.1.2:
Name Resolution / 9.1.3:
Traditional Applications / 9.2:
Electronic Mail (SMTP, MIME, IMAP) / 9.2.1:
World Wide Web (HTTP) / 9.2.2:
Network Management (SNMP) / 9.2.3:
Multimedia Applications / 9.3:
Real-time Transport Protocol (RTP) / 9.3.1:
Session Control and Call Control (SDP, SIP, H.323) / 9.3.2:
Overlay Networks / 9.4:
Routing Overlays / 9.4.1:
Peer-to-Peer Networks / 9.4.2:
Content Distribution Networks / 9.4.3:
Open Issue: New Network Artichitecture / 9.5:
Glossary
Bibliography
Solutions to Selected Exercises
Index
About the Authors
Foreword
Foreword to the First Edition
Preface / Chapter 1:
96.

図書

図書
Gary E. Bowman
出版情報: Oxford : Oxford University Press, 2008  xi, 208 p. ; 24 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction: Three Worlds / 1:
Worlds 1 and 2 / 1.1:
World 3 / 1.2:
Problems / 1.3:
The Quantum Postulates / 2:
Postulate 1: The Quantum State / 2.1:
Postulate 2: Observables, Operators, and Eigenstates / 2.2:
Postulate 3: Quantum Superpositions / 2.3:
Discrete Eigenvalues / 2.3.1:
Continuous Eigenvalues / 2.3.2:
Closing Comments / 2.4:
What Is a Quantum State? / 2.5:
Probabilities, Averages, and Uncertainties / 3.1:
Probabilities / 3.1.1:
Averages / 3.1.2:
Uncertainties / 3.1.3:
The Statistical Interpretation / 3.2:
Bohr, Einstein, and Hidden Variables / 3.3:
Background / 3.3.1:
Fundamental Issues / 3.3.2:
Einstein Revisited / 3.3.3:
The Structure of Quantum States / 3.4:
Mathematical Preliminaries / 4.1:
Vector Spaces / 4.1.1:
Function Spaces / 4.1.2:
Dirac's Bra-ket Notation / 4.2:
Bras and Kets / 4.2.1:
Labeling States / 4.2.2:
The Scalar Product / 4.3:
Quantum Scalar Products / 4.3.1:
Discussion / 4.3.2:
Representations / 4.4:
Basics / 4.4.1:
Superpositions and Representations / 4.4.2:
Representational Freedom / 4.4.3:
Operators / 4.5:
Introductory Comments / 5.1:
Hermitian Operators / 5.2:
Adjoint Operators / 5.2.1:
Hermitian Operators: Definition and Properties / 5.2.2:
Wavefunctions and Hermitian Operators / 5.2.3:
Projection and Identity Operators / 5.3:
Projection Operators / 5.3.1:
The Identity Operator / 5.3.2:
Unitary Operators / 5.4:
Matrix Mechanics / 5.5:
Elementary Matrix Operations / 6.1:
Vectors and Scalar Products / 6.1.1:
Matrices and Matrix Multiplication / 6.1.2:
Vector Transformations / 6.1.3:
States as Vectors / 6.2:
Operators as Matrices / 6.3:
An Operator in Its Eigenbasis / 6.3.1:
Matrix Elements and Alternative Bases / 6.3.2:
Change of Basis / 6.3.3:
Adjoint, Hermitian, and Unitary Operators / 6.3.4:
Eigenvalue Equations / 6.4:
Commutators and Uncertainty Relations / 6.5:
The Commutator / 7.1:
Definition and Characteristics / 7.1.1:
Commutators in Matrix Mechanics / 7.1.2:
The Uncertainty Relations / 7.2:
Uncertainty Products / 7.2.1:
General Form of the Uncertainty Relations / 7.2.2:
Interpretations / 7.2.3:
Reflections / 7.2.4:
Angular Momentum / 7.3:
Angular Momentum in Classical Mechanics / 8.1:
Basics of Quantum Angular Momentum / 8.2:
Operators and Commutation Relations / 8.2.1:
Eigenstates and Eigenvalues / 8.2.2:
Raising and Lowering Operators / 8.2.3:
Physical Interpretation / 8.3:
Measurements / 8.3.1:
Relating L[superscript 2] and L[subscript z] / 8.3.2:
Orbital and Spin Angular Momentum / 8.4:
Orbital Angular Momentum / 8.4.1:
Spin Angular Momentum / 8.4.2:
Review / 8.5:
The Time-Independent Schrodinger Equation / 8.6:
An Eigenvalue Equation for Energy / 9.1:
Using the Schrodinger Equation / 9.2:
Conditions on Wavefunctions / 9.2.1:
An Example: the Infinite Potential Well / 9.2.2:
Interpretation / 9.3:
Energy Eigenstates in Position Space / 9.3.1:
Overall and Relative Phases / 9.3.2:
Potential Barriers and Tunneling / 9.4:
The Step Potential / 9.4.1:
The Step Potential and Scattering / 9.4.2:
Tunneling / 9.4.3:
What's Wrong with This Picture? / 9.5:
Why Is the State Complex? / 9.6:
Complex Numbers / 10.1:
Polar Form / 10.1.1:
Argand Diagrams and the Role of the Phase / 10.1.3:
The Phase in Quantum Mechanics / 10.2:
Phases and the Description of States / 10.2.1:
Phase Changes and Probabilities / 10.2.2:
Unitary Operators Revisited / 10.2.3:
Unitary Operators, Phases, and Probabilities / 10.2.4:
Example: A Spin 1/2 System / 10.2.5:
Wavefunctions / 10.3:
Time Evolution / 10.4:
The Time-Dependent Schrodinger Equation / 11.1:
How Time Evolution Works / 11.2:
Time Evolving a Quantum State / 11.2.1:
Unitarity and Phases Revisited / 11.2.2:
Expectation Values / 11.3:
Time Derivatives / 11.3.1:
Constants of the Motion / 11.3.2:
Energy-Time Uncertainty Relations / 11.4:
Conceptual Basis / 11.4.1:
Spin 1/2: An Example / 11.4.2:
What is a Wavefunction? / 11.5:
Eigenstates and Coefficients / 12.1.1:
Representations and Operators / 12.1.2:
Changing Representations / 12.2:
Change of Basis Revisited / 12.2.1:
From x to p and Back Again / 12.2.2:
Gaussians and Beyond / 12.2.3:
Phases and Time Evolution / 12.3:
Free Particle Evolution / 12.3.1:
Wavepackets / 12.3.2:
Bra-ket Notation / 12.4:
Quantum States / 12.4.1:
Eigenstates and Transformations / 12.4.2:
Epilogue / 12.5:
Mathematical Concepts / 12.6:
Complex Numbers and Functions / A.1:
Differentiation / A.2:
Integration / A.3:
Differential Equations / A.4:
Quantum Measurement / B:
The Harmonic Oscillator / C:
Energy Eigenstates and Eigenvalues / C.1:
The Number Operator and its Cousins / C.2:
Photons as Oscillators / C.3:
Unitary Transformations / D:
Finite Transformations and Generators / D.1:
Continuous Symmetries / D.3:
Symmetry Transformations / D.3.1:
Symmetries of Physical Law / D.3.2:
System Symmetries / D.3.3:
Bibliography
Index
Preface
Introduction: Three Worlds / 1:
Worlds 1 and 2 / 1.1:
97.

図書

図書
Boris Mirkin
出版情報: Boca Raton, Fla. : Chapman & Hall/CRC, Taylor & Francis, 2005  xxiii, 266 p. ; 25 cm
シリーズ名: Series in computer science and data analysis ; v. 3
所蔵情報: loading…
目次情報: 続きを見る
Preface
List of Denotations
Introduction: Historical Remarks
What Is Clustering / 1:
Base words
Exemplary problems / 1.1:
Structuring / 1.1.1:
Description / 1.1.2:
Association / 1.1.3:
Generalization / 1.1.4:
Visualization of data structure / 1.1.5:
Bird's-eye view / 1.2:
Definition: data and cluster structure / 1.2.1:
Criteria for revealing a cluster structure / 1.2.2:
Three types of cluster description / 1.2.3:
Stages of a clustering application / 1.2.4:
Clustering and other disciplines / 1.2.5:
Different perspectives of clustering / 1.2.6:
What Is Data / 2:
Feature characteristics / 2.1:
Feature scale types / 2.1.1:
Quantitative case / 2.1.2:
Categorical case / 2.1.3:
Bivariate analysis / 2.2:
Two quantitative variables / 2.2.1:
Nominal and quantitative variables / 2.2.2:
Two nominal variables cross-classified / 2.2.3:
Relation between correlation and contingency / 2.2.4:
Meaning of correlation / 2.2.5:
Feature space and data scatter / 2.3:
Data matrix / 2.3.1:
Feature space: distance and inner product / 2.3.2:
Data scatter / 2.3.3:
Pre-processing and standardizing mixed data / 2.4:
Other table data types / 2.5:
Dissimilarity and similarity data / 2.5.1:
Contingency and flow data / 2.5.2:
K-Means Clustering / 3:
Conventional K-Means / 3.1:
Straight K-Means / 3.1.1:
Square error criterion / 3.1.2:
Incremental versions of K-Means / 3.1.3:
Initialization of K-Means / 3.2:
Traditional approaches to initial setting / 3.2.1:
MaxMin for producing deviate centroids / 3.2.2:
Deviate centroids with Anomalous pattern / 3.2.3:
Intelligent K-Means / 3.3:
Iterated Anomalous pattern for iK-Means / 3.3.1:
Cross validation of iK-Means results / 3.3.2:
Interpretation aids / 3.4:
Conventional interpretation aids / 3.4.1:
Contribution and relative contribution tables / 3.4.2:
Cluster representatives / 3.4.3:
Measures of association from ScaD tables / 3.4.4:
Overall assessment / 3.5:
Ward Hierarchical Clustering / 4:
Agglomeration: Ward algorithm / 4.1:
Divisive clustering with Ward criterion / 4.2:
2-Means splitting / 4.2.1:
Splitting by separating / 4.2.2:
Interpretation aids for upper cluster hierarchies / 4.2.3:
Conceptual clustering / 4.3:
Extensions of Ward clustering / 4.4:
Agglomerative clustering with dissimilarity data / 4.4.1:
Hierarchical clustering for contingency and flow data / 4.4.2:
Data Recovery Models / 4.5:
Statistics modeling as data recovery / 5.1:
Averaging / 5.1.1:
Linear regression / 5.1.2:
Principal component analysis / 5.1.3:
Correspondence factor analysis / 5.1.4:
Data recovery model for K-Means / 5.2:
Equation and data scatter decomposition / 5.2.1:
Contributions of clusters, features, and individual entities / 5.2.2:
Correlation ratio as contribution / 5.2.3:
Partition contingency coefficients / 5.2.4:
Data recovery models for Ward criterion / 5.3:
Data recovery models with cluster hierarchies / 5.3.1:
Covariances, variances and data scatter decomposed / 5.3.2:
Direct proof of the equivalence between 2-Means and Ward criteria / 5.3.3:
Gower's controversy / 5.3.4:
Extensions to other data types / 5.4:
Similarity and attraction measures compatible with K-Means and Ward criteria / 5.4.1:
Application to binary data / 5.4.2:
Agglomeration and aggregation of contingency data / 5.4.3:
Extension to multiple data / 5.4.4:
One-by-one clustering / 5.5:
PCA and data recovery clustering / 5.5.1:
Divisive Ward-like clustering / 5.5.2:
Iterated Anomalous pattern / 5.5.3:
Anomalous pattern versus Splitting / 5.5.4:
One-by-one clusters for similarity data / 5.5.5:
Different Clustering Approaches / 5.6:
Extensions of K-Means clustering / 6.1:
Clustering criteria and implementation / 6.1.1:
Partitioning around medoids PAM / 6.1.2:
Fuzzy clustering / 6.1.3:
Regression-wise clustering / 6.1.4:
Mixture of distributions and EM algorithm / 6.1.5:
Kohonen self-organizing maps SOM / 6.1.6:
Graph-theoretic approaches / 6.2:
Single linkage, minimum spanning tree and connected components / 6.2.1:
Finding a core / 6.2.2:
Conceptual description of clusters / 6.3:
False positives and negatives / 6.3.1:
Conceptually describing a partition / 6.3.2:
Describing a cluster with production rules / 6.3.3:
Comprehensive conjunctive description of a cluster / 6.3.4:
General Issues / 6.4:
Feature selection and extraction / 7.1:
A review / 7.1.1:
Comprehensive description as a feature selector / 7.1.2:
Comprehensive description as a feature extractor / 7.1.3:
Data pre-processing and standardization / 7.2:
Dis/similarity between entities / 7.2.1:
Pre-processing feature based data / 7.2.2:
Data standardization / 7.2.3:
Similarity on subsets and partitions / 7.3:
Dis/similarity between binary entities or subsets / 7.3.1:
Dis/similarity between partitions / 7.3.2:
Dealing with missing data / 7.4:
Imputation as part of pre-processing / 7.4.1:
Conditional mean / 7.4.2:
Maximum likelihood / 7.4.3:
Least-squares approximation / 7.4.4:
Validity and reliability / 7.5:
Index based validation / 7.5.1:
Resampling for validation and selection / 7.5.2:
Model selection with resampling / 7.5.3:
Conclusion: Data Recovery Approach in Clustering / 7.6:
Bibliography
Index
Preface
List of Denotations
Introduction: Historical Remarks
98.

図書

図書
Ubbo Visser
出版情報: Berlin : Springer, c2004  xiv, 150 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3159 . Lecture notes in artificial intelligence
所蔵情報: loading…
目次情報: 続きを見る
Introduction and Related Work / Part I:
Introduction / 1:
Semantic Web Vision / 1.1:
Research Topics / 1.2:
Search on the Web / 1.3:
Integration Tasks / 1.4:
Organization / 1.5:
Related Work / 2:
Approaches for Terminological Representation and Reasoning / 2.1:
The Role of Ontologies / 2.1.1:
Use of Mappings / 2.1.2:
Approaches for Spatial Representation and Reasoning / 2.2:
Spatial Representation / 2.2.1:
Spatial Reasoning / 2.2.2:
More Approaches / 2.2.3:
Approaches for Temporal Representation and Reasoning / 2.3:
Temporal Theories Based on Time Points / 2.3.1:
Temporal Theories Based on Intervals / 2.3.2:
Summary of Recent Approaches / 2.3.3:
Evaluation of Approaches / 2.4:
Terminological Approaches / 2.4.1:
Spatial Approaches / 2.4.2:
Temporal Approaches / 2.4.3:
The Buster Approach for Terminological, Spatial, and Temporal Representation and Reasoning / Part II:
General Approach of Buster / 3:
Requirements / 3.1:
Conceptual Architecture / 3.2:
Query Phase / 3.2.1:
Acquisition Phase / 3.2.2:
Comprehensive Source Description / 3.3:
The Dublin Core Elements / 3.3.1:
Additional Element Descriptions / 3.3.2:
Background Models / 3.3.3:
Example / 3.3.4:
Relevance / 3.4:
Terminological Representation and Reasoning, Semantic Translation / 4:
Representation / 4.1:
Reasoning / 4.1.2:
Integration/Translation on the Data Level / 4.1.3:
Representation and Reasoning Components / 4.2:
Ontologies / 4.2.1:
Description Logics / 4.2.2:
Reasoning Components / 4.2.3:
Semantic Translation / 4.3:
Context Transformation by Rules / 4.3.1:
Context Transformation by Re-classification / 4.3.2:
Example: Translation ATKIS-CORINE Land Cover / 4.4:
Spatial Representation and Reasoning / 5:
Intuitive Spatial Labeling / 5.1:
Place Names, Gazetteers and Footprints / 5.1.2:
Place Name Structures / 5.1.3:
Spatial Relevance / 5.1.4:
Polygonal Tessellation / 5.1.5:
Place Names / 5.2.2:
Spatial Relevance Reasoning / 5.2.3:
Temporal Representation and Reasoning / 5.4:
Intuitive Labeling / 6.1:
Time Interval Boundaries / 6.1.2:
Structures / 6.1.3:
Explicit Qualitative Relations / 6.1.4:
Period Names / 6.2:
Boundaries / 6.2.3:
Relations / 6.2.4:
Temporal Relevance / 6.3:
Distance Between Time Intervals / 6.3.1:
Overlapping of Time Periods / 6.3.2:
Relations Between Boundaries / 6.4:
Relations Between Two Time Periods / 6.4.2:
Relations Between More Than Two Time Periods / 6.4.3:
Qualitative Statements / 6.5:
Quantitative Statements / 6.5.2:
Inconsistencies (Quantitative/Qualitative) / 6.5.3:
Inconsistencies (Reasoner Implicit/Qualitative) / 6.5.4:
Inconsistencies (Qualitative/Quantitative) / 6.5.5:
Implementation, Conclusion, and Future Work / Part III:
Implementation Issues and System Demonstration / 7:
Architecture / 7.1:
Single Queries / 7.2:
Terminological Queries / 7.2.1:
Spatial Queries / 7.2.2:
Temporal Queries / 7.2.3:
Combined Queries / 7.3:
Spatio-terminological Queries / 7.3.1:
Temporal-Terminological Queries / 7.3.2:
Spatio-temporal-terminological Queries / 7.3.3:
Conclusion and Future Work / 8:
Conclusion / 8.1:
Semantic Web / 8.1.1:
BUSTER Approach and System / 8.1.2:
Future Work / 8.2:
Terminological Part / 8.2.1:
Spatial Part / 8.2.2:
Temporal Part / 8.2.3:
References
Introduction and Related Work / Part I:
Introduction / 1:
Semantic Web Vision / 1.1:
99.

電子ブック

EB
Aaron R. Bradley, Zohar Manna
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Foundations / Part I:
Propositional Logic / 1:
Syntax / 1.1:
Semantics / 1.2:
Satisfiability and Validity / 1.3:
Truth Tables / 1.3.1:
Semantic Arguments / 1.3.2:
Equivalence and Implication / 1.4:
Substitution / 1.5:
Normal Forms / 1.6:
Decision Procedures for Satisfiability / 1.7:
Simple Decision Procedures / 1.7.1:
Reconsidering the Truth-Table Method / 1.7.2:
Conversion to an Equisatisfiable Formula in CNF / 1.7.3:
The Resolution Procedure / 1.7.4:
DPLL / 1.7.5:
Summary / 1.8:
Bibliographic Remarks
Exercises
First-Order Logic / 2:
Safe Substitution / 2.1:
Schema Substitution / 2.4.2:
Decidability and Complexity / 2.5:
Satisfiability as a Formal Language / 2.6.1:
Decidability / 2.6.2:
Complexity / 2.6.3:
Meta-Theorems of First-Order Logic / 2.7:
Simplifying the Language of FOL / 2.7.1:
Semantic Argument Proof Rules / 2.7.2:
Soundness and Completeness / 2.7.3:
Additional Theorems / 2.7.4:
First-Order Theories / 2.8:
Equality / 3.1:
Natural Numbers and Integers / 3.3:
Peano Arithmetic / 3.3.1:
Presburger Arithmetic / 3.3.2:
Theory of Integers / 3.3.3:
Rationals and Reals / 3.4:
Theory of Reals / 3.4.1:
Theory of Rationals / 3.4.2:
Recursive Data Structures / 3.5:
Arrays / 3.6:
Survey of Decidability and Complexity / 3.7:
Combination Theories / 3.8:
Induction / 3.9:
Stepwise Induction / 4.1:
Complete Induction / 4.2:
Well-Founded Induction / 4.3:
Structural Induction / 4.4:
Program Correctness: Mechanics / 4.5:
pi: A Simple Imperative Language / 5.1:
The Language / 5.1.1:
Program Annotations / 5.1.2:
Partial Correctness / 5.2:
Basic Paths: Loops / 5.2.1:
Basic Paths: Function Calls / 5.2.2:
Program States / 5.2.3:
Verification Conditions / 5.2.4:
P-Invariant and P-Inductive / 5.2.5:
Total Correctness / 5.3:
Program Correctness: Strategies / 5.4:
Developing Inductive Annotations / 6.1:
Basic Facts / 6.1.1:
The Precondition Method / 6.1.2:
A Strategy / 6.1.3:
Extended Example: QuickSort / 6.2:
Algorithmic Reasoning / 6.2.1:
Quantified Linear Arithmetic / 7:
Quantifier Elimination / 7.1:
A Simplification / 7.1.1:
Quantifier Elimination over Integers / 7.2:
Augmented Theory of Integers / 7.2.1:
Cooper's Method / 7.2.2:
A Symmetric Elimination / 7.2.3:
Eliminating Blocks of Quantifiers / 7.2.4:
Solving Divides Constraints / 7.2.5:
Quantifier Elimination over Rationals / 7.3:
Ferrante and Rackoff's Method / 7.3.1:
Quantifier-Free Linear Arithmetic / 7.4:
Decision Procedures for Quantifier-Free Fragments / 8.1:
Preliminary Concepts and Notation / 8.2:
Linear Programs / 8.3:
The Simplex Method / 8.4:
From M to M[subscript 0] / 8.4.1:
Vertex Traversal / 8.4.2:
Quantifier-Free Equality and Data Structures / 8.4.3:
Theory of Equality / 9.1:
Congruence Closure Algorithm / 9.2:
Relations / 9.2.1:
Congruence Closure with DAGs / 9.2.2:
Directed Acyclic Graphs / 9.3.1:
Basic Operations / 9.3.2:
Decision Procedure for T[subscript E]-Satisfiability / 9.3.3:
Combining Decision Procedures / 9.3.5:
Nelson-Oppen Method: Nondeterministic Version / 10.1:
Phase 1: Variable Abstraction / 10.2.1:
Phase 2: Guess and Check / 10.2.2:
Practical Efficiency / 10.2.3:
Nelson-Oppen Method: Deterministic Version / 10.3:
Convex Theories / 10.3.1:
Phase 2: Equality Propagation / 10.3.2:
Equality Propagation: Implementation / 10.3.3:
Correctness of the Nelson-Oppen Method / 10.4:
Arrays with Uninterpreted Indices / 10.5:
Array Property Fragment / 11.1.1:
Decision Procedure / 11.1.2:
Integer-Indexed Arrays / 11.2:
Hashtables / 11.2.1:
Hashtable Property Fragment / 11.3.1:
Larger Fragments / 11.3.2:
Invariant Generation / 11.5:
Weakest Precondition and Strongest Postcondition / 12.1:
General Definitions of wp and sp / 12.1.2:
Static Analysis / 12.1.3:
Abstraction / 12.1.4:
Interval Analysis / 12.2:
Karr's Analysis / 12.3:
Standard Notation and Concepts / 12.4:
Further Reading / 12.5:
References
Index
Foundations / Part I:
Propositional Logic / 1:
Syntax / 1.1:
100.

電子ブック

EB
出版情報: ASME Digital Collection Conference Proceedings , ASME, 2008
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼