close
1.

図書

図書
Maxim Ryadnov
出版情報: Cambridge : RSC Publishing, c2009  ix, 238 p. ; 24 cm
シリーズ名: RSC nanoscience & nanotechnology ; no.7
所蔵情報: loading…
目次情報: 続きを見る
Introductory Notes / Chapter 1:
Inspiring Hierarchical / 1.1:
Encoding Instructive / 1.2:
Starting Lowest / 1.3:
Picturing Biological / 1.4:
References
Recycling Hereditary / Chapter 2:
Coding Dual / 2.1:
Deoxyribonucleic / 2.1.1:
Building up in Two / 2.1.1.1:
Keeping in Shape / 2.1.1.2:
Priming Topological / 2.1.2:
Resequencing Basic / 2.1.2.1:
Choosing the Fittest / 2.1.2.1.1:
Evolving Diverse / 2.1.2.1.2:
Primary Motifs / 2.1.2.2:
Gluing Universal / 2.1.2.2.1:
Alienating Axial / 2.1.2.2.2:
Fixing Spatial / 2.2:
Hinting Geometric: Secondary Motifs / 2.2.1:
Crossing Double / 2.2.1.1:
Reporting Visible / 2.2.1.1.1:
Translating Symmetrical / 2.2.1.1.2:
Extending Cohesive / 2.2.1.2:
Sharing Mutual / 2.2.1.2.1:
Multiplying Traversal / 2.2.1.2.2:
Tiling Square / 2.2.1.2.3:
Scaffolding Algorithmic / 2.3:
Pursuing Autonomous / 2.3.1:
Lengthening to Shorten / 2.3.1.1:
Gathering to Limit / 2.3.1.2:
Assigning Arbitrary / 2.3.2:
Synchronising Local / 2.3.2.1:
Prescribing General / 2.3.2.2:
Adding up to Third / 2.3.3:
Wrapping to Shut / 2.3.3.1:
Framing to Classify / 2.3.3.2:
Outlook / 2.4:
Recaging Within / Chapter 3:
Enclosing to Deliver / 3.1:
Transporting Foreign / 3.1.1:
Fitting Flat and Straight / 3.1.1.1:
Spiralling Along / 3.1.1.2:
Packing Out and In / 3.1.2:
Spooling Around / 3.1.2.1:
Tunnelling Through
Escaping Walled / 3.1.3:
Capturing On and Off / 3.1.3.1:
Storing Exchangeable / 3.1.3.2:
Reacting Nano / 3.2:
Clustering Spherical / 3.2.1:
Contriving Consistent / 3.2.1.1:
Scaling Hosting / 3.2.1.2:
Following Linear / 3.2.2:
Channelling Inner
Converting Outer
Repairing from Inside / 3.3:
Uninviting Levy / 3.3.1:
Necessitating Exterior / 3.3.2:
Antagonising Dressing / 3.3.2.1:
Renting Occasional / 3.3.2.1.2:
Phasing West / 3.3.2.2:
Facing Concentric / 3.3.2.2.1:
Encircling Between / 3.3.2.2.2:
Singling Out Unique / 3.3.2.2.3:
Sharing the Balance / 3.3.3:
Driving Symmetrical / 3.3.3.1:
Sealing Annular / 3.3.3.2:
Reassembling Multiple / 3.4:
Keeping All in Touch / 4.1:
Unravelling the Essential / 4.1.1:
Winding Three in One / 4.1.1.1:
Aligning Stagger / 4.1.1.2:
Tapering Polar / 4.1.1.3:
Branching and Stretching / 4.1.1.4:
Replicating Apparent / 4.1.2:
Scraping Refusal / 4.1.2.1:
Tempting Compatible / 4.1.2.2:
Likening Synthetic / 4.1.2.3:
Recovering Intelligent / 4.1.2.4:
Restoring Available / 4.2:
Prompting Longitudinal / 4.2.1:
Invoking Granted / 4.2.1.1:
Reposing Modular / 4.3:
Displacing Coil / 4.3.1:
Settling Lateral / 4.3.2:
Bundling Exclusive / 4.3.2.1:
Permitting Distinctive / 4.3.2.2:
Inviting Captive / 4.3.2.3:
Clearing Limiting / 4.3.3:
Equilibrating Transitional / 4.3.3.1:
Extracting Minimal / 4.3.3.2:
Gambling Beyond / 4.4:
Guiding Proliferative / 4.4.1:
Feeding Proximate / 4.4.1.1:
Rooting Renewal / 4.4.1.2:
Accepting Inescapable / 4.4.2:
Patterning Positional / 4.4.2.1:
Relating Interfacial / 4.4.2.2:
Grafting Integral / 4.4.2.3:
Concluding Remarks / 4.5:
Learning Fluent / 5.1:
Parsing Semantic / 5.2:
Drawing Pragmatic / 5.3:
Revealing Contributory / Chapter 6:
Subject Index
Introductory Notes / Chapter 1:
Inspiring Hierarchical / 1.1:
Encoding Instructive / 1.2:
2.

図書

図書
Karl Pfleger, Hans H. Maurer, Armin Weber
出版情報: Weinheim : Wiley-VCH, c2007  2 v. ; 29 cm
所蔵情報: loading…
目次情報: 続きを見る
(Methods, Tables) / Volume 1:
Methods
Introduction / 1:
Experimental Section / 2:
Origin and choice of samples / 2.1:
Sample preparation / 2.2:
Standard extraction procedures / 2.2.1:
Standard liquid-liquid extraction (LLE) for plasma, urine or gastric contents (P, U, G) / 2.2.1.1:
STA procedure (hydrolysis, extraction and microwave-assisted acetylation) for urine (U+UHYAC) / 2.2.1.2:
Extraction of urine after cleavage of conjugates by glucuronidase and arylsulfatase (UGLUC) / 2.2.1.3:
Extractive methylation procedure for urine or plasma (UME, PME) / 2.2.1.4:
Solid-phase extraction for plasma or urine (PSPE, USPE) / 2.2.1.5:
LLE of plasma for determination of drugs for brain death diagnosis / 2.2.1.6:
Extraction of ethylene glycol and other glycols from plasma or urine followed by microwave-assisted pivalylation (PEGPIV or UEGPIV) / 2.2.1.7:
Derivatization procedures / 2.2.2:
Acetylation (AC) / 2.2.2.1:
Methylation (ME) / 2.2.2.2:
Ethylation (ET) / 2.2.2.3:
tert.-Butyldimethylsilylation (TBDMS) / 2.2.2.4:
Trimethylsilylation (TMS) / 2.2.2.5:
Trimethylsilylation followed by trifluoroacetylation (TMSTFA) / 2.2.2.6:
Trifluoroacetylation (TFA) / 2.2.2.7:
Pentafluoropropionylation (PFP) / 2.2.2.8:
Pentafluoropropylation (PFPOL) / 2.2.2.9:
Heptafluorobutyrylation (HFB) / 2.2.2.10:
Pivalylation (PIV) / 2.2.2.11:
Heptafluorobutyrylprolylation (HFBP) / 2.2.2.12:
GC-MS Apparatus / 2.3:
Apparatus and operation conditions / 2.3.1:
Quality assurance of the apparatus performance / 2.3.2:
Determination of retention indices / 2.4:
Systematic toxicological analysis (STA) of several classes of drugs and their metabolites by GC-MS / 2.5:
Screening for 200 drugs in blood plasma after LLE / 2.5.1:
Screening for most of the basic and neutral drugs in urine after acid hydrolysis, LLE and acetylation / 2.5.2:
Systematic toxicological analysis procedures for the detection of acidic drugs and/or their metabolites / 2.5.3:
General screening procedure for zwitterionic compounds after SPE and silylation / 2.5.4:
Application of the electronic version of this handbook / 2.6:
Quantitative determination / 2.7:
Correlation between Structure and Fragmentation / 3:
Principle of electron-ionization mass spectrometry (EI-MS) / 3.1:
Correlation between fundamental structures or side chains and fragment ions / 3.2:
Formation of Artifacts / 4:
Artifacts formed by oxidation during extraction with diethyl ether / 4.1:
N-Oxidation of tertiary amines / 4.1.1:
S-Oxidation of phenothiazines / 4.1.2:
Artifacts formed by thermolysis during GC (GC artifact) / 4.2:
Decarboxylation of carboxylic acids / 4.2.1:
Cope elimination of N-oxides (-(CH3)2NOH, -(C2H5)2NOH, -C6H14N2O2) / 4.2.2:
Rearrangement of bis-deethyl flurazepam (-H2O) / 4.2.3:
Elimination of various residues / 4.2.4:
Methylation of carboxylic acids in methanol ((ME), ME in methanol) / 4.2.5:
Formation of formaldehyde adducts using methanol as solvent (GC artifact in methanol) / 4.2.6:
Artifacts formed by thermolysis during GC and during acid hydrolysis (GC artifact, HY artifact) / 4.3:
Dehydration of alcohols (-H2O) / 4.3.1:
Decarbamoylation of carbamates / 4.3.2:
Cleavage of morazone to phenmetrazine / 4.3.3:
Artifacts formed during acid hydrolysis / 4.4:
Cleavage of the ether bridge in beta-blockers and alkanolamine antihistamines (HY) / 4.4.1:
Cleavage of 1,4-benzodiazepines to aminobenzoyl derivatives (HY) / 4.4.2:
Cleavage and rearrangement of N-demethyl metabolites of clobazam to benzimidazole derivatives (HY) / 4.4.3:
Cleavage and rearrangement of bis-deethyl flurazepam (HY -H2O) / 4.4.4:
Cleavage and rearrangement of tetrazepam / 4.4.5:
(Methods, Tables) / Volume 1:
Methods
Introduction / 1:
3.

図書

図書
authors, G. Guelachvili, K.Narahari Rao ; editor, G. Guelachvili
出版情報: Berlin ; Tokyo : Springer, c2000  LXXVII, 229 p. ; 28 cm
シリーズ名: Landolt-Börnstein Zahlenwerte und Funktionen aus Naturwissenschaften und Technik, Neue Serie / Gesamtherausgabe, K.-H. Hellwege ; New Series, Group 2 . Molecules and radicals ; v. 20 . Molecular constans : mostly from infrared spectroscopy ; subv. B5
所蔵情報: loading…
目次情報: 続きを見る
CS2 (SCS).
CS2+ (SCS+).
CS2++ (SCS++).
CSe2 (SeCSe).
C2N (CCN).
C2N (CNC).
C2N+ (CCN+).
C2N+ (CNC+).
CS2 (SCS).
CS2+ (SCS+).
CS2++ (SCS++).
4.

図書

図書
Corneliu Constantinescu
出版情報: Amsterdam : Elsevier, 2001  xxi, 597 p. ; 23 cm
シリーズ名: North-Holland mathematical library ; v. 59 . C*-algebras / Corneliu Constantinescu ; v. 2
所蔵情報: loading…
目次情報: 続きを見る
Introduction
Banach Algebras / 2:
Algebras / 2.1:
General Results / 2.1.1:
Invertible Elements / 2.1.2:
The Spectrum / 2.1.3:
Standard Examples / 2.1.4:
Complexification of Algebras / 2.1.5:
Exercises
Normed Algebras / 2.2:
The Standard Examples / 2.2.1:
The Exponential Function and the Neumann Series / 2.2.3:
Invertible Elements of Unital Banach Algebras / 2.2.4:
The Theorems of Riesz and Gelfand / 2.2.5:
Poles of Resolvents / 2.2.6:
Modules / 2.2.7:
Involutive Banach Algebras / 2.3:
Involutive Algebras / 2.3.1:
Sesquilinear Forms / 2.3.2:
Positive Linear Forms / 2.3.4:
The State Space / 2.3.5:
Involutive Modules / 2.3.6:
Gelfand Algebras / 2.4:
The Gelfand Transform / 2.4.1:
Involutive Gelfand Algebras / 2.4.2:
Examples / 2.4.3:
Locally Compact Additive Groups / 2.4.4:
The Fourier Transform / 2.4.5:
Compact Operators / 3:
The General Theory / 3.1:
Fredholm Operators / 3.1.1:
Point Spectrum / 3.1.4:
Spectrum of a Compact Operator / 3.1.5:
Integral Operators / 3.1.6:
Linear Differential Equations / 3.2:
Boundary Value Problems for Differential Equations / 3.2.1:
Supplementary Results / 3.2.2:
Linear Partial Differential Equations / 3.2.3:
Name
Index Subject
Index Symbol
Index
Introduction
Banach Algebras / 2:
Algebras / 2.1:
5.

電子ブック

EB
Kim-Kwang Raymond Choo
出版情報: Springer eBooks Computer Science , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
Computer Security Approach / 1.2.1:
Computational Complexity Approach / 1.2.2:
Research Objectives and Deliverables / 1.2.3:
Structure of Book and Contributions to Knowledge / 1.3:
References
Background Materials / 2:
Mathematical Background / 2.1:
Abstract Algebra and the Main Groups / 2.1.1:
Bilinear Maps from Elliptic Curve Pairings / 2.1.2:
Computational Problems and Assumptions / 2.1.3:
Cryptographic Tools / 2.1.4:
Encryption Schemes: Asymmetric Setting / 2.1.4.1:
Encryption Schemes: Symmetric Setting / 2.1.4.2:
Digital Signature Schemes / 2.1.4.3:
Message Authentication Codes / 2.1.4.4:
Cryptographic Hash Functions / 2.1.4.5:
Random Oracles / 2.1.4.6:
Key Establishment Protocols and their Basis / 2.2:
Protocol Architectures / 2.2.1:
Existing Cryptographic Keys / 2.2.1.1:
Method of Session Key Generation / 2.2.1.2:
Number of Entities / 2.2.1.3:
Protocol Goals and Attacks / 2.2.2:
Protocol Goals / 2.2.2.1:
Additional Security Attributes / 2.2.2.2:
Types of Attacks / 2.2.2.3:
A Need for Rigorous Treatment / 2.2.2.4:
The Computational Complexity Approach / 2.3:
Adversarial Powers / 2.3.1:
Definition of Freshness / 2.3.2:
Definition of Security / 2.3.3:
The Bellare-Rogaway Models / 2.3.4:
The BR93 Model / 2.3.4.1:
The BR95 Model / 2.3.4.2:
The BPR2000 Model / 2.3.4.3:
The Canetti-Krawczyk Model / 2.3.5:
Protocol Security / 2.3.6:
Summary / 2.4:
A Flawed BR95 Partnership Function / 3:
A Flaw in the Security Proof for 3PKD Protocol / 3.1:
The 3PKD Protocol / 3.1.1:
Key Replicating Attack on 3PKD Protocol / 3.1.2:
The Partner Function used in the BR95 Proof / 3.1.3:
A Revised 3PKD Protocol in Bellare-Rogaway Model / 3.2:
Defining SIDs in the 3PKD Protocol / 3.2.1:
An Improved Provably Secure 3PKD Protocol / 3.2.2:
Security Proof for the Improved 3PKD Protocol / 3.2.3:
Adaptive MAC Forger F / 3.2.3.1:
Multiple Eavesdropper Attacker ME / 3.2.3.2:
Conclusion of Proof / 3.2.3.3:
On The Key Sharing Requirement / 3.3:
Bellare-Rogaway 3PKD Protocol in CK2001 Model / 4.1:
New Attack on 3PKD Protocol / 4.1.1:
A New Provably-Secure 3PKD Protocol in CK2001 Model / 4.1.3:
Jeong-Katz-Lee Protocol JP2 / 4.2:
Protocol JP2 / 4.2.1:
New Attack on Protocol JP2 / 4.2.2:
An Improved Protocol JP2 / 4.2.3:
The Key Sharing Requirement / 4.3:
Comparison of Bellare-Rogaway and Canetti-Krawczyk Models / 4.4:
Relating The Notions of Security / 5.1:
Proving BR93 (EA+KE) to BPR2000 (EA+KE) / 5.1.1:
Proof for the key establishment goal / 5.1.1.1:
Proof for the entity authentication goal / 5.1.1.2:
Proving CK2001 to BPR2000 (KE) / 5.1.2:
Proving CK2001 to BR93 (KE) / 5.1.3:
BR93 (KE) to BR95 and BR93 (KE), CK2001 [not left arrow] BR95 / 5.1.4:
BR93 (KE)/CK2001 [not left arrow] BPR2000 (KE) / 5.1.5:
CK2001 [not left arrow] BR93 (EA+KE) / 5.1.6:
BR93 (KE) [not left arrow] CK2001 / 5.1.7:
BPR200 (KE) [not left arrow] BR95 / 5.1.8:
A Drawback in the BPR2000 Model / 5.2:
Case Study: Abdalla-Pointcheval 3PAKE / 5.2.1:
Unknown Key Share Attack on 3PAKE / 5.2.2:
An Extension to the Bellare-Rogaway Model / 5.3:
A Provably-Secure Revised Protocol of Boyd / 6.1:
Secure Authenticated Encryption Schemes / 6.1.1:
Revised Protocol of Boyd / 6.1.2:
Security Proof / 6.1.3:
Integrity attacker / 6.1.3.1:
Confidentiality attacker / 6.1.3.2:
Conclusion of Security Proof / 6.1.3.3:
An Extension to the BR93 Model / 6.2:
An Efficient Protocol in Extended Model / 6.3:
An Efficient Protocol / 6.3.1:
Integrity Breaker / 6.3.2:
Confidentiality Breaker / 6.3.2.2:
Comparative Security and Efficiency / 6.3.2.3:
A Proof of Revised Yahalom Protocol / 6.5:
The Yahalom Protocol and its Simplified Version / 7.1:
A New Provably-Secure Protocol / 7.2:
Proof for Protocol 7.2 / 7.2.1:
Conclusion of Proof for Theorem 7.2.1 / 7.2.1.1:
An Extension to Protocol 7.2 / 7.2.2:
Partnering Mechanism: A Brief Discussion / 7.3:
Errors in Computational Complexity Proofs for Protocols / 7.4:
Boyd-Gonzalez Nieto Protocol / 8.1:
Unknown Key Share Attack on Protocol / 8.1.1:
An Improved Conference Key Agreement Protocol / 8.1.2:
Limitations of Existing Proof / 8.1.3:
Jakobsson-Pointcheval MAKEP / 8.2:
Unknown Key Share Attack on JP-MAKEP / 8.2.1:
Flaws in Existing Security Proof for JP-MAKEP / 8.2.2:
Wong-Chan MAKEP / 8.3:
A New Attack on WC-MAKEP / 8.3.1:
Preventing the Attack / 8.3.2:
Flaws in Existing Security Proof for WC-MAKEP / 8.3.3:
An MT-Authenticator / 8.4:
Encryption-Based MT-Authenticator / 8.4.1:
Flaw in Existing Security Proof Revealed / 8.4.2:
Addressing the Flaw / 8.4.3:
An Example Protocol as a Case Study / 8.4.4:
On Session Key Construction / 8.5:
Chen-Kudla ID-Based Protocol / 9.1:
The ID-Based Protocol / 9.1.1:
Existing Arguments on Restriction of Reveal Query / 9.1.2:
Improved Chen-Kudla Protocol / 9.1.3:
Security Proof for Improved Chen-Kudla Protocol / 9.1.4:
McCullagh-Barreto 2P-IDAKA Protocol / 9.2:
The 2P-IDAKA Protocol / 9.2.1:
Why Reveal Query is Restricted / 9.2.2:
Errors in Existing Proof for 2P-IDAKA Protocol / 9.2.3:
Error 1 / 9.2.3.1:
Error 2 / 9.2.3.2:
Improved 2P-IDAKA Protocol / 9.2.4:
A Proposal for Session Key Construction / 9.3:
Another Case Study / 9.4:
Reflection Attack on Lee-Kim-Yoo Protocol / 9.4.1:
Complementing Computational Protocol Analysis / 9.4.2:
The Formal Framework / 10.1:
Analysing a Provably-Secure Protocol / 10.2:
Protocol Specification / 10.2.1:
Initial State of Protocol 10.1 / 10.2.1.1:
Step 1 of Protocol 10.1 / 10.2.1.2:
A Malicious State Transition / 10.2.1.3:
Protocol Analysis / 10.2.2:
Hijacking Attack / 10.2.2.1:
New Attack 1 / 10.2.2.2:
New Attack 2 / 10.2.2.3:
Analysing Another Two Protocols With Claimed Proofs of Security / 10.3:
Analysis of Protocol 10.2 / 10.3.1:
Analysis of Protocol 10.3 / 10.3.1.2:
Flaws in Refuted Proofs / 10.3.2:
A Possible Fix / 10.3.3:
Analysing Protocols with Heuristic Security Arguments / 10.4:
Case Studies / 10.4.1:
Jan-Chen Mutual Protocol / 10.4.1.1:
Yang-Shen-Shieh Protocol / 10.4.1.2:
Kim-Huh-Hwang-Lee Protocol / 10.4.1.3:
Lin-Sun-Hwang Key Protocols MDHEKE I and II / 10.4.1.4:
Yeh-Sun Key Protocol / 10.4.1.5:
Protocol Analyses / 10.4.2:
Protocol Analysis 1 / 10.4.2.1:
Protocol Analysis 2 / 10.4.2.2:
Protocol Analysis 3 / 10.4.2.3:
Protocol Analysis 4 / 10.4.2.4:
Protocol Analysis 5 / 10.4.2.5:
Protocol Analysis 6 / 10.4.2.6:
Protocol Analysis 7 / 10.4.2.7:
An Integrative Framework to Protocol Analysis and Repair / 10.5:
Case Study Protocol / 11.1:
Proposed Integrative Framework / 11.2:
Protocols Specification / 11.2.1:
Defining SIDs in Protocol 11.1 / 11.2.1.1:
Description of Goal State / 11.2.1.2:
Description of Possible Actions / 11.2.1.3:
Protocols Analysis / 11.2.2:
Protocol Repair / 11.2.3:
Conclusion and Future Work / 11.3:
Research Summary / 12.1:
Open Problems and Future Directions / 12.2:
Index
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
6.

電子ブック

EB
Kim-Kwang Raymond Choo
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
Computer Security Approach / 1.2.1:
Computational Complexity Approach / 1.2.2:
Research Objectives and Deliverables / 1.2.3:
Structure of Book and Contributions to Knowledge / 1.3:
References
Background Materials / 2:
Mathematical Background / 2.1:
Abstract Algebra and the Main Groups / 2.1.1:
Bilinear Maps from Elliptic Curve Pairings / 2.1.2:
Computational Problems and Assumptions / 2.1.3:
Cryptographic Tools / 2.1.4:
Encryption Schemes: Asymmetric Setting / 2.1.4.1:
Encryption Schemes: Symmetric Setting / 2.1.4.2:
Digital Signature Schemes / 2.1.4.3:
Message Authentication Codes / 2.1.4.4:
Cryptographic Hash Functions / 2.1.4.5:
Random Oracles / 2.1.4.6:
Key Establishment Protocols and their Basis / 2.2:
Protocol Architectures / 2.2.1:
Existing Cryptographic Keys / 2.2.1.1:
Method of Session Key Generation / 2.2.1.2:
Number of Entities / 2.2.1.3:
Protocol Goals and Attacks / 2.2.2:
Protocol Goals / 2.2.2.1:
Additional Security Attributes / 2.2.2.2:
Types of Attacks / 2.2.2.3:
A Need for Rigorous Treatment / 2.2.2.4:
The Computational Complexity Approach / 2.3:
Adversarial Powers / 2.3.1:
Definition of Freshness / 2.3.2:
Definition of Security / 2.3.3:
The Bellare-Rogaway Models / 2.3.4:
The BR93 Model / 2.3.4.1:
The BR95 Model / 2.3.4.2:
The BPR2000 Model / 2.3.4.3:
The Canetti-Krawczyk Model / 2.3.5:
Protocol Security / 2.3.6:
Summary / 2.4:
A Flawed BR95 Partnership Function / 3:
A Flaw in the Security Proof for 3PKD Protocol / 3.1:
The 3PKD Protocol / 3.1.1:
Key Replicating Attack on 3PKD Protocol / 3.1.2:
The Partner Function used in the BR95 Proof / 3.1.3:
A Revised 3PKD Protocol in Bellare-Rogaway Model / 3.2:
Defining SIDs in the 3PKD Protocol / 3.2.1:
An Improved Provably Secure 3PKD Protocol / 3.2.2:
Security Proof for the Improved 3PKD Protocol / 3.2.3:
Adaptive MAC Forger F / 3.2.3.1:
Multiple Eavesdropper Attacker ME / 3.2.3.2:
Conclusion of Proof / 3.2.3.3:
On The Key Sharing Requirement / 3.3:
Bellare-Rogaway 3PKD Protocol in CK2001 Model / 4.1:
New Attack on 3PKD Protocol / 4.1.1:
A New Provably-Secure 3PKD Protocol in CK2001 Model / 4.1.3:
Jeong-Katz-Lee Protocol JP2 / 4.2:
Protocol JP2 / 4.2.1:
New Attack on Protocol JP2 / 4.2.2:
An Improved Protocol JP2 / 4.2.3:
The Key Sharing Requirement / 4.3:
Comparison of Bellare-Rogaway and Canetti-Krawczyk Models / 4.4:
Relating The Notions of Security / 5.1:
Proving BR93 (EA+KE) to BPR2000 (EA+KE) / 5.1.1:
Proof for the key establishment goal / 5.1.1.1:
Proof for the entity authentication goal / 5.1.1.2:
Proving CK2001 to BPR2000 (KE) / 5.1.2:
Proving CK2001 to BR93 (KE) / 5.1.3:
BR93 (KE) to BR95 and BR93 (KE), CK2001 [not left arrow] BR95 / 5.1.4:
BR93 (KE)/CK2001 [not left arrow] BPR2000 (KE) / 5.1.5:
CK2001 [not left arrow] BR93 (EA+KE) / 5.1.6:
BR93 (KE) [not left arrow] CK2001 / 5.1.7:
BPR200 (KE) [not left arrow] BR95 / 5.1.8:
A Drawback in the BPR2000 Model / 5.2:
Case Study: Abdalla-Pointcheval 3PAKE / 5.2.1:
Unknown Key Share Attack on 3PAKE / 5.2.2:
An Extension to the Bellare-Rogaway Model / 5.3:
A Provably-Secure Revised Protocol of Boyd / 6.1:
Secure Authenticated Encryption Schemes / 6.1.1:
Revised Protocol of Boyd / 6.1.2:
Security Proof / 6.1.3:
Integrity attacker / 6.1.3.1:
Confidentiality attacker / 6.1.3.2:
Conclusion of Security Proof / 6.1.3.3:
An Extension to the BR93 Model / 6.2:
An Efficient Protocol in Extended Model / 6.3:
An Efficient Protocol / 6.3.1:
Integrity Breaker / 6.3.2:
Confidentiality Breaker / 6.3.2.2:
Comparative Security and Efficiency / 6.3.2.3:
A Proof of Revised Yahalom Protocol / 6.5:
The Yahalom Protocol and its Simplified Version / 7.1:
A New Provably-Secure Protocol / 7.2:
Proof for Protocol 7.2 / 7.2.1:
Conclusion of Proof for Theorem 7.2.1 / 7.2.1.1:
An Extension to Protocol 7.2 / 7.2.2:
Partnering Mechanism: A Brief Discussion / 7.3:
Errors in Computational Complexity Proofs for Protocols / 7.4:
Boyd-Gonzalez Nieto Protocol / 8.1:
Unknown Key Share Attack on Protocol / 8.1.1:
An Improved Conference Key Agreement Protocol / 8.1.2:
Limitations of Existing Proof / 8.1.3:
Jakobsson-Pointcheval MAKEP / 8.2:
Unknown Key Share Attack on JP-MAKEP / 8.2.1:
Flaws in Existing Security Proof for JP-MAKEP / 8.2.2:
Wong-Chan MAKEP / 8.3:
A New Attack on WC-MAKEP / 8.3.1:
Preventing the Attack / 8.3.2:
Flaws in Existing Security Proof for WC-MAKEP / 8.3.3:
An MT-Authenticator / 8.4:
Encryption-Based MT-Authenticator / 8.4.1:
Flaw in Existing Security Proof Revealed / 8.4.2:
Addressing the Flaw / 8.4.3:
An Example Protocol as a Case Study / 8.4.4:
On Session Key Construction / 8.5:
Chen-Kudla ID-Based Protocol / 9.1:
The ID-Based Protocol / 9.1.1:
Existing Arguments on Restriction of Reveal Query / 9.1.2:
Improved Chen-Kudla Protocol / 9.1.3:
Security Proof for Improved Chen-Kudla Protocol / 9.1.4:
McCullagh-Barreto 2P-IDAKA Protocol / 9.2:
The 2P-IDAKA Protocol / 9.2.1:
Why Reveal Query is Restricted / 9.2.2:
Errors in Existing Proof for 2P-IDAKA Protocol / 9.2.3:
Error 1 / 9.2.3.1:
Error 2 / 9.2.3.2:
Improved 2P-IDAKA Protocol / 9.2.4:
A Proposal for Session Key Construction / 9.3:
Another Case Study / 9.4:
Reflection Attack on Lee-Kim-Yoo Protocol / 9.4.1:
Complementing Computational Protocol Analysis / 9.4.2:
The Formal Framework / 10.1:
Analysing a Provably-Secure Protocol / 10.2:
Protocol Specification / 10.2.1:
Initial State of Protocol 10.1 / 10.2.1.1:
Step 1 of Protocol 10.1 / 10.2.1.2:
A Malicious State Transition / 10.2.1.3:
Protocol Analysis / 10.2.2:
Hijacking Attack / 10.2.2.1:
New Attack 1 / 10.2.2.2:
New Attack 2 / 10.2.2.3:
Analysing Another Two Protocols With Claimed Proofs of Security / 10.3:
Analysis of Protocol 10.2 / 10.3.1:
Analysis of Protocol 10.3 / 10.3.1.2:
Flaws in Refuted Proofs / 10.3.2:
A Possible Fix / 10.3.3:
Analysing Protocols with Heuristic Security Arguments / 10.4:
Case Studies / 10.4.1:
Jan-Chen Mutual Protocol / 10.4.1.1:
Yang-Shen-Shieh Protocol / 10.4.1.2:
Kim-Huh-Hwang-Lee Protocol / 10.4.1.3:
Lin-Sun-Hwang Key Protocols MDHEKE I and II / 10.4.1.4:
Yeh-Sun Key Protocol / 10.4.1.5:
Protocol Analyses / 10.4.2:
Protocol Analysis 1 / 10.4.2.1:
Protocol Analysis 2 / 10.4.2.2:
Protocol Analysis 3 / 10.4.2.3:
Protocol Analysis 4 / 10.4.2.4:
Protocol Analysis 5 / 10.4.2.5:
Protocol Analysis 6 / 10.4.2.6:
Protocol Analysis 7 / 10.4.2.7:
An Integrative Framework to Protocol Analysis and Repair / 10.5:
Case Study Protocol / 11.1:
Proposed Integrative Framework / 11.2:
Protocols Specification / 11.2.1:
Defining SIDs in Protocol 11.1 / 11.2.1.1:
Description of Goal State / 11.2.1.2:
Description of Possible Actions / 11.2.1.3:
Protocols Analysis / 11.2.2:
Protocol Repair / 11.2.3:
Conclusion and Future Work / 11.3:
Research Summary / 12.1:
Open Problems and Future Directions / 12.2:
Index
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
7.

電子ブック

EB
Isao Noda, Yukihiro Ozaki, Y Ozaki
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2004
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Introduction / 1:
Two-dimensional Spectroscopy / 1.1:
Overview of the Field / 1.2:
Generalized Two-dimensional Correlation / 1.3:
Types of Spectroscopic Probes / 1.3.1:
External Perturbations / 1.3.2:
Heterospectral Correlation / 1.4:
Universal Applicability / 1.5:
Principle of Two-dimensional Correlation Spectroscopy / 2:
Two-dimensional Correlation Spectroscopy / 2.1:
General Scheme / 2.1.1:
Type of External Perturbations / 2.1.2:
Dynamic Spectrum / 2.2:
Two-dimensional Correlation Concept / 2.2.2:
Generalized Two-dimensional Correlation Function / 2.2.3:
Properties of 2D Correlation Spectra / 2.2.4:
Synchronous 2D Correlation Spectrum / 2.3.1:
Asynchronous 2D Correlation Spectrum / 2.3.2:
Special Cases and Exceptions / 2.3.3:
Analytical Expressions for Certain 2D Spectra / 2.4:
Comparison of Linear Functions / 2.4.1:
2D Spectra Based on Sinusoidal Signals / 2.4.2:
Exponentially Decaying Intensities / 2.4.3:
Distributed Lorentzian Peaks / 2.4.4:
Signals with more Complex Waveforms / 2.4.5:
Cross-correlation Analysis and 2D Spectroscopy / 2.5:
Cross-correlation Function and Cross Spectrum / 2.5.1:
Cross-correlation Function and Synchronous Spectrum / 2.5.2:
Hilbert Transform / 2.5.3:
Orthogonal Correlation Function and Asynchronous Spectrum / 2.5.4:
Disrelation Spectrum / 2.5.5:
Practical Computation of Two-dimensional Correlation Spectra / 3:
Computation of 2D Spectra from Discrete Data / 3.1:
Synchronous Spectrum / 3.1.1:
Asynchronous Spectrum / 3.1.2:
Unevenly Spaced Data / 3.2:
Computational Efficiency / 3.3:
Generalized Two-dimensional Correlation Spectroscopy in Practice / 4:
Practical Example / 4.1:
Solvent Evaporation Study / 4.1.1:
2D Spectra Generated from Experimental Data / 4.1.2:
Sequential Order Analysis by Cross Peak Signs / 4.1.3:
Pretreatment of Data / 4.2:
Noise Reduction Methods / 4.2.1:
Baseline Correction Methods / 4.2.2:
Other Pretreatment Methods / 4.2.3:
Features Arising from Factors other than Band Intensity Changes / 4.3:
Effect of Band Position Shift and Line Shape Change / 4.3.1:
Simulation Studies / 4.3.2:
2D Spectral Features from Band Shift and Line Broadening / 4.3.3:
Further Expansion of Generalized Two-dimensional Correlation Spectroscopy - Sample-Sample Correlation and Hybrid Correlation / 5:
Sample-Sample Correlation Spectroscopy / 5.1:
Correlation in another Dimension / 5.1.1:
Matrix Algebra Outlook of 2D Correlation / 5.1.2:
Sample-Sample Correlation Spectra / 5.1.3:
Application of Sample-Sample Correlation / 5.1.4:
Hybrid 2D Correlation Spectroscopy / 5.2:
Multiple Perturbations / 5.2.1:
Correlation between Data Matrices / 5.2.2:
Case Studies / 5.2.3:
Additional Remarks / 5.3:
Additional Developments in Two-dimensional Correlation Spectroscopy - Statistical Treatments, Global Phase Maps, and Chemometrics / 6:
Classical Statistical Treatments and 2D Spectroscopy / 6.1:
Variance, Covariance, and Correlation Coefficient / 6.1.1:
Interpretation of 2D Disrelation Spectrum / 6.1.2:
Coherence and Correlation Phase Angle / 6.1.3:
Correlation Enhancement / 6.1.4:
Global 2D Phase Maps / 6.2:
Further Discussion on Global Phase / 6.2.1:
Phase Map with a Blinding Filter / 6.2.2:
Simulation Study / 6.2.3:
Chemometrics and 2D Correlation Spectroscopy / 6.3:
Comparison between Chemometrics and 2D Correlation / 6.3.1:
Factor Analysis / 6.3.2:
Principal Component Analysis (PCA) / 6.3.3:
Number of Principal Factors / 6.3.4:
PCA-reconstructed Spectra / 6.3.5:
Eigenvalue Manipulating Transformation (EMT) / 6.3.6:
Other Types of Two-dimensional Spectroscopy / 7:
Nonlinear Optical 2D Spectroscopy / 7.1:
Ultrafast Laser Pulses / 7.1.1:
Comparison with Generalized 2D Correlation Spectroscopy / 7.1.2:
Overlap Between Generalized 2D Correlation and Nonlinear Spectroscopy / 7.1.3:
Statistical 2D Correlation Spectroscopy / 7.2:
Statistical 2D Correlation by Barton II et al. / 7.2.1:
Statistical 2D Correlation by &Sa&sic and Ozaki / 7.2.2:
Other Statistical 2D Spectra / 7.2.3:
Link to Chemometrics / 7.2.4:
Other Developments in 2D Correlation Spectroscopy / 7.3:
Moving-window Correlation / 7.3.1:
Model-based 2D Correlation Spectroscopy / 7.3.2:
Dynamic Two-di / 8:
Preface
Acknowledgements
Introduction / 1:
8.

電子ブック

EB
Eric Setton, Bernd Girod
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 2:
Video Compression / 2.1:
H.264 Video Coding / 2.1.1:
Distortion Models / 2.1.2:
Video Streaming / 2.2:
Error Resilience / 2.2.1:
Congestion Control / 2.2.2:
Path Diversity / 2.2.3:
Multicast Architectures / 2.3:
IP Multicast / 2.3.1:
Content Delivery Networks / 2.3.2:
Peer-to-Peer Systems / 2.4:
Peer-to-Peer File Transfer, the Example of BitTorrent / 2.4.1:
Peer-to-Peer Streaming / 2.4.2:
Streaming over Throughput-Limited Paths / 3:
Video Encoding for Throughput-Limited Paths / 3.1:
End-to-End Rate-Distortion Performance Model / 3.1.1:
Experimental Results / 3.1.2:
Congestion-Distortion Optimized Scheduling / 3.2:
Channel Model / 3.2.1:
Evaluating a Schedule / 3.2.2:
Randomized Schedule Search / 3.2.3:
CoDiO Light / 3.2.4:
Chapter Summary / 3.2.5:
Peer-to-Peer Control Protocol / 4:
Protocol Description / 4.1:
Different Peer States / 4.1.1:
Different Tree Connection States / 4.1.2:
Multicast Source / 4.1.3:
Protocol Settings / 4.1.4:
Experimental Protocol Evaluation / 4.2:
Experimental Setup / 4.2.1:
Control Protocol Traffic Distribution / 4.2.2:
Join and Rejoin Latency / 4.2.3:
Scalability / 4.2.4:
Limiting Throughput / 4.2.5:
Video Streaming over a Peer-to-Peer Network / 4.3:
Video Streaming Protocol / 5.1:
Video Packet Transmission / 5.1.1:
Retransmissions / 5.1.2:
Peer-to-Peer CoDiO Scheduling / 5.2:
Sender-Driven Prioritization / 5.2.1:
Distortion-Optimized Retransmission Scheduling / 5.2.2:
Scheduler Evaluation / 5.2.3:
Video Sessions / 5.3:
Diversity / 5.3.2:
CoDiO P2P / 5.3.3:
Conclusions and Future Work / 5.4:
Conclusions / 6.1:
Future Work / 6.2:
Video Experiments / A:
Encoding Structures / A.1:
Latency-Constrained Video Streaming / A.1.2:
Error-Resilient Decoding / A.1.3:
Quality Metric / A.1.4:
Video Sequences / A.2:
Container / A.2.1:
Foreman / A.2.2:
Mobile / A.2.3:
Mother & Daughter / A.2.4:
News / A.2.5:
Salesman / A.2.6:
References
Index
Introduction / 1:
Background / 2:
Video Compression / 2.1:
9.

電子ブック

EB
Eric Setton, Bernd Girod
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 2:
Video Compression / 2.1:
H.264 Video Coding / 2.1.1:
Distortion Models / 2.1.2:
Video Streaming / 2.2:
Error Resilience / 2.2.1:
Congestion Control / 2.2.2:
Path Diversity / 2.2.3:
Multicast Architectures / 2.3:
IP Multicast / 2.3.1:
Content Delivery Networks / 2.3.2:
Peer-to-Peer Systems / 2.4:
Peer-to-Peer File Transfer, the Example of BitTorrent / 2.4.1:
Peer-to-Peer Streaming / 2.4.2:
Streaming over Throughput-Limited Paths / 3:
Video Encoding for Throughput-Limited Paths / 3.1:
End-to-End Rate-Distortion Performance Model / 3.1.1:
Experimental Results / 3.1.2:
Congestion-Distortion Optimized Scheduling / 3.2:
Channel Model / 3.2.1:
Evaluating a Schedule / 3.2.2:
Randomized Schedule Search / 3.2.3:
CoDiO Light / 3.2.4:
Chapter Summary / 3.2.5:
Peer-to-Peer Control Protocol / 4:
Protocol Description / 4.1:
Different Peer States / 4.1.1:
Different Tree Connection States / 4.1.2:
Multicast Source / 4.1.3:
Protocol Settings / 4.1.4:
Experimental Protocol Evaluation / 4.2:
Experimental Setup / 4.2.1:
Control Protocol Traffic Distribution / 4.2.2:
Join and Rejoin Latency / 4.2.3:
Scalability / 4.2.4:
Limiting Throughput / 4.2.5:
Video Streaming over a Peer-to-Peer Network / 4.3:
Video Streaming Protocol / 5.1:
Video Packet Transmission / 5.1.1:
Retransmissions / 5.1.2:
Peer-to-Peer CoDiO Scheduling / 5.2:
Sender-Driven Prioritization / 5.2.1:
Distortion-Optimized Retransmission Scheduling / 5.2.2:
Scheduler Evaluation / 5.2.3:
Video Sessions / 5.3:
Diversity / 5.3.2:
CoDiO P2P / 5.3.3:
Conclusions and Future Work / 5.4:
Conclusions / 6.1:
Future Work / 6.2:
Video Experiments / A:
Encoding Structures / A.1:
Latency-Constrained Video Streaming / A.1.2:
Error-Resilient Decoding / A.1.3:
Quality Metric / A.1.4:
Video Sequences / A.2:
Container / A.2.1:
Foreman / A.2.2:
Mobile / A.2.3:
Mother & Daughter / A.2.4:
News / A.2.5:
Salesman / A.2.6:
References
Index
Introduction / 1:
Background / 2:
Video Compression / 2.1:
10.

図書

図書
H. Haug ... [et al.] ; edited by C. Klingshirn
出版情報: Berlin : Springer-Verlag, c2001-2007  3 v. ; 28 cm.
シリーズ名: Landolt-Börnstein Zahlenwerte und Funktionen aus Naturwissenschaften und Technik, Neue Serie / Gesamtherausgabe, K.-H. Hellwege ; Group 3 . Condensed matter ; v. 34 . Semiconductor quantum structures ; subv. C
所蔵情報: loading…
目次情報: 続きを見る
Landolt-Börnstein
Group III: Condensed Matter
Semiconductor Quantum Structures / Volume 34:
Optical Properties (Part 2) / Subvolume C2:
Introductory material
Low-dimensional structures of II-VI compounds / 5:
General properties / H. Kalt5.1:
Introduction / 5.1.1:
Some basic properties of bulk II-VI compounds / 5.1.2:
Band-gap energies / 5.1.2.1:
Excitonic properties / 5.1.2.2:
Alignment of electronic bands / 5.1.3:
References for 5.1 / 5.1.4:
Quantum-well structures of II-VI compounds / 5.2:
(Hg,X)Te quantum wells / 5.2.1:
Low-density regime / 5.2.1.1:
Electronic states in quantum wells / 5.2.1.1.1:
Electron-hole and excitonic transitions / 5.2.1.1.2:
Modification of the optical properties by internal fields / 5.2.1.2:
Modification of the optical properties by external fields / 5.2.1.3:
High-density regime and nonlinear optics / 5.2.1.4:
References for 5.2.1 / 5.2.1.5:
CdTe quantum wells / 5.2.2:
Excitonic transitions / 5.2.2.1:
Localized excitons / 5.2.2.1.3:
Polariton effects / 5.2.2.1.4:
Strained quantum wells / 5.2.2.2:
Piezoelectric quantum wells / 5.2.2.2.2:
Hydrostatic pressure / 5.2.2.3:
External electric fields / 5.2.2.3.2:
External magnetic fields / 5.2.2.3.3:
The intermediate-density regime / 5.2.2.4:
Exciton-exciton interaction / 5.2.2.4.1:
Excitonic lasing and optical gain / 5.2.2.4.2:
Biexcitons / 5.2.2.4.3:
The high-density regime / 5.2.2.5:
One-component plasma (2DEG) / 5.2.2.5.1:
Electron-hole plasma / 5.2.2.5.2:
Coherent dynamics and relaxation of optical excitations / 5.2.2.6:
Coherent interactions / 5.2.2.6.1:
Dephasing mechanisms and homogeneous linewidth / 5.2.2.6.2:
Relaxation processes / 5.2.2.6.3:
Transport phenomena of excitons and trions / 5.2.2.6.4:
Radiative and nonradiative recombination / 5.2.2.6.5:
References for 5.2.2 / 5.2.2.7:
(Cd,Zn)Te, (Cd,Mn)Te, and (Cd,Mg)Te quantum wells / 5.2.3:
The intermediate and high-density regimes / 5.2.3.1:
References for 5.2.3 / 5.2.3.4:
ZnTe quantum wells / 5.2.4:
Excitons and polaritons / 5.2.4.1:
Optical nonlinearities and high-density effects / 5.2.4.3:
References for 5.2.4 / 5.2.4.4:
Telluride diluted-magnetic semiconductor quantum-well structures: (Hg,Mn)Te, (Cd,Mn)Te, and (Zn,Mn)Te QWs; Se/Te type-II QWs / 5.2.5:
Zeeman splitting and its applications / 5.2.5.1:
Giant Zeeman splitting / 5.2.5.1.1:
Magnetic-field induced type-I to type-II transition / 5.2.5.1.2:
Interface effects in non-DMS/DMS QW structures / 5.2.5.1.3:
Magnetic-field induced circular birefringence / 5.2.5.1.4:
Coulomb-bound electron-hole pairs and complexes (low-density regime) / 5.2.5.2:
Magnetic polarons / 5.2.5.2.1:
Donor-acceptor pair recombination / 5.2.5.2.3:
The intermediate and high-density regime / 5.2.5.3:
Spin-aligned excitons / 5.2.5.3.1:
Spin-aligned magnetoplasma / 5.2.5.3.2:
Two-dimensional electron or hole gas / 5.2.5.3.3:
Coherent spin dynamics and spin injection / 5.2.5.4:
Spin relaxation / 5.2.5.4.2:
Exciton dephasing and homogeneous broadening / 5.2.5.4.3:
Formation dynamics of magnetic polarons / 5.2.5.4.4:
Recombination processes / 5.2.5.4.5:
References for 5.2.5 / 5.2.5.5:
Telluride/Selenide quantum wells / 5.2.6:
High-density regime and dynamics / 5.2.6.1:
References for 5.2.6 / 5.2.6.3:
HgSe and (Hg,Cd)Se quantum wells / 5.2.7:
References for 5.2.7
CdSe quantum wells / 5.2.8:
High-density regime / 5.2.8.1:
Relaxation dynamics / 5.2.8.3:
References for 5.2.8 / 5.2.8.4:
(Cd,Zn)Se quantum wells / 5.2.9:
Modifications of the optical properties by internal fields / 5.2.9.1:
Piezoelectric fields / 5.2.9.2.1:
Modifications of the optical properties by external fields / 5.2.9.3:
Excitonic interactions and Pauli blocking / 5.2.9.3.1:
Two-photon absorption and second harmonic generation / 5.2.9.4.2:
Localized biexcitons / 5.2.9.4.3:
Excitonic and biexcitonic stimulated emission and optical gain / 5.2.9.4.4:
Fermi-edge singularity / 5.2.9.5:
Correlated electron-hole plasma / 5.2.9.5.2:
Coherent interactions and dephasing / 5.2.9.6:
Transport phenomena / 5.2.9.6.2:
Dynamics of gain and stimulated emission / 5.2.9.6.4:
Radiative and non-radiative recombination / 5.2.9.6.5:
References for 5.2.9 / 5.2.9.7:
ZnSe quantum wells / 5.2.10:
Strain and piezoelectric fields / 5.2.10.1:
Transient internal space charge fields / 5.2.10.2.2:
Electric fields / 5.2.10.3:
Magnetic fields / 5.2.10.3.3:
Excitonic gain and lasing / 5.2.10.4:
Nonlinear optical effects / 5.2.10.4.4:
Optical gain and lasing / 5.2.10.5:
Hot-exciton relaxation / 5.2.10.6:
Lateral transport / 5.2.10.6.4:
References for 5.2.10 / 5.2.10.6.6:
Selenide-based quantum wells containing Be, Mg, or S in the well / 5.2.11:
References for 5.2.11
Selenide diluted-magnetic semiconductor quantum-well structures: (Cd,Mn)Se, (Zn,Mn)Se, and (Zn,Fe)Se QWs / 5.2.12:
Two-dimensional electron gas / 5.2.12.1:
Spin dephasing and relaxation / 5.2.12.4:
Dynamics of magnetic polarons / 5.2.12.4.2:
References for 5.2.12 / 5.2.12.4.3:
Zincblende Sulphide/Selenide type-II quantum wells / 5.2.13:
References for 5.2.13
CdS/ZnS and (Cd,Zn)S/ZnS quantum wells / 5.2.14:
Intermediate and high-density regime / 5.2.14.1:
Exciton dynamics / 5.2.14.4:
References for 5.2.14 / 5.2.14.5:
ZnS/(Zn,Mg)S quantum wells / 5.2.15:
References for 5.2.15
ZnO and (Zn,Cd)O quantum wells / 5.2.16:
Dynamics of optical excitations / 5.2.16.1:
References for 5.2.16 / 5.2.16.5:
Superlattices and coupled quantum-well structures of II-VI compounds / 5.3:
(Hg,X)Te superlattices / 5.3.1:
Electronic states in superlattices / 5.3.1.1:
References for 5.3.1 / 5.3.1.1.2:
CdTe/(Cd,X)Te and (Cd,X)Te/ZnTe superlattices and coupled quantum wells / 5.3.2:
Transient effects and dynamics / 5.3.2.1:
References for 5.3.2 / 5.3.2.5:
Telluride diluted magnetic semiconductor superlattices and coupled quantum wells / 5.3.3:
Electronic states in DMS SLs / 5.3.3.1:
Spin states in DMS SLs / 5.3.3.2:
Polaritons / 5.3.3.3:
Dynamic processes / 5.3.3.5:
References for 5.3.3 / 5.3.3.6:
Telluride/Selenide and Telluride/Sulphide superlattices / 5.3.4:
Electronic states in type-II SLs / 5.3.4.1:
Excitons and isoelectronic traps / 5.3.4.2:
High-excitation regime / 5.3.4.3:
References for 5.3.4 / 5.3.4.5:
CdSe, ZnSe, (Cd,Zn)Se, and (Zn,Mg)(S,Se) superlattices and coupled quantum wells / 5.3.5:
Electronic states in strained-layer superlattices / 5.3.5.1:
Optical functions in superlattices and multiple quantum wells / 5.3.5.1.2:
Magnetic field / 5.3.5.1.3:
References for 5.3.5 / 5.3.5.4:
Selenide DMS superlattices and coupled quantum wells / 5.3.6:
Electronic states in diluted magnetic semiconductor superlattices (DMS SLs) / 5.3.6.1:
Spin-relaxation and spin injection / 5.3.6.1.2:
References for 5.3.6 / 5.3.6.3:
CdSe/CdS and CdS/ZnSe intrinsic Stark superlattices / 5.3.7:
References for 5.3.7 / 5.3.7.1:
Zincblende Sulphide/Selenide superlattices / 5.3.8:
References for 5.3.8
CdS/ZnS, CdS/(Cd,ZnS), and (Cd,Zn)S/ZnS superlattices / 5.3.9:
References for 5.3.9
Quantum-wire structures / 5.4:
Telluride quantum wires / 5.4.1:
Selenide quantum wires / 5.4.1.1:
Electron-phonon coupling / 5.4.2.1:
Optical gain / 5.4.2.1.3:
Exciton recombination / 5.4.2.3:
Sulfide quantum wires / 5.4.3:
Oxide quantum wires / 5.4.4:
Semimagnetic quantum wires / 5.4.5:
Mn-related transitions / 5.4.5.1:
Magneto-optics / 5.4.5.2:
References for 5.4 / 5.4.6:
II-VI Quantum dots I - Nanocrystals / U. Woggon ; S.V. Gaponenko5.5:
HgTe / 5.5.1:
CdTe / 5.5.2:
The low-density regime / 5.5.2.1:
Size-dependent energy states / 5.5.2.1.1:
Splitting of states / 5.5.2.1.2:
Interaction with phonons / 5.5.2.1.3:
Impurity states / 5.5.2.1.4:
Coherent dynamics, relaxation and recombination of optical excitations / 5.5.2.2:
Dot-dot interactions, quantum dot arrays / 5.5.2.5:
(Cd,Hg)Te / 5.5.3:
Cd(Te,Se) and Cd(Te,S) / 5.5.4:
ZnTe / 5.5.5:
HgSe / 5.5.6:
CdSe / 5.5.7:
Biexciton states / 5.5.7.1:
Nonlinear optical coefficients / 5.5.7.2.2:
Stimulated emission and optical gain / 5.5.7.2.3:
Dephasing times and homogeneous linewidth / 5.5.7.3:
Cd(Se,S) / 5.5.7.4.2:
(Cd,Mn)Se / 5.5.8.1:
(Cd,Zn)Se / 5.5.10:
ZnSe / 5.5.11:
HgS / 5.5.11.1:
CdS / 5.5.13:
Nonlinear-optical coefficients / 5.5.13.1:
(Zn,Cd)S / 5.5.13.2.3:
(Zn,Mn)S / 5.5.15:
ZnS / 5.5.16:
CdO / 5.5.16.1:
ZnO / 5.5.18:
References for 5.5 / 5.5.18.1:
II-VI Quantum dots II - Self-organized, epitaxially grown nanostructures / 5.6:
Excitonic states and their fine structure / 5.6.1:
Charged excitons / 5.6.2.1.2:
(Cd,Mn)Te, (Cd,Mg)Te / 5.6.2.1.3:
CdSe and ZnCdSe / 5.6.4:
References for 5.6 / 5.6.6.1:
Landolt-Börnstein
Group III: Condensed Matter
Semiconductor Quantum Structures / Volume 34:
11.

電子ブック

EB
John Impagliazzo
出版情報: Springer eBooks Computer Science , Springer US, 2006
所蔵情報: loading…
12.

電子ブック

EB
John Impagliazzo
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2006
所蔵情報: loading…
13.

図書

図書
Thomas Barkowsky
出版情報: Berlin ; Tokyo : Springer, c2002  x, 174 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2541 . Lecture notes in artificial intelligence
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Mental Processing of Geographic Knowledge / 1.1:
Cognitive Maps / 1.1.1:
Mental Construction of Spatial Knowledge: An Example / 1.1.2:
Theses and Assumptions / 1.2:
Knowledge Construction and Human Memory / 1.2.1:
Characteristics of Geographic Knowledge / 1.2.2:
Spatial Knowledge Organization in Long-Term Memory / 1.2.3:
Visual Mental Images and Diagrammatic Reasoning / 1.2.4:
Research Questions and Goals / 1.3:
Research Questions / 1.3.1:
Goals / 1.3.2:
Approach: Experimental Computational Modeling / 1.4:
Computational Cognition / 1.4.1:
Building Computational Models / 1.4.2:
Modeling as Experimental Approach / 1.4.3:
Organization of this Thesis / 1.5:
State of the Art / 2:
Spatial Knowledge Conceptions: Cognitive Maps and Other Metaphors / 2.1:
Rubber Sheet Maps, Cognitive Atlases, Collages, and Geographic Information Systems / 2.1.1:
Spatial Mental Models / 2.1.3:
Other Conceptions / 2.1.4:
Human Memory / 2.2:
Working Memory / 2.2.1:
Long-Term Memory / 2.2.2:
Interacting Memory Systems in Mental Imagery / 2.2.3:
Mental Imagery / 2.3:
The Imagery Debate / 2.3.1:
Psychological and Neuroscientific Foundations / 2.3.2:
The Kosslyn Models / 2.3.3:
The 1980 Model / 2.3.3.1:
The 1994 Model / 2.3.3.2:
Spatial Reasoning / 2.4:
Topology / 2.4.1:
Orientation / 2.4.2:
Distance / 2.4.3:
Shape / 2.4.4:
Computational Geometry / 2.4.5:
Diagrammatic Reasoning / 2.5:
Propositional vs. Analogical Knowledge Representation / 2.5.1:
Types of Diagrammatic Reasoning Systems / 2.5.2:
Examples for Diagrammatic Reasoning Architectures / 2.5.3:
DEPIC-2D / 2.5.3.1:
WHISPER / 2.5.3.2:
Computational Imagery / 2.5.3.3:
Summary / 2.6:
MIRAGE - Developing the Model / 3:
Characteristics of the Model / 3.1:
Evaluating the Working Memory Representation / 3.1.1:
MIRAGE - Outline of the Model / 3.2:
Types of Entities and Spatial Relations in MIRAGE / 3.3:
Entities / 3.3.1:
Relations / 3.3.2:
Subsystems, Structures, and Processes / 3.4:
Long-Term Memory Activation / 3.4.1:
Spatial Knowledge Fragments / 3.4.1.1:
The Hierarchical Long-Term Memory Representation / 3.4.1.2:
The Access Process / 3.4.1.3:
The Activated Long-Term Memory Representation / 3.4.1.4:
The Construction Process / 3.4.1.5:
Visual Mental Image Construction / 3.4.2:
The Enriched Representation / 3.4.2.1:
The Conversion Process / 3.4.2.2:
The Visual Buffer / 3.4.2.3:
The Visualization Process / 3.4.2.4:
Image Inspection / 3.4.3:
The Inspection Result / 3.4.3.1:
The Inspection Process / 3.4.3.2:
Visual Mental Image Construction in Detail / 4:
A More Demanding Scenario / 4.1:
Diagrammatic Representations of Lean Knowledge / 4.2:
Consequences for Image Construction / 4.3:
Relaxation of Spatial Constraints / 4.3.1:
Completion of Qualitative Spatial Relations / 4.3.2:
Interpretation of Qualitative Spatial Relations / 4.3.3:
Image Revision Strategies in MIRAGE / 4.4:
Unstable Images / 4.4.1:
Omission of Facts / 4.4.2:
Revision of Relational Completion / 4.4.3:
Variation of Relational Completion / 4.4.3.1:
Relaxation of Relational Completion / 4.4.3.2:
Revision of Image Specification / 4.4.4:
Depicting Qualitative Spatial Relations / 4.4.4.1:
Depicting Unspecified Spatial Relations / 4.4.4.2:
MIRAGE Implementation / 4.5:
Computational Tools for Modeling: SIMSIS / 5.1:
The Idea of SIMSIS / 5.1.1:
The Aspect Map Model / 5.1.1.1:
Modeling Aspect Maps in SIMSIS / 5.1.1.2:
Depictions, Scenarios, and Interpretations / 5.1.2:
SIMSIS Pictures / 5.1.2.1:
SIMSIS Facts and Scenarios / 5.1.2.2:
SIMSIS Interpretations and Meaning Systems / 5.1.2.3:
Realization of the Model / 5.2:
MIRAGE Structures / 5.2.1:
Entities, Relations, and Spatial Knowledge Fragments / 5.2.1.1:
The Long-Term Memory Representations / 5.2.1.2:
MIRAGE Processes / 5.2.1.3:
The Long-Term Memory Activation Processes / 5.2.2.1:
The Image Construction Processes / 5.2.2.2:
Operation and Behavior of MIRAGE / 5.2.2.3:
Conclusion and Outlook / 6:
Results and Discussion / 6.1:
Reflecting the Theses / 6.2.1:
Spatial Knowledge Construction / 6.2.1.1:
Underdeterminacy in Long-Term Memory / 6.2.1.2:
Fragmentation and Hierarchical Organization / 6.2.1.3:
Visual Mental Imagery / 6.2.1.4:
The Parameters of the Model / 6.2.2:
Explicit Parameters / 6.2.2.1:
Implicit Parameters / 6.2.2.2:
Conclusions / 6.2.3:
Future Work / 6.3:
Extending MIRAGE / 6.3.1:
Geographic Entities and Spatial Relations / 6.3.1.1:
Partially Aggregated Knowledge Structures / 6.3.1.2:
Mental Imagery Functionality / 6.3.1.3:
Parameters of MIRAGE / 6.3.1.4:
Empirical Investigations / 6.3.2:
Use of Default Knowledge / 6.3.2.1:
Control of Image Construction / 6.3.2.2:
Processing Capacity for Mental Images / 6.3.2.3:
Use of Chunking Facilities / 6.3.2.4:
Combination of Propositional and Image-Based Reasoning / 6.3.2.5:
Application Perspectives / 6.3.3:
Adequate Presentation of Visual Information / 6.3.3.1:
External Support of Reasoning in Mental Images / 6.3.3.2:
Bibliography
Index
Introduction / 1:
Mental Processing of Geographic Knowledge / 1.1:
Cognitive Maps / 1.1.1:
14.

電子ブック

EB
Thomas Barkowsky
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2002
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Mental Processing of Geographic Knowledge / 1.1:
Cognitive Maps / 1.1.1:
Mental Construction of Spatial Knowledge: An Example / 1.1.2:
Theses and Assumptions / 1.2:
Knowledge Construction and Human Memory / 1.2.1:
Characteristics of Geographic Knowledge / 1.2.2:
Spatial Knowledge Organization in Long-Term Memory / 1.2.3:
Visual Mental Images and Diagrammatic Reasoning / 1.2.4:
Research Questions and Goals / 1.3:
Research Questions / 1.3.1:
Goals / 1.3.2:
Approach: Experimental Computational Modeling / 1.4:
Computational Cognition / 1.4.1:
Building Computational Models / 1.4.2:
Modeling as Experimental Approach / 1.4.3:
Organization of this Thesis / 1.5:
State of the Art / 2:
Spatial Knowledge Conceptions: Cognitive Maps and Other Metaphors / 2.1:
Rubber Sheet Maps, Cognitive Atlases, Collages, and Geographic Information Systems / 2.1.1:
Spatial Mental Models / 2.1.3:
Other Conceptions / 2.1.4:
Human Memory / 2.2:
Working Memory / 2.2.1:
Long-Term Memory / 2.2.2:
Interacting Memory Systems in Mental Imagery / 2.2.3:
Mental Imagery / 2.3:
The Imagery Debate / 2.3.1:
Psychological and Neuroscientific Foundations / 2.3.2:
The Kosslyn Models / 2.3.3:
The 1980 Model / 2.3.3.1:
The 1994 Model / 2.3.3.2:
Spatial Reasoning / 2.4:
Topology / 2.4.1:
Orientation / 2.4.2:
Distance / 2.4.3:
Shape / 2.4.4:
Computational Geometry / 2.4.5:
Diagrammatic Reasoning / 2.5:
Propositional vs. Analogical Knowledge Representation / 2.5.1:
Types of Diagrammatic Reasoning Systems / 2.5.2:
Examples for Diagrammatic Reasoning Architectures / 2.5.3:
DEPIC-2D / 2.5.3.1:
WHISPER / 2.5.3.2:
Computational Imagery / 2.5.3.3:
Summary / 2.6:
MIRAGE - Developing the Model / 3:
Characteristics of the Model / 3.1:
Evaluating the Working Memory Representation / 3.1.1:
MIRAGE - Outline of the Model / 3.2:
Types of Entities and Spatial Relations in MIRAGE / 3.3:
Entities / 3.3.1:
Relations / 3.3.2:
Subsystems, Structures, and Processes / 3.4:
Long-Term Memory Activation / 3.4.1:
Spatial Knowledge Fragments / 3.4.1.1:
The Hierarchical Long-Term Memory Representation / 3.4.1.2:
The Access Process / 3.4.1.3:
The Activated Long-Term Memory Representation / 3.4.1.4:
The Construction Process / 3.4.1.5:
Visual Mental Image Construction / 3.4.2:
The Enriched Representation / 3.4.2.1:
The Conversion Process / 3.4.2.2:
The Visual Buffer / 3.4.2.3:
The Visualization Process / 3.4.2.4:
Image Inspection / 3.4.3:
The Inspection Result / 3.4.3.1:
The Inspection Process / 3.4.3.2:
Visual Mental Image Construction in Detail / 4:
A More Demanding Scenario / 4.1:
Diagrammatic Representations of Lean Knowledge / 4.2:
Consequences for Image Construction / 4.3:
Relaxation of Spatial Constraints / 4.3.1:
Completion of Qualitative Spatial Relations / 4.3.2:
Interpretation of Qualitative Spatial Relations / 4.3.3:
Image Revision Strategies in MIRAGE / 4.4:
Unstable Images / 4.4.1:
Omission of Facts / 4.4.2:
Revision of Relational Completion / 4.4.3:
Variation of Relational Completion / 4.4.3.1:
Relaxation of Relational Completion / 4.4.3.2:
Revision of Image Specification / 4.4.4:
Depicting Qualitative Spatial Relations / 4.4.4.1:
Depicting Unspecified Spatial Relations / 4.4.4.2:
MIRAGE Implementation / 4.5:
Computational Tools for Modeling: SIMSIS / 5.1:
The Idea of SIMSIS / 5.1.1:
The Aspect Map Model / 5.1.1.1:
Modeling Aspect Maps in SIMSIS / 5.1.1.2:
Depictions, Scenarios, and Interpretations / 5.1.2:
SIMSIS Pictures / 5.1.2.1:
SIMSIS Facts and Scenarios / 5.1.2.2:
SIMSIS Interpretations and Meaning Systems / 5.1.2.3:
Realization of the Model / 5.2:
MIRAGE Structures / 5.2.1:
Entities, Relations, and Spatial Knowledge Fragments / 5.2.1.1:
The Long-Term Memory Representations / 5.2.1.2:
MIRAGE Processes / 5.2.1.3:
The Long-Term Memory Activation Processes / 5.2.2.1:
The Image Construction Processes / 5.2.2.2:
Operation and Behavior of MIRAGE / 5.2.2.3:
Conclusion and Outlook / 6:
Results and Discussion / 6.1:
Reflecting the Theses / 6.2.1:
Spatial Knowledge Construction / 6.2.1.1:
Underdeterminacy in Long-Term Memory / 6.2.1.2:
Fragmentation and Hierarchical Organization / 6.2.1.3:
Visual Mental Imagery / 6.2.1.4:
The Parameters of the Model / 6.2.2:
Explicit Parameters / 6.2.2.1:
Implicit Parameters / 6.2.2.2:
Conclusions / 6.2.3:
Future Work / 6.3:
Extending MIRAGE / 6.3.1:
Geographic Entities and Spatial Relations / 6.3.1.1:
Partially Aggregated Knowledge Structures / 6.3.1.2:
Mental Imagery Functionality / 6.3.1.3:
Parameters of MIRAGE / 6.3.1.4:
Empirical Investigations / 6.3.2:
Use of Default Knowledge / 6.3.2.1:
Control of Image Construction / 6.3.2.2:
Processing Capacity for Mental Images / 6.3.2.3:
Use of Chunking Facilities / 6.3.2.4:
Combination of Propositional and Image-Based Reasoning / 6.3.2.5:
Application Perspectives / 6.3.3:
Adequate Presentation of Visual Information / 6.3.3.1:
External Support of Reasoning in Mental Images / 6.3.3.2:
Bibliography
Index
Introduction / 1:
Mental Processing of Geographic Knowledge / 1.1:
Cognitive Maps / 1.1.1:
15.

図書

図書
Robert Alicki and Mark Fannes
出版情報: Oxford : Oxford University Press, c2001  xiv, 278 p. ; 24 cm
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Basic tools for quantum mechanics / 2:
Hilbert spaces and operators / 2.1:
Vector spaces / 2.1.1:
Banach and Hilbert spaces / 2.1.2:
Geometrical properties of Hilbert spaces / 2.1.3:
Orthonormal bases / 2.1.4:
Subspaces and projectors / 2.1.5:
Linear maps between Banach spaces / 2.1.6:
Linear functionals and Dirac notation / 2.1.7:
Adjoints of bounded operators / 2.1.8:
Hermitian, unitary and normal operators / 2.1.9:
Partial isometries and polar decomposition / 2.1.10:
Spectra of operators / 2.1.11:
Unbounded operators / 2.1.12:
Measures / 2.2:
Measures and integration / 2.2.1:
Distributions / 2.2.2:
Hilbert spaces of functions / 2.2.3:
Spectral measures / 2.2.4:
Probability in quantum mechanics / 2.3:
Pure states / 2.3.1:
Mixed states, density matrices / 2.3.2:
Observables in quantum mechanics / 2.4:
Compact operators / 2.4.1:
Weyl quantization / 2.4.2:
Composed systems / 2.5:
Direct sums / 2.5.1:
Tensor products / 2.5.2:
Observables and states of composite systems / 2.5.3:
Notes / 2.6:
Deterministic dynamics / 3:
Deterministic quantum dynamics / 3.1:
Time-independent Hamiltonians / 3.1.1:
Perturbations of Hamiltonians / 3.1.2:
Time-dependent Hamiltonians / 3.1.3:
Periodic perturbations and Floquet operators / 3.1.4:
Kicked dynamics / 3.1.5:
Classical limits / 3.2:
Classical differentiable dynamics / 3.3:
Self-adjoint Laplacians on compact manifolds / 3.4:
Spin chains / 3.5:
Local observables / 4.1:
States of a spin system / 4.2:
Symmetries and dynamics / 4.3:
Algebraic tools / 5:
C*-algebras / 5.1:
Examples / 5.2:
States and representations / 5.3:
Dynamical systems and von Neumann algebras / 5.4:
Fermionic dynamical systems / 5.5:
Fermions in Fock space / 6.1:
Fock space / 6.1.1:
Creation and annihilation / 6.1.2:
Second quantization / 6.1.3:
The CAR-algebra / 6.2:
Canonical anticommutation relations / 6.2.1:
Quasi-free automorphisms / 6.2.2:
Quasi-free states / 6.2.3:
Ergodic theory / 6.3:
Ergodicity in classical systems / 7.1:
Ergodicity in quantum systems / 7.2:
Asymptotic Abelianness / 7.2.1:
Multitime correlations / 7.2.2:
Fluctuations around ergodic means / 7.2.3:
Lyapunov exponents / 7.3:
Classical dynamics / 7.3.1:
Quantum dynamics / 7.3.2:
Quantum irreversibility / 7.4:
Measurement theory / 8.1:
Open quantum systems / 8.2:
Complete positivity / 8.3:
Quantum dynamical semigroups / 8.4:
Quasi-free completely positive maps / 8.5:
Entropy / 8.6:
von Neumann entropy / 9.1:
Technical preliminaries / 9.1.1:
Properties of von Neumann's entropy / 9.1.2:
Mean entropy / 9.1.3:
Entropy of quasi-free states / 9.1.4:
Relative entropy / 9.2:
Finite-dimensional case / 9.2.1:
Maximum entropy principle / 9.2.2:
Algebraic setting / 9.2.3:
Dynamical entropy / 9.3:
Operational partitions / 10.1:
Symbolic dynamics / 10.2:
The entropy / 10.2.2:
Some technical results / 10.3:
The quantum shift / 10.4:
The free shift / 10.4.2:
Infinite entropy / 10.4.3:
Powers-Price shifts / 10.4.4:
Classical dynamical entropy / 10.5:
The Kolmogorov-Sinai invariant / 11.1:
H-density / 11.2:
Finite quantum systems / 12:
Quantum chaos / 12.1:
Time scales / 12.1.1:
Spectral statistics / 12.1.2:
Semi-classical limits / 12.1.3:
The kicked top / 12.2:
The model / 12.2.1:
The classical limit / 12.2.2:
Kicked mean-field Heisenberg model / 12.2.3:
Chaotic properties / 12.2.4:
Gram matrices / 12.3:
Entropy production / 12.4:
Model systems / 12.5:
Entropy of the quantum cat map / 13.1:
Ruelle's inequality / 13.2:
Non-commutative Riemannian structures / 13.2.1:
Non-commutative Lyapunov exponents / 13.2.2:
Quasi-free Fermion dynamics / 13.2.3:
Description of the model / 13.3.1:
Main result / 13.3.2:
Sketch of the proof / 13.3.3:
Epilogue / 13.4:
References
Index
Introduction / 1:
Basic tools for quantum mechanics / 2:
Hilbert spaces and operators / 2.1:
16.

図書

図書
Hans Bisswanger
出版情報: Weinheim : WILEY-VCH, c2008  xviii, 301 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface to the Second English Edition
Preface to the First English Edition
Symbols and Abbreviations
Introduction and Definitions
References
Multiple Equilibria / 1:
Diffusion / 1.1:
Interaction between Macromolecules and Ligands / 1.2:
Binding Constants / 1.2.1:
Macromolecules with One Binding Site / 1.2.2:
Macromolecules with Identical Independent Binding Sites / 1.3:
General Binding Equation / 1.3.1:
Graphic Representations of the Binding Equation / 1.3.2:
Direct and Linear Diagrams / 1.3.2.1:
Analysis of Binding Data from Spectroscopic Titrations / 1.3.2.2:
Binding of Different Ligands, Competition / 1.3.3:
Non-competitive Binding / 1.3.4:
Macromolecules with Non-identical, Independent Binding Sites / 1.4:
Macromolecules with Identical, Interacting Binding Sites, Cooperativity / 1.5:
The Hill Equation / 1.5.1:
The Adair Equation / 1.5.2:
The Pauling Model / 1.5.3:
Allosteric Enzymes / 1.5.4:
The Symmetry or Concerted Model / 1.5.5:
The Sequential Model and Negative Cooperativity / 1.5.6:
Analysis of Cooperativity / 1.5.7:
Physiological Aspects of Cooperativity / 1.5.8:
Examples of Allosteric Enzymes / 1.5.9:
Hemoglobin / 1.5.9.1:
Aspartate Transcarbamoylase / 1.5.9.2:
Aspartokinase / 1.5.9.3:
Phosphofructokinase / 1.5.9.4:
Allosteric Regulation of the Glycogen Metabolism / 1.5.9.5:
Membrane Bound Enzymes and Receptors / 1.5.9.6:
Non-identical, Interacting Binding Sites / 1.6:
Enzyme Kinetics / 2:
Reaction Order / 2.1:
First Order Reactions / 2.1.1:
Second Order Reactions / 2.1.2:
Zero Order Reactions / 2.1.3:
Steady-State Kinetics and the Michaelis-Menten Equation / 2.2:
Derivation of the Michaelis-Menten Equation / 2.2.1:
Analysis of Enzyme Kinetic Data / 2.3:
Graphical Representations of the Michaelis-Menten Equation / 2.3.1:
Direct and Semi-logarithmic Representations / 2.3.1.1:
Direct Linear Plots / 2.3.1.2:
Linearization Methods / 2.3.1.3:
Analysis of Progress Curves / 2.3.2:
Integrated Michaelis-Menten Equation / 2.3.2.1:
Determination of Reaction Rates / 2.3.2.2:
Graphic Methods for Rate Determination / 2.3.2.3:
Graphic Determination of True Initial Rates / 2.3.2.4:
Reversible Enzyme Reactions / 2.4:
Rate Equation for Reversible Enzyme Reactions / 2.4.1:
The Haldane Relationship / 2.4.2:
Product Inhibition / 2.4.3:
Enzyme Inhibition / 2.5:
Unspecific Enzyme Inhibition / 2.5.1:
Irreversible Enzyme Inhibition / 2.5.2:
General Features of Irreversible Enzyme Inhibition / 2.5.2.1:
Suicide Substrates / 2.5.2.2:
Transition State Analogs / 2.5.2.3:
Analysis of Irreversible Inhibitions / 2.5.2.4:
Reversible Enzyme Inhibition / 2.5.3:
General Rate Equation / 2.5.3.1:
Non-Competitive Inhibition and Graphic Representation of Inhibition Data / 2.5.3.2:
Competitive Inhibition / 2.5.3.3:
Uncompetitive Inhibition / 2.5.3.4:
Partially Non-competitive Inhibition / 2.5.3.5:
Partially Uncompetitive Inhibition / 2.5.3.6:
Partially Competitive Inhibition / 2.5.3.7:
Noncompetitive and Uncompetitive Product Inhibition / 2.5.3.8:
Substrate Inhibition / 2.5.3.9:
Enzyme Reactions with Two Competing Substrates / 2.5.4:
Different Enzymes Catalyzing the Same Reaction / 2.5.5:
Multi-substrate Reactions / 2.6:
Nomenclature / 2.6.1:
Random Mechanism / 2.6.2:
Ordered Mechanism / 2.6.3:
Ping-pong Mechanism / 2.6.4:
Product Inhibition in Multi-substrate Reactions / 2.6.5:
Haldane Relationships in Multi-substrate Reactions / 2.6.6:
Mechanisms with more than Two Substrates / 2.6.7:
Other Nomenclatures for Multi-substrate Reactions / 2.6.8:
Derivation of Rate Equations of Complex Enzyme Mechanisms / 2.7:
King-Altmann Method / 2.7.1:
Simplified Derivations Applying Graph Theory / 2.7.2:
Combination of Equilibrium and Steady State Approach / 2.7.3:
Kinetic Treatment of Allosteric Enzymes / 2.8:
Hysteretic Enzymes / 2.8.1:
Kinetic Cooperativity, the Slow Transition Model / 2.8.2:
pH and Temperature Dependence of Enzymes / 2.9:
pH Optimum and Determination of pK Values / 2.9.1:
pH Stability / 2.9.2:
Temperature Dependence / 2.9.3:
Isotope Exchange / 2.10:
Isotope Exchange Kinetics / 2.10.1:
Isotope Effects / 2.10.2:
Primary Kinetic Isotope Effect / 2.10.2.1:
Influence of the Kinetic Isotope Effect on V and Km / 2.10.2.2:
Other Isotope Effects / 2.10.2.3:
Special Enzyme Mechanisms / 2.11:
Ribozymes / 2.11.1:
Polymer Substrates / 2.11.2:
Kinetics of Immobilized Enzymes / 2.11.3:
External Diffusion Limitation / 2.11.3.1:
Internal Diffusion Limitation / 2.11.3.2:
Inhibition of Immobilized Enzymes / 2.11.3.3:
pH and Temperature Behavior of Immobilized Enzymes / 2.11.3.4:
Transport Processes / 2.11.4:
Enzyme Reactions at Membrane Interfaces / 2.11.5:
Application of Statistical Methods in Enzyme Kinetics / 2.12:
General Remarks / 2.12.1:
Statistical Terms Used in Enzyme Kinetics / 2.12.2:
Methods / 3:
Methods for Investigation of Multiple Equilibria / 3.1:
Equilibrium Dialysis and General Aspects of Binding Measurements / 3.1.1:
Equilibrium Dialysis / 3.1.1.1:
Control Experiments and Sources of Error / 3.1.1.2:
Continuous Equilibrium Dialysis / 3.1.1.3:
Ultrafiltration / 3.1.2:
Gel Filtration / 3.1.3:
Batch Method / 3.1.3.1:
The Method of Hummel and Dreyer / 3.1.3.2:
Other Gel Filtration Methods / 3.1.3.3:
Ultracentrifugation / 3.1.4:
Fixed Angle Ultracentrifugation Methods / 3.1.4.1:
Sucrose Gradient Centrifugation / 3.1.4.2:
Surface Plasmon Resonance / 3.1.5:
Electrochemical Methods / 3.2:
The Oxygen Electrode / 3.2.1:
The CO2 Electrode / 3.2.2:
Potentiometry, Redox Potentials / 3.2.3:
The pH-stat / 3.2.4:
Polarography / 3.2.5:
Calorimetry / 3.3:
Spectroscopic Methods / 3.4:
Absorption Spectroscopy / 3.4.1:
The Lambert-Beer Law / 3.4.1.1:
Spectral Properties of Enzymes and Ligands / 3.4.1.2:
Structure of Spectrophotometers / 3.4.1.3:
Double Beam Spectrophotometer / 3.4.1.4:
Difference Spectroscopy / 3.4.1.5:
The Dual Wavelength Spectrophotometer / 3.4.1.6:
Photochemical Action Spectra / 3.4.1.7:
Bioluminescence / 3.4.2:
Fluorescence / 3.4.3:
Quantum Yield / 3.4.3.1:
Structure of Spectrofluorimeters / 3.4.3.2:
Perturbations of Fluorescence Measurements / 3.4.3.3:
Fluorescent Compounds (Fluorophores) / 3.4.3.4:
Radiationless Energy Transfer / 3.4.3.5:
Fluorescence Polarization / 3.4.3.6:
Pulse Fluorimetry / 3.4.3.7:
Circular Dichroism and Optical Rotation Dispersion / 3.4.4:
Infrared and Raman Spectroscopy / 3.4.5:
IR Spectroscopy / 3.4.5.1:
Raman Spectroscopy / 3.4.5.2:
Applications / 3.4.5.3:
Electron Paramagnetic Resonance Spectroscopy / 3.4.6:
Measurement of Fast Reactions / 3.5:
Flow Methods / 3.5.1:
The Continuous Flow Method / 3.5.1.1:
The Stopped-flow Method / 3.5.1.2:
Measurement of Enzyme Reactions by Flow Methods / 3.5.1.3:
Determination of the Dead Time / 3.5.1.4:
Relaxation Methods / 3.5.2:
The Temperature Jump Method / 3.5.2.1:
The Pressure Jump Method / 3.5.2.2:
The Electric Field Method / 3.5.2.3:
Flash Photolysis, Pico- and Femto-second Spectroscopy / 3.5.3:
Evaluation of Rapid Kinetic Reactions (Transient Kinetics) / 3.5.4:
Subject Index
Preface to the Second English Edition
Preface to the First English Edition
Symbols and Abbreviations
17.

図書

図書
editors, Hisham Z. Massoud ... [et al.]
出版情報: Pennington, N.J. : Electrochemical Society, c2000  xiv, 539 p. ; 27 cm
シリーズ名: Proceedings / [Electrochemical Society] ; v. 2000-2
所蔵情報: loading…
18.

電子ブック

EB
Abhishek Singh., Abhishek Singh, Baibhav Singh
出版情報: Springer eBooks Computer Science , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Assembly Language
Introduction / 1.0:
Registers / 1.1:
General Purpose Register / 1.1.1:
FLAGS Register / 1.1.2:
80x86 Instruction Format / 1.2:
Instruction Prefix / 1.2.1:
Lock and Repeat Prefixes / 1.2.2:
Segment Override Prefixes / 1.2.3:
Opcode / 1.2.4:
Instructions / 1.3:
Basic Instructions / 1.3.1:
Floating Point Instruction / 1.3.2:
Stack Setup / 1.4:
Passing Parameters in C to the Procedure / 1.4.1:
Local Data Space on the Stack / 1.4.2:
Calling Conventions / 1.5:
cdecl calling convention / 1.5.1:
fastcall calling convention / 1.5.2:
stdcall calling convention / 1.5.3:
thiscall / 1.5.4:
Data Constructs / 1.6:
Global Variables / 1.6.1:
Local Variables / 1.6.2:
Imported Variables / 1.6.3:
Thread Local Storage (TLS) / 1.6.5:
Executable Data Section / 1.6.6:
Representation of Arithmetic Operations in Assembly / 1.7:
Multiplication / 1.7.1:
Division / 1.7.2:
Modulo / 1.7.3:
Representation of Data Structure in Assembly / 1.8:
Representation of Array in Assembly / 1.8.1:
Representation of Linked List in Assembly / 1.8.2:
Virtual Function Call in Assembly / 1.9:
Representation of classes in Assembly / 1.9.1:
Conclusion / 1.10:
Fundamental of Windows
Memory Management / 2.0:
Virtual Memory Management / 2.1.1:
Virtual Memory Management in Windows NT / 2.1.1.1:
Impact of Hooking / 2.1.1.2:
Segmented Memory Management / 2.1.2:
Paged Memory Management / 2.1.3:
Kernel Memory and User Memory / 2.2:
Kernel Memory Space / 2.2.1:
Section Object / 2.2.2:
Virtual Address Descriptor / 2.3:
User Mode Address Space / 2.3.1:
Memory Management in Windows / 2.3.2:
Objects and Handles / 2.3.3:
Named Objects / 2.3.4:
Processes and Threads / 2.4:
Context Switching / 2.4.1:
Context Switches and Mode Switches / 2.4.1.1:
Synchronization Objects / 2.4.2:
Critical Section / 2.4.2.1:
Mutex / 2.4.2.2:
Semaphore / 2.4.2.3:
Event / 2.4.2.4:
Metered Section / 2.4.2.5:
Process Initialization Sequence / 2.5:
Application Programming Interface / 2.5.1:
Reversing Windows NT / 2.6:
ExpEchoPoolCalls / 2.6.1:
ObpShowAllocAndFree / 2.6.2:
LpcpTraceMessages / 2.6.3:
MmDebug / 2.6.4:
NtGlobalFlag / 2.6.5:
SepDumpSD / 2.6.6:
CmLogLevel and CmLogSelect / 2.6.7:
Security Features in Vista / 2.7:
Address Space Layout Randomization (ASLR) / 2.7.1:
Stack Randomization / 2.7.2:
Heap Defenses / 2.7.3:
NX / 2.7.4:
/GS / 2.7.5:
Pointer Encoding / 2.7.6:
Cryptographic API in Windows Vista / 2.7.7:
Crypto-Agility / 2.7.8:
CryptoAgility in CNG / 2.7.9:
Algorithm Providers / 2.7.10:
Random Number Generator / 2.7.11:
Hash Functions / 2.7.12:
Symmetric Encryption / 2.7.13:
Asymmetric Encryption / 2.7.14:
Signatures and Verification / 2.7.15:
Portable Executable File Format / 2.8:
PE file Format / 3.0:
Import Address Table / 3.2:
Executable and Linking Format / 3.3:
ELF Header / 3.3.1:
The Program Header Table / 3.3.2:
Reversing Binaries for Identifying Vulnerabilities / 3.4:
Stack Overflow / 4.0:
CAN-2002-1123 Microsoft SQL Server 'Hello' Authentication Buffer Overflow" / 4.1.1:
CAN-2004-0399 Exim Buffer Overflow / 4.1.2:
Stack Checking / 4.1.3:
Off-by-One Overflow / 4.2:
OpenBSD 2.7 FTP Daemon Off-by-One / 4.2.1:
Non-Executable Memory / 4.2.3:
Heap Overflows / 4.3:
Heap Based Overflows / 4.3.1:
Integer Overflows / 4.4:
Types Integer Overflow / 4.4.1:
CAN-2004-0417 CVS Max dotdot Protocol Command Integer Overflow / 4.4.2:
Format String / 4.5:
Format String Vulnerability / 4.5.1:
Format String Denial of Service Attack / 4.5.2:
Format String Vulnerability Reading Attack / 4.5.3:
SEH Structure Exception Handler / 4.6:
Exploiting the SEH / 4.6.1:
Writing Exploits General Concepts / 4.7:
Stack Overflow Exploits / 4.7.1:
Injection Techniques / 4.7.2:
Optimizing the Injection Vector / 4.7.3:
The Location of the Payload / 4.8:
Direct Jump (Guessing Offsets) / 4.8.1:
Blind Return / 4.8.2:
Pop Return / 4.8.3:
No Operation Sled / 4.8.4:
Call Register / 4.8.5:
Push Return / 4.8.6:
Calculating Offset / 4.8.7:
Fundamental of Reverse Engineering / 4.9:
Anti-Reversing Method / 5.0:
Anti Disassembly / 5.2.1:
Linear Sweep Disassembler / 5.2.1.1:
Recursive Traversal Disassembler / 5.2.1.2:
Evasion of Disassemble / 5.2.1.3:
Self Modifying Code / 5.2.2:
Virtual Machine Obfuscation / 5.2.3:
Anti Debugging Techniques / 5.3:
BreakPoints / 5.3.1:
Software Breakpoint / 5.3.1.1:
Hardware Breakpoint / 5.3.1.2:
Detecting Hardware BreakPoint / 5.3.1.3:
Virtual Machine Detection / 5.4:
Checking Fingerprint Inside Memory, File System and Registry / 5.4.1:
Checking System Tables / 5.4.2:
Checking Processor Instruction Set / 5.4.3:
Unpacking / 5.5:
Manual Unpacking of Software / 5.5.1:
Finding an Original Entry Point of an Executable / 5.5.1.1:
Taking Memory Dump / 5.5.1.2:
Import Table Reconstruction / 5.5.1.3:
Import Redirection and Code emulation / 5.5.1.4:
Appendix / 5.6:
Index
Assembly Language
Introduction / 1.0:
Registers / 1.1:
19.

電子ブック

EB
Abhishek Singh., Abhishek Singh, Baibhav Singh
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Assembly Language
Introduction / 1.0:
Registers / 1.1:
General Purpose Register / 1.1.1:
FLAGS Register / 1.1.2:
80x86 Instruction Format / 1.2:
Instruction Prefix / 1.2.1:
Lock and Repeat Prefixes / 1.2.2:
Segment Override Prefixes / 1.2.3:
Opcode / 1.2.4:
Instructions / 1.3:
Basic Instructions / 1.3.1:
Floating Point Instruction / 1.3.2:
Stack Setup / 1.4:
Passing Parameters in C to the Procedure / 1.4.1:
Local Data Space on the Stack / 1.4.2:
Calling Conventions / 1.5:
cdecl calling convention / 1.5.1:
fastcall calling convention / 1.5.2:
stdcall calling convention / 1.5.3:
thiscall / 1.5.4:
Data Constructs / 1.6:
Global Variables / 1.6.1:
Local Variables / 1.6.2:
Imported Variables / 1.6.3:
Thread Local Storage (TLS) / 1.6.5:
Executable Data Section / 1.6.6:
Representation of Arithmetic Operations in Assembly / 1.7:
Multiplication / 1.7.1:
Division / 1.7.2:
Modulo / 1.7.3:
Representation of Data Structure in Assembly / 1.8:
Representation of Array in Assembly / 1.8.1:
Representation of Linked List in Assembly / 1.8.2:
Virtual Function Call in Assembly / 1.9:
Representation of classes in Assembly / 1.9.1:
Conclusion / 1.10:
Fundamental of Windows
Memory Management / 2.0:
Virtual Memory Management / 2.1.1:
Virtual Memory Management in Windows NT / 2.1.1.1:
Impact of Hooking / 2.1.1.2:
Segmented Memory Management / 2.1.2:
Paged Memory Management / 2.1.3:
Kernel Memory and User Memory / 2.2:
Kernel Memory Space / 2.2.1:
Section Object / 2.2.2:
Virtual Address Descriptor / 2.3:
User Mode Address Space / 2.3.1:
Memory Management in Windows / 2.3.2:
Objects and Handles / 2.3.3:
Named Objects / 2.3.4:
Processes and Threads / 2.4:
Context Switching / 2.4.1:
Context Switches and Mode Switches / 2.4.1.1:
Synchronization Objects / 2.4.2:
Critical Section / 2.4.2.1:
Mutex / 2.4.2.2:
Semaphore / 2.4.2.3:
Event / 2.4.2.4:
Metered Section / 2.4.2.5:
Process Initialization Sequence / 2.5:
Application Programming Interface / 2.5.1:
Reversing Windows NT / 2.6:
ExpEchoPoolCalls / 2.6.1:
ObpShowAllocAndFree / 2.6.2:
LpcpTraceMessages / 2.6.3:
MmDebug / 2.6.4:
NtGlobalFlag / 2.6.5:
SepDumpSD / 2.6.6:
CmLogLevel and CmLogSelect / 2.6.7:
Security Features in Vista / 2.7:
Address Space Layout Randomization (ASLR) / 2.7.1:
Stack Randomization / 2.7.2:
Heap Defenses / 2.7.3:
NX / 2.7.4:
/GS / 2.7.5:
Pointer Encoding / 2.7.6:
Cryptographic API in Windows Vista / 2.7.7:
Crypto-Agility / 2.7.8:
CryptoAgility in CNG / 2.7.9:
Algorithm Providers / 2.7.10:
Random Number Generator / 2.7.11:
Hash Functions / 2.7.12:
Symmetric Encryption / 2.7.13:
Asymmetric Encryption / 2.7.14:
Signatures and Verification / 2.7.15:
Portable Executable File Format / 2.8:
PE file Format / 3.0:
Import Address Table / 3.2:
Executable and Linking Format / 3.3:
ELF Header / 3.3.1:
The Program Header Table / 3.3.2:
Reversing Binaries for Identifying Vulnerabilities / 3.4:
Stack Overflow / 4.0:
CAN-2002-1123 Microsoft SQL Server 'Hello' Authentication Buffer Overflow" / 4.1.1:
CAN-2004-0399 Exim Buffer Overflow / 4.1.2:
Stack Checking / 4.1.3:
Off-by-One Overflow / 4.2:
OpenBSD 2.7 FTP Daemon Off-by-One / 4.2.1:
Non-Executable Memory / 4.2.3:
Heap Overflows / 4.3:
Heap Based Overflows / 4.3.1:
Integer Overflows / 4.4:
Types Integer Overflow / 4.4.1:
CAN-2004-0417 CVS Max dotdot Protocol Command Integer Overflow / 4.4.2:
Format String / 4.5:
Format String Vulnerability / 4.5.1:
Format String Denial of Service Attack / 4.5.2:
Format String Vulnerability Reading Attack / 4.5.3:
SEH Structure Exception Handler / 4.6:
Exploiting the SEH / 4.6.1:
Writing Exploits General Concepts / 4.7:
Stack Overflow Exploits / 4.7.1:
Injection Techniques / 4.7.2:
Optimizing the Injection Vector / 4.7.3:
The Location of the Payload / 4.8:
Direct Jump (Guessing Offsets) / 4.8.1:
Blind Return / 4.8.2:
Pop Return / 4.8.3:
No Operation Sled / 4.8.4:
Call Register / 4.8.5:
Push Return / 4.8.6:
Calculating Offset / 4.8.7:
Fundamental of Reverse Engineering / 4.9:
Anti-Reversing Method / 5.0:
Anti Disassembly / 5.2.1:
Linear Sweep Disassembler / 5.2.1.1:
Recursive Traversal Disassembler / 5.2.1.2:
Evasion of Disassemble / 5.2.1.3:
Self Modifying Code / 5.2.2:
Virtual Machine Obfuscation / 5.2.3:
Anti Debugging Techniques / 5.3:
BreakPoints / 5.3.1:
Software Breakpoint / 5.3.1.1:
Hardware Breakpoint / 5.3.1.2:
Detecting Hardware BreakPoint / 5.3.1.3:
Virtual Machine Detection / 5.4:
Checking Fingerprint Inside Memory, File System and Registry / 5.4.1:
Checking System Tables / 5.4.2:
Checking Processor Instruction Set / 5.4.3:
Unpacking / 5.5:
Manual Unpacking of Software / 5.5.1:
Finding an Original Entry Point of an Executable / 5.5.1.1:
Taking Memory Dump / 5.5.1.2:
Import Table Reconstruction / 5.5.1.3:
Import Redirection and Code emulation / 5.5.1.4:
Appendix / 5.6:
Index
Assembly Language
Introduction / 1.0:
Registers / 1.1:
20.

電子ブック

EB
Joakim Nivre
出版情報: SpringerLink Books - AutoHoldings , Springer Netherlands, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Inductive Dependency Parsing / 1.1:
The Need for Robust Disambiguation / 1.2:
Outline of the Book / 1.3:
Natural Language Parsing / 2:
Syntactic Representations / 2.1:
Two Notions of Parsing / 2.2:
Grammar Parsing / 2.2.1:
Text Parsing / 2.2.2:
Competence and Performance / 2.2.3:
Methods for Text Parsing / 2.3:
Grammar-Driven Text Parsing / 2.3.1:
Data-Driven Text Parsing / 2.3.2:
Converging Approaches / 2.3.3:
Evaluation Criteria / 2.3.4:
Robustness / 2.4.1:
Disambiguation / 2.4.2:
Accuracy / 2.4.3:
Efficiency / 2.4.4:
Dependency Parsing / 3:
Dependency Grammar / 3.1:
The Notion of Dependency / 3.1.1:
Varieties of Dependency Grammar / 3.1.2:
Parsing with Dependency Representations / 3.2:
Grammar-Driven Dependency Parsing / 3.2.1:
Data-Driven Dependency Parsing / 3.2.2:
The Case for Dependency Parsing / 3.2.3:
A Framework for Dependency Parsing / 3.3:
Texts, Sentences and Tokens / 3.3.1:
Dependency Graphs / 3.3.2:
Parsing Algorithm / 3.3.3:
Configurations / 3.4.1:
Transitions / 3.4.2:
Deterministic Parsing / 3.4.3:
Algorithm Analysis / 3.4.4:
Evaluation Criteria Revisited / 3.4.5:
A Framework for Inductive Dependency Parsing / 4:
Inductive Inference / 4.1.1:
History-Based Models / 4.1.3:
Parsing Methods / 4.1.4:
Learning Methods / 4.1.5:
Oracle Parsing / 4.1.6:
Features and Models / 4.2:
Feature Functions / 4.2.1:
Static Features / 4.2.2:
Dynamic Features / 4.2.3:
Feature Models / 4.2.4:
Memory-Based Learning / 4.3:
Memory-Based Learning and Classification / 4.3.1:
Learning Algorithm Parameters / 4.3.2:
Memory-Based Language Processing / 4.3.3:
MaltParser / 4.4:
Architecture / 4.4.1:
Implementation / 4.4.2:
Treebank Parsing / 5:
Treebanks and Parsing / 5.1:
Treebank Evaluation / 5.1.1:
Treebank Learning / 5.1.2:
Treebanks for Dependency Parsing / 5.1.3:
Experimental Methodology / 5.2:
Treebank Data / 5.2.1:
Models and Algorithms / 5.2.2:
Evaluation / 5.2.3:
Feature Model Parameters / 5.3:
Part-of-Speech Context / 5.3.1:
Dependency Structure / 5.3.2:
Lexicalization / 5.3.3:
Learning Curves / 5.3.4:
Neighbor Space and Distance Metric / 5.4:
Weighting Schemes / 5.4.2:
Final Evaluation / 5.5:
Accuracy and Efficiency / 5.5.1:
Related Work / 5.5.2:
Error Analysis / 5.5.3:
Conclusion / 6:
Main Contributions / 6.1:
Future Directions / 6.2:
References
Index
Introduction / 1:
Inductive Dependency Parsing / 1.1:
The Need for Robust Disambiguation / 1.2:
21.

電子ブック

EB
Jin Zhang
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
Scientific visualization and information visualization / 1.1.2:
Information retrieval / 1.2:
Browsing vs. query searching / 1.2.1:
Information at micro-level and macro-level / 1.2.2:
Spatial Characteristics of information space / 1.2.3:
Spatial characteristics of browsing / 1.2.4:
Perceptual and cognitive perspectives of visualization / 1.3:
Perceptual perspective / 1.3.1:
Cognitive perspective / 1.3.2:
Visualization for information retrieval / 1.4:
Rationale / 1.4.1:
Three information retrieval visualization paradigms / 1.4.2:
Procedures of establishing an information retrieval visualization model / 1.4.3:
Summary / 1.5:
Information Retrieval Preliminaries / Chapter 2:
Vector space model / 2.1:
Term weighting methods / 2.2:
Stop words / 2.2.1:
Inverse document frequency / 2.2.2:
The Salton term weighting method / 2.2.3:
Another term weighting method / 2.2.4:
Probability term weighting method / 2.2.5:
Similarity measures / 2.3:
Inner product similarity measure / 2.3.1:
Dice co-efficient similarity measure / 2.3.2:
The Jaccard co-efficient similarity measure / 2.3.3:
Overlap co-efficient similarity measure / 2.3.4:
Cosine similarity measure / 2.3.5:
Distance similarity measure / 2.3.6:
Angle-distance integrated similarity measure / 2.3.7:
The Pearson r correlation measure / 2.3.8:
Information retrieval (evaluation) models / 2.4:
Direction-based retrieval (evaluation) model / 2.4.1:
Distance-based retrieval (evaluation) model / 2.4.2:
Ellipse retrieval (evaluation) model / 2.4.3:
Conjunction retrieval (evaluation) model / 2.4.4:
Disjunction evaluation model / 2.4.5:
The Cassini oval retrieval (evaluation) model / 2.4.6:
Clustering algorithms / 2.5:
Non-hierarchical clustering algorithm / 2.5.1:
Hierarchical clustering algorithm / 2.5.2:
Evaluation of retrieval results / 2.6:
Visualization Models for Multiple Reference Points / 2.7:
Multiple references points / 3.1:
Model for fixed multiple reference points / 3.2:
Models for movable multiple reference points / 3.3:
Description of the original VIBE algorithm / 3.3.1:
Discussions about the model / 3.3.2:
Model for automatic reference point rotation / 3.4:
Definition of the visual space / 3.4.1:
Rotation of a reference point / 3.4.2:
Implication of information retrieval / 3.5:
Euclidean Spatial Characteristic Based Visualization Models / 3.6:
Euclidean space and its characteristics / 4.1:
Introduction to the information retrieval evaluation models / 4.2:
The distance-angel-based visualization model / 4.3:
The visual space definition / 4.3.1:
Visualization for information retrieval evaluation models / 4.3.2:
The angle-angle-based visualization model / 4.4:
The distance-distance-based visualization model / 4.4.1:
Kohonen Self-Organizing Map-An Artificial Neural Network / 4.5.1:
Introduction to neural networks / 5.1:
Definition of neural network / 5.1.1:
Characteristics and structures of neuron network / 5.1.2:
Kohonen self-organizing maps / 5.2:
Kohonen self-organizing map structures / 5.2.1:
Learning processing of the SOM algorithm / 5.2.2:
Feature map labeling / 5.2.3:
The SOM algorithm description / 5.2.4:
Implication of the SOM in information retrieval / 5.3:
Pathfinder Associative Network / 5.4:
Pathfinder associative network properties and descriptions / 6.1:
Definitions of concepts and explanations / 6.1.1:
The algorithm description / 6.1.2:
Graph layout method / 6.1.3:
Implications on information retrieval / 6.2:
Author co-citation analysis / 6.2.1:
Term associative network / 6.2.2:
Hyperlink / 6.2.3:
Search in Pathfinder associative networks / 6.2.4:
Multidimensional Scaling / 6.3:
MDS analysis method descriptions / 7.1:
Classical MDS / 7.1.1:
Non-metric MDS / 7.1.2:
Metric MDS / 7.1.3:
Implications of MDS techniques for information retrieval / 7.2:
Definitions of displayed objects and proximity between objects / 7.2.1:
Exploration in a MDS display space / 7.2.2:
Discussion / 7.2.3:
Internet Information Visualization / 7.3:
Introduction / 8.1:
Internet characteristics / 8.1.1:
Internet information organization and presentation methods / 8.1.2:
Internet information utilization / 8.1.3:
Challenges of the internet / 8.1.4:
Internet information visualization / 8.2:
Visualization of internet information structure / 8.2.1:
Internet information seeking visualization / 8.2.2:
Visualization of web traffic information / 8.2.3:
Discussion history visualization / 8.2.4:
Ambiguity in Information Visualization / 8.3:
Ambiguity and its implication in information visualization / 9.1:
Reason of ambiguity in information visualization / 9.1.1:
Implication of ambiguity for information visualization / 9.1.2:
Ambiguity analysis in information retrieval visualization models / 9.2:
Ambiguity in the Euclidean spatial characteristic based information models / 9.2.1:
Ambiguity in the multiple reference point based information visualization models / 9.2.2:
Ambiguity in the Pathfinder network / 9.2.3:
Ambiguity in SOM / 9.2.4:
Ambiguity in MDS / 9.2.5:
The Implication of Metaphors in Information Visualization / 9.3:
Definition, basic elements, and characteristics of a metaphor / 10.1:
Cognitive foundation of metaphors / 10.2:
Mental models, metaphors, and human computer interaction / 10.3:
Metaphors in human computer interaction / 10.3.1:
Mental models / 10.3.2:
Mental models in HCI / 10.3.3:
Metaphors in information visualization retrieval / 10.4:
Rationales for using metaphors / 10.4.1:
Metaphorical information retrieval visualization environments / 10.4.2:
Procedures and principles for metaphor application / 10.5:
Procedure for metaphor application / 10.5.1:
Guides for designing a good metaphorical visual information retrieval environment / 10.5.2:
Benchmarks and Evaluation Criteria for Information Retrieval Visualization / 10.6:
Information retrieval visualization evaluation / 11.1:
Benchmarks and evaluation standards / 11.2:
Factors affecting evaluation standards / 11.2.1:
Principles for developing evaluation benchmarks / 11.2.2:
Four proposed categories for evaluation criteria / 11.2.3:
Descriptions of proposed benchmarks / 11.2.4:
Afterthoughts / 11.3:
Comparisons of the introduced visualization models / 12.1:
Issues and challenges / 12.3:
Bibliography / 12.4:
Index
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
22.

電子ブック

EB
Jin Zhang
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
Scientific visualization and information visualization / 1.1.2:
Information retrieval / 1.2:
Browsing vs. query searching / 1.2.1:
Information at micro-level and macro-level / 1.2.2:
Spatial Characteristics of information space / 1.2.3:
Spatial characteristics of browsing / 1.2.4:
Perceptual and cognitive perspectives of visualization / 1.3:
Perceptual perspective / 1.3.1:
Cognitive perspective / 1.3.2:
Visualization for information retrieval / 1.4:
Rationale / 1.4.1:
Three information retrieval visualization paradigms / 1.4.2:
Procedures of establishing an information retrieval visualization model / 1.4.3:
Summary / 1.5:
Information Retrieval Preliminaries / Chapter 2:
Vector space model / 2.1:
Term weighting methods / 2.2:
Stop words / 2.2.1:
Inverse document frequency / 2.2.2:
The Salton term weighting method / 2.2.3:
Another term weighting method / 2.2.4:
Probability term weighting method / 2.2.5:
Similarity measures / 2.3:
Inner product similarity measure / 2.3.1:
Dice co-efficient similarity measure / 2.3.2:
The Jaccard co-efficient similarity measure / 2.3.3:
Overlap co-efficient similarity measure / 2.3.4:
Cosine similarity measure / 2.3.5:
Distance similarity measure / 2.3.6:
Angle-distance integrated similarity measure / 2.3.7:
The Pearson r correlation measure / 2.3.8:
Information retrieval (evaluation) models / 2.4:
Direction-based retrieval (evaluation) model / 2.4.1:
Distance-based retrieval (evaluation) model / 2.4.2:
Ellipse retrieval (evaluation) model / 2.4.3:
Conjunction retrieval (evaluation) model / 2.4.4:
Disjunction evaluation model / 2.4.5:
The Cassini oval retrieval (evaluation) model / 2.4.6:
Clustering algorithms / 2.5:
Non-hierarchical clustering algorithm / 2.5.1:
Hierarchical clustering algorithm / 2.5.2:
Evaluation of retrieval results / 2.6:
Visualization Models for Multiple Reference Points / 2.7:
Multiple references points / 3.1:
Model for fixed multiple reference points / 3.2:
Models for movable multiple reference points / 3.3:
Description of the original VIBE algorithm / 3.3.1:
Discussions about the model / 3.3.2:
Model for automatic reference point rotation / 3.4:
Definition of the visual space / 3.4.1:
Rotation of a reference point / 3.4.2:
Implication of information retrieval / 3.5:
Euclidean Spatial Characteristic Based Visualization Models / 3.6:
Euclidean space and its characteristics / 4.1:
Introduction to the information retrieval evaluation models / 4.2:
The distance-angel-based visualization model / 4.3:
The visual space definition / 4.3.1:
Visualization for information retrieval evaluation models / 4.3.2:
The angle-angle-based visualization model / 4.4:
The distance-distance-based visualization model / 4.4.1:
Kohonen Self-Organizing Map-An Artificial Neural Network / 4.5.1:
Introduction to neural networks / 5.1:
Definition of neural network / 5.1.1:
Characteristics and structures of neuron network / 5.1.2:
Kohonen self-organizing maps / 5.2:
Kohonen self-organizing map structures / 5.2.1:
Learning processing of the SOM algorithm / 5.2.2:
Feature map labeling / 5.2.3:
The SOM algorithm description / 5.2.4:
Implication of the SOM in information retrieval / 5.3:
Pathfinder Associative Network / 5.4:
Pathfinder associative network properties and descriptions / 6.1:
Definitions of concepts and explanations / 6.1.1:
The algorithm description / 6.1.2:
Graph layout method / 6.1.3:
Implications on information retrieval / 6.2:
Author co-citation analysis / 6.2.1:
Term associative network / 6.2.2:
Hyperlink / 6.2.3:
Search in Pathfinder associative networks / 6.2.4:
Multidimensional Scaling / 6.3:
MDS analysis method descriptions / 7.1:
Classical MDS / 7.1.1:
Non-metric MDS / 7.1.2:
Metric MDS / 7.1.3:
Implications of MDS techniques for information retrieval / 7.2:
Definitions of displayed objects and proximity between objects / 7.2.1:
Exploration in a MDS display space / 7.2.2:
Discussion / 7.2.3:
Internet Information Visualization / 7.3:
Introduction / 8.1:
Internet characteristics / 8.1.1:
Internet information organization and presentation methods / 8.1.2:
Internet information utilization / 8.1.3:
Challenges of the internet / 8.1.4:
Internet information visualization / 8.2:
Visualization of internet information structure / 8.2.1:
Internet information seeking visualization / 8.2.2:
Visualization of web traffic information / 8.2.3:
Discussion history visualization / 8.2.4:
Ambiguity in Information Visualization / 8.3:
Ambiguity and its implication in information visualization / 9.1:
Reason of ambiguity in information visualization / 9.1.1:
Implication of ambiguity for information visualization / 9.1.2:
Ambiguity analysis in information retrieval visualization models / 9.2:
Ambiguity in the Euclidean spatial characteristic based information models / 9.2.1:
Ambiguity in the multiple reference point based information visualization models / 9.2.2:
Ambiguity in the Pathfinder network / 9.2.3:
Ambiguity in SOM / 9.2.4:
Ambiguity in MDS / 9.2.5:
The Implication of Metaphors in Information Visualization / 9.3:
Definition, basic elements, and characteristics of a metaphor / 10.1:
Cognitive foundation of metaphors / 10.2:
Mental models, metaphors, and human computer interaction / 10.3:
Metaphors in human computer interaction / 10.3.1:
Mental models / 10.3.2:
Mental models in HCI / 10.3.3:
Metaphors in information visualization retrieval / 10.4:
Rationales for using metaphors / 10.4.1:
Metaphorical information retrieval visualization environments / 10.4.2:
Procedures and principles for metaphor application / 10.5:
Procedure for metaphor application / 10.5.1:
Guides for designing a good metaphorical visual information retrieval environment / 10.5.2:
Benchmarks and Evaluation Criteria for Information Retrieval Visualization / 10.6:
Information retrieval visualization evaluation / 11.1:
Benchmarks and evaluation standards / 11.2:
Factors affecting evaluation standards / 11.2.1:
Principles for developing evaluation benchmarks / 11.2.2:
Four proposed categories for evaluation criteria / 11.2.3:
Descriptions of proposed benchmarks / 11.2.4:
Afterthoughts / 11.3:
Comparisons of the introduced visualization models / 12.1:
Issues and challenges / 12.3:
Bibliography / 12.4:
Index
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
23.

電子ブック

EB
Masao Nagasaki, Atsushi Doi, Andreas Dress, Hiroshi Matsuno, Satoru Miyano, Ayumu Saito, Martin Vingron, Martin Vingron, Gene Myers, Robert Giegerich, Walter Fitch, Pavel A. Pevzner. edited by Andreas Dress
出版情報: Springer eBooks Computer Science , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Introduction / 1:
Intracellular Events / 1.1:
Transcription, Translation, and Regulation / 1.1.1:
Signaling Pathways and Proteins / 1.1.2:
Metabolism and Genes / 1.1.3:
Intracellular Reactions and Pathways / 1.2:
Pathway Databases / 2:
Major Pathway Databases / 2.1:
KEGG / 2.1.1:
BioCyc / 2.1.2:
Ingenuity Pathways Knowledge Base / 2.1.3:
TRANSPATH / 2.1.4:
ResNet / 2.1.5:
Signal Transduction Knowledge Environment (STKE): Database of Cell Signaling / 2.1.6:
Reactome / 2.1.7:
Metabolome.jp / 2.1.8:
Summary and Conclusion / 2.1.9:
Software for Pathway Display / 2.2:
Ingenuity Pathway Analysis (IPA) / 2.2.1:
Pathway Builder / 2.2.2:
Pathway Studio / 2.2.3:
Connections Maps / 2.2.4:
Cytoscape / 2.2.5:
File Formats for Pathways / 2.3:
Gene Ontology / 2.3.1:
PSI MI / 2.3.2:
CellML / 2.3.3:
SBML / 2.3.4:
BioPAX / 2.3.5:
CSML/CSO / 2.3.6:
Pathway Simulation Software / 3:
Simulation Software Backend / 3.1:
Architecture: Deterministic, Probabilistic, or Hybrid? / 3.1.1:
Methods of Pathway Modeling / 3.1.2:
Major Simulation Software Tools / 3.2:
Gepasi/COPASI / 3.2.1:
Virtual Cell / 3.2.2:
Systems Biology Workbench (SBW), Cell Designer, JDesigner / 3.2.3:
Dizzy / 3.2.4:
E-Cell / 3.2.5:
Cell Illustrator / 3.2.6:
Summary / 3.2.7:
Starting Cell Illustrator / 4:
Installing Cell Illustrator / 4.1:
Operating Systems and Hardware Requirements / 4.1.1:
Cell Illustrator Lineup / 4.1.2:
Installing and Running Cell Illustrator / 4.1.3:
License Install / 4.1.4:
Basic Concepts in Cell Illustrator / 4.2:
Basic Concepts / 4.2.1:
Entity / 4.2.2:
Process / 4.2.3:
Connector / 4.2.4:
Rules for Connecting Elements / 4.2.5:
Icons for Elements / 4.2.6:
Editing a Model on Cell Illustrator / 4.3:
Adding Elements / 4.3.1:
Model Editing and Canvas Controls / 4.3.2:
Simulating Models / 4.4:
Simulation Settings / 4.4.1:
Graph Settings / 4.4.2:
Executing Simulation / 4.4.3:
Simulation Parameters and Rules / 4.5:
Creating a Model with Discrete Entity and Process / 4.5.1:
Creating a Model with Continuous Entity and Process / 4.5.2:
Concepts of Discrete and Continuous / 4.5.3:
Pathway Modeling Using Illustrated Elements / 4.6:
Creating Pathway Models Using Cell Illustrator / 4.7:
Degradation / 4.7.1:
Translocation / 4.7.2:
Transcription / 4.7.3:
Binding / 4.7.4:
Dissociation / 4.7.5:
Inhibition / 4.7.6:
Phosphorylation by Enzyme Reaction / 4.7.7:
Conclusion / 4.8:
Pathway Modeling and Simulation / 5:
Modeling Signaling Pathway / 5.1:
Main Players: Ligand and Receptor / 5.1.1:
Modeling EGFR Signaling with EGF Stimulation / 5.1.2:
Modeling Metabolic Pathways / 5.2:
Chemical Equations and Pathway Representations / 5.2.1:
Michaelis-Menten Kinetics and Cell Illustrator Pathway Representation / 5.2.2:
Creating Glycolysis Pathway Model / 5.2.3:
Simulation of Glycolysis Pathway / 5.2.4:
Improving the Model / 5.2.5:
Modeling Gene Regulatory Networks / 5.3:
Biological Clocks and Circadian Rhythms / 5.3.1:
Gene Regulatory Network for Circadian Rhythms in Mice / 5.3.2:
Modeling Circadian Rhythms in Mice / 5.3.3:
Creating Hypothesis by Simulation / 5.3.4:
Computational Platform for Systems Biology / 5.4:
Gene Network of Yeast / 6.1:
Computational Analysis of Gene Network / 6.2:
Displaying Gene Network / 6.2.1:
Layout of Gene Networks / 6.2.2:
Pathway Search Function / 6.2.3:
Extracting Subnetworks / 6.2.4:
Comparing Two Subnetworks / 6.2.5:
Further Functionalities for Systems Biology / 6.3:
Languages for Pathways: CSML 3.0 and CSO / 6.3.1:
SaaS Technology / 6.3.2:
Pathway Parameter Search / 6.3.3:
Much Faster Simulation / 6.3.4:
Exporting Pathway Models to Programming Languages / 6.3.5:
Pathway Layout Algorithms / 6.3.6:
Pathway Database Management System / 6.3.7:
More Visually: Automatic Generation of Icons / 6.3.8:
Bibliographic Notes
Index
Foreword
Preface
Introduction / 1:
24.

電子ブック

EB
Masao Nagasaki, Atsushi Doi, Andreas Dress, Hiroshi Matsuno, Satoru Miyano, Ayumu Saito, Martin Vingron, Martin Vingron, Gene Myers, Robert Giegerich, Walter Fitch, Pavel A. Pevzner. edited by Andreas Dress, Gene Myers
出版情報: SpringerLink Books - AutoHoldings , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Introduction / 1:
Intracellular Events / 1.1:
Transcription, Translation, and Regulation / 1.1.1:
Signaling Pathways and Proteins / 1.1.2:
Metabolism and Genes / 1.1.3:
Intracellular Reactions and Pathways / 1.2:
Pathway Databases / 2:
Major Pathway Databases / 2.1:
KEGG / 2.1.1:
BioCyc / 2.1.2:
Ingenuity Pathways Knowledge Base / 2.1.3:
TRANSPATH / 2.1.4:
ResNet / 2.1.5:
Signal Transduction Knowledge Environment (STKE): Database of Cell Signaling / 2.1.6:
Reactome / 2.1.7:
Metabolome.jp / 2.1.8:
Summary and Conclusion / 2.1.9:
Software for Pathway Display / 2.2:
Ingenuity Pathway Analysis (IPA) / 2.2.1:
Pathway Builder / 2.2.2:
Pathway Studio / 2.2.3:
Connections Maps / 2.2.4:
Cytoscape / 2.2.5:
File Formats for Pathways / 2.3:
Gene Ontology / 2.3.1:
PSI MI / 2.3.2:
CellML / 2.3.3:
SBML / 2.3.4:
BioPAX / 2.3.5:
CSML/CSO / 2.3.6:
Pathway Simulation Software / 3:
Simulation Software Backend / 3.1:
Architecture: Deterministic, Probabilistic, or Hybrid? / 3.1.1:
Methods of Pathway Modeling / 3.1.2:
Major Simulation Software Tools / 3.2:
Gepasi/COPASI / 3.2.1:
Virtual Cell / 3.2.2:
Systems Biology Workbench (SBW), Cell Designer, JDesigner / 3.2.3:
Dizzy / 3.2.4:
E-Cell / 3.2.5:
Cell Illustrator / 3.2.6:
Summary / 3.2.7:
Starting Cell Illustrator / 4:
Installing Cell Illustrator / 4.1:
Operating Systems and Hardware Requirements / 4.1.1:
Cell Illustrator Lineup / 4.1.2:
Installing and Running Cell Illustrator / 4.1.3:
License Install / 4.1.4:
Basic Concepts in Cell Illustrator / 4.2:
Basic Concepts / 4.2.1:
Entity / 4.2.2:
Process / 4.2.3:
Connector / 4.2.4:
Rules for Connecting Elements / 4.2.5:
Icons for Elements / 4.2.6:
Editing a Model on Cell Illustrator / 4.3:
Adding Elements / 4.3.1:
Model Editing and Canvas Controls / 4.3.2:
Simulating Models / 4.4:
Simulation Settings / 4.4.1:
Graph Settings / 4.4.2:
Executing Simulation / 4.4.3:
Simulation Parameters and Rules / 4.5:
Creating a Model with Discrete Entity and Process / 4.5.1:
Creating a Model with Continuous Entity and Process / 4.5.2:
Concepts of Discrete and Continuous / 4.5.3:
Pathway Modeling Using Illustrated Elements / 4.6:
Creating Pathway Models Using Cell Illustrator / 4.7:
Degradation / 4.7.1:
Translocation / 4.7.2:
Transcription / 4.7.3:
Binding / 4.7.4:
Dissociation / 4.7.5:
Inhibition / 4.7.6:
Phosphorylation by Enzyme Reaction / 4.7.7:
Conclusion / 4.8:
Pathway Modeling and Simulation / 5:
Modeling Signaling Pathway / 5.1:
Main Players: Ligand and Receptor / 5.1.1:
Modeling EGFR Signaling with EGF Stimulation / 5.1.2:
Modeling Metabolic Pathways / 5.2:
Chemical Equations and Pathway Representations / 5.2.1:
Michaelis-Menten Kinetics and Cell Illustrator Pathway Representation / 5.2.2:
Creating Glycolysis Pathway Model / 5.2.3:
Simulation of Glycolysis Pathway / 5.2.4:
Improving the Model / 5.2.5:
Modeling Gene Regulatory Networks / 5.3:
Biological Clocks and Circadian Rhythms / 5.3.1:
Gene Regulatory Network for Circadian Rhythms in Mice / 5.3.2:
Modeling Circadian Rhythms in Mice / 5.3.3:
Creating Hypothesis by Simulation / 5.3.4:
Computational Platform for Systems Biology / 5.4:
Gene Network of Yeast / 6.1:
Computational Analysis of Gene Network / 6.2:
Displaying Gene Network / 6.2.1:
Layout of Gene Networks / 6.2.2:
Pathway Search Function / 6.2.3:
Extracting Subnetworks / 6.2.4:
Comparing Two Subnetworks / 6.2.5:
Further Functionalities for Systems Biology / 6.3:
Languages for Pathways: CSML 3.0 and CSO / 6.3.1:
SaaS Technology / 6.3.2:
Pathway Parameter Search / 6.3.3:
Much Faster Simulation / 6.3.4:
Exporting Pathway Models to Programming Languages / 6.3.5:
Pathway Layout Algorithms / 6.3.6:
Pathway Database Management System / 6.3.7:
More Visually: Automatic Generation of Icons / 6.3.8:
Bibliographic Notes
Index
Foreword
Preface
Introduction / 1:
25.

電子ブック

EB
Ben Liblit, David Hutchison, Takeo Kanade, Association for Computing Machinery.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Perfect, or Close Enough / 1.1:
Automatic Failure Reporting / 1.2:
The Next Step Forward / 1.3:
Cooperative Bug Isolation / 1.4:
Instrumentation Framework / 2:
Basic Instrumentation Strategy / 2.1:
Sampling the Bernoulli Way / 2.1.1:
From Blocks to Functions / 2.1.2:
Interprocedural Issues / 2.1.3:
Instrumentation Schemes for Distributed Debugging / 2.2:
Issues in Remote Sampling / 2.2.1:
Counter-Based Instrumentation Schemes / 2.2.2:
Additional Instrumentation Schemes / 2.2.3:
Performance and Optimizations / 2.3:
Static Branch Prediction / 2.3.1:
Weightless Functions / 2.3.2:
Empty and Singleton Regions / 2.3.3:
Local Countdown Caching / 2.3.4:
Random Countdown Generation / 2.3.5:
Path Balancing / 2.3.6:
Statically Selective Sampling / 2.3.7:
Optimization Recap / 2.3.8:
Adaptive Sampling / 2.4:
Nonuniformity Via Multiple Countdowns / 2.4.1:
Nonuniformity Via Non-Unit Site Weights / 2.4.2:
Policy Notes / 2.4.3:
Realistic Sampling Rates / 2.5:
Practical Considerations / 3:
Native Compiler Integration / 3.1:
Static Site Information / 3.1.1:
Libraries and Plugins / 3.2:
Threads / 3.3:
Next-Sample Countdown / 3.3.1:
Predicate Counters / 3.3.2:
Compilation Unit Registry and Report File / 3.3.3:
Time Stamp Clock / 3.3.4:
Performance Evaluation / 3.3.5:
Privacy and Security / 3.4:
User Interaction / 3.5:
Status of the Public Deployment / 3.6:
Resource Requirements / 3.6.1:
Reporting Trends / 3.6.2:
Techniques for Statistical Debugging / 4:
Notation and Terminology / 4.1:
Predicate Elimination / 4.2:
Instrumentation Strategy / 4.2.1:
Elimination Strategies / 4.2.2:
Data Collection and Analysis / 4.2.3:
Refinement over time / 4.2.4:
Performance Impact / 4.2.5:
Limitations and Insights / 4.2.6:
Regularized Logistic Regression / 4.3:
Crash Prediction Using Logistic Regression / 4.3.1:
Moss: A Multiple-Bug Challenge / 4.3.2:
Nonuniform Sampling / 4.4.1:
Analysis Results / 4.4.2:
Iterative Bug Isolation and Elimination / 4.5:
Increase Scores / 4.5.1:
Statistical Interpretation / 4.5.2:
Balancing Specificity and Sensitivity / 4.5.3:
Redundancy Elimination / 4.5.4:
Case Studies / 4.6:
Moss / 4.6.1:
CCRYPT / 4.6.2:
BC / 4.6.3:
EXIF / 4.6.4:
Rhythmbox / 4.6.5:
Related Work / 5:
Static Analysis / 5.1:
Profiling and Tracing / 5.2:
Dynamic Analysis / 5.3:
Conclusion / 6:
References
Introduction / 1:
Perfect, or Close Enough / 1.1:
Automatic Failure Reporting / 1.2:
26.

電子ブック

EB
Ben Liblit, David Hutchison, Takeo Kanade, Association for Computing Machinery.
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Perfect, or Close Enough / 1.1:
Automatic Failure Reporting / 1.2:
The Next Step Forward / 1.3:
Cooperative Bug Isolation / 1.4:
Instrumentation Framework / 2:
Basic Instrumentation Strategy / 2.1:
Sampling the Bernoulli Way / 2.1.1:
From Blocks to Functions / 2.1.2:
Interprocedural Issues / 2.1.3:
Instrumentation Schemes for Distributed Debugging / 2.2:
Issues in Remote Sampling / 2.2.1:
Counter-Based Instrumentation Schemes / 2.2.2:
Additional Instrumentation Schemes / 2.2.3:
Performance and Optimizations / 2.3:
Static Branch Prediction / 2.3.1:
Weightless Functions / 2.3.2:
Empty and Singleton Regions / 2.3.3:
Local Countdown Caching / 2.3.4:
Random Countdown Generation / 2.3.5:
Path Balancing / 2.3.6:
Statically Selective Sampling / 2.3.7:
Optimization Recap / 2.3.8:
Adaptive Sampling / 2.4:
Nonuniformity Via Multiple Countdowns / 2.4.1:
Nonuniformity Via Non-Unit Site Weights / 2.4.2:
Policy Notes / 2.4.3:
Realistic Sampling Rates / 2.5:
Practical Considerations / 3:
Native Compiler Integration / 3.1:
Static Site Information / 3.1.1:
Libraries and Plugins / 3.2:
Threads / 3.3:
Next-Sample Countdown / 3.3.1:
Predicate Counters / 3.3.2:
Compilation Unit Registry and Report File / 3.3.3:
Time Stamp Clock / 3.3.4:
Performance Evaluation / 3.3.5:
Privacy and Security / 3.4:
User Interaction / 3.5:
Status of the Public Deployment / 3.6:
Resource Requirements / 3.6.1:
Reporting Trends / 3.6.2:
Techniques for Statistical Debugging / 4:
Notation and Terminology / 4.1:
Predicate Elimination / 4.2:
Instrumentation Strategy / 4.2.1:
Elimination Strategies / 4.2.2:
Data Collection and Analysis / 4.2.3:
Refinement over time / 4.2.4:
Performance Impact / 4.2.5:
Limitations and Insights / 4.2.6:
Regularized Logistic Regression / 4.3:
Crash Prediction Using Logistic Regression / 4.3.1:
Moss: A Multiple-Bug Challenge / 4.3.2:
Nonuniform Sampling / 4.4.1:
Analysis Results / 4.4.2:
Iterative Bug Isolation and Elimination / 4.5:
Increase Scores / 4.5.1:
Statistical Interpretation / 4.5.2:
Balancing Specificity and Sensitivity / 4.5.3:
Redundancy Elimination / 4.5.4:
Case Studies / 4.6:
Moss / 4.6.1:
CCRYPT / 4.6.2:
BC / 4.6.3:
EXIF / 4.6.4:
Rhythmbox / 4.6.5:
Related Work / 5:
Static Analysis / 5.1:
Profiling and Tracing / 5.2:
Dynamic Analysis / 5.3:
Conclusion / 6:
References
Introduction / 1:
Perfect, or Close Enough / 1.1:
Automatic Failure Reporting / 1.2:
27.

電子ブック

EB
Gian Piero Zarri
出版情報: Springer eBooks Computer Science , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Basic Principles / 1:
Narrative Information in an NKRL Context / 1.1:
Narratology and NKRL / 1.1.1:
The Notion of "Event" in an NKRL Context / 1.1.2:
Knowledge Representation and NKRL / 1.2:
"Standard" Ontologies and the "n-ary" Problem / 1.2.1:
A Plain "n-ary" Solution and Some Related Problems / 1.2.2:
In the Guise of Winding Up / 1.3:
The Knowledge Representation Strategy / 2:
Architecture of NKRL: the Four "Components" / 2.1:
The Data Structures of the Four Components / 2.2:
Definitional/Enumerative Data Structures / 2.2.1:
Descriptive/Factual Data Structures / 2.2.2:
Second-order Structures / 2.3:
The Completive Construction / 2.3.1:
Binding Occurrences / 2.3.2:
The Semantic and Ontological Contents / 2.4:
The Organization of the HClass Hierarchy / 3.1:
General Notions about Ontologies / 3.1.1:
HClass Architecture / 3.1.2:
The Organization of the HTemp Hierarchy / 3.2:
Recent Examples of "Structured" Ontological Systems / 3.2.1:
Main Features of Some Specific HTemp Structures / 3.2.2:
The Query and Inference Procedures / 3.3:
"Search Patterns" and Low-level Inferences / 4.1:
The Algorithmic Structure of Fum / 4.1.1:
Temporal Information and Indexing / 4.1.2:
High-level Inference Procedures / 4.2:
General Remarks about Some Reasoning Paradigms / 4.2.1:
Hypothesis Rules / 4.2.2:
Transformation Rules / 4.2.3:
Integrating the Two Main Inferencing Modes of NKRL / 4.2.4:
Inference Rules and Internet Filtering / 4.2.5:
Conclusion / 4.3:
Technological Enhancements / 5.1:
Theoretical Enhancements / 5.2:
Appendix A
Appendix B
References
Index
Basic Principles / 1:
Narrative Information in an NKRL Context / 1.1:
Narratology and NKRL / 1.1.1:
28.

電子ブック

EB
Gian Piero Zarri
出版情報: SpringerLink Books - AutoHoldings , Springer London, 2009
所蔵情報: loading…
目次情報: 続きを見る
Basic Principles / 1:
Narrative Information in an NKRL Context / 1.1:
Narratology and NKRL / 1.1.1:
The Notion of "Event" in an NKRL Context / 1.1.2:
Knowledge Representation and NKRL / 1.2:
"Standard" Ontologies and the "n-ary" Problem / 1.2.1:
A Plain "n-ary" Solution and Some Related Problems / 1.2.2:
In the Guise of Winding Up / 1.3:
The Knowledge Representation Strategy / 2:
Architecture of NKRL: the Four "Components" / 2.1:
The Data Structures of the Four Components / 2.2:
Definitional/Enumerative Data Structures / 2.2.1:
Descriptive/Factual Data Structures / 2.2.2:
Second-order Structures / 2.3:
The Completive Construction / 2.3.1:
Binding Occurrences / 2.3.2:
The Semantic and Ontological Contents / 2.4:
The Organization of the HClass Hierarchy / 3.1:
General Notions about Ontologies / 3.1.1:
HClass Architecture / 3.1.2:
The Organization of the HTemp Hierarchy / 3.2:
Recent Examples of "Structured" Ontological Systems / 3.2.1:
Main Features of Some Specific HTemp Structures / 3.2.2:
The Query and Inference Procedures / 3.3:
"Search Patterns" and Low-level Inferences / 4.1:
The Algorithmic Structure of Fum / 4.1.1:
Temporal Information and Indexing / 4.1.2:
High-level Inference Procedures / 4.2:
General Remarks about Some Reasoning Paradigms / 4.2.1:
Hypothesis Rules / 4.2.2:
Transformation Rules / 4.2.3:
Integrating the Two Main Inferencing Modes of NKRL / 4.2.4:
Inference Rules and Internet Filtering / 4.2.5:
Conclusion / 4.3:
Technological Enhancements / 5.1:
Theoretical Enhancements / 5.2:
Appendix A
Appendix B
References
Index
Basic Principles / 1:
Narrative Information in an NKRL Context / 1.1:
Narratology and NKRL / 1.1.1:
29.

電子ブック

EB
Kathryn E. Merrick, Mary Lou Maher
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Non-Player Characters and Reinforcement Learning / Part I:
Non-Player Characters in Multiuser Games / 1:
Types of Multiuser Games / 1.1:
Massively Multiplayer Online Role-Playing Games / 1.1.1:
Multiuser Simulation Games / 1.1.2:
Open-Ended Virtual Worlds / 1.1.3:
Character Roles in Multiuser Games / 1.2:
Existing Artificial Intelligence Techniques for Non-Player Characters in Multiuser Games / 1.3:
Reflexive Agents / 1.3.1:
Learning Agents / 1.3.2:
Evolutionary Agents / 1.3.3:
Smart Terrain / 1.3.4:
Summary / 1.4:
References / 1.5:
Motivation in Natural and Artificial Agents / 2:
Defining Motivation / 2.1:
Biological Theories of Motivation / 2.2:
Drive Theory / 2.2.1:
Motivational State Theory / 2.2.2:
Arousal / 2.2.3:
Cognitive Theories of Motivation / 2.3:
Curiosity / 2.3.1:
Operant Theory / 2.3.2:
Incentive / 2.3.3:
Achievement Motivation / 2.3.4:
Attribution Theory / 2.3.5:
Intrinsic Motivation / 2.3.6:
Social Theories of Motivation / 2.4:
Conformity / 2.4.1:
Cultural Effect / 2.4.2:
Evolution / 2.4.3:
Combined Motivation Theories / 2.5:
Maslow's Hierarchy of Needs / 2.5.1:
Existence Relatedness Growth Theory / 2.5.2:
Towards Motivated Reinforcement Learning / 2.6:
Defining Reinforcement Learning / 3.1:
Dynamic Programming / 3.1.1:
Monte Carlo Methods / 3.1.2:
Temporal Difference Learning / 3.1.3:
Reinforcement Learning in Complex Environments / 3.2:
Partially Observable Environments / 3.2.1:
Function Approximation / 3.2.2:
Hierarchical Reinforcement Learning / 3.2.3:
Motivated Reinforcement Learning / 3.3:
Using a Motivation Signal in Addition to a Reward Signal / 3.3.1:
Using a Motivation Signal Instead of a Reward Signal / 3.3.2:
Comparing the Behaviour of Learning Agents / 3.4:
Player Satisfaction / 4.1:
Psychological Flow / 4.1.1:
Structural Flow / 4.1.2:
Formalising Non-Player Character Behaviour / 4.2:
Models of Optimality for Reinforcement Learning / 4.2.1:
Characteristics of Motivated Reinforcement Learning / 4.2.2:
Comparing Motivated Reinforcement Learning Agents / 4.3:
Statistical Model for Identifying Learned Tasks / 4.3.1:
Behavioural Variety / 4.3.2:
Behavioural Complexity / 4.3.3:
Developing Curious Characters Using Motivated Reinforcement Learning / 4.4:
Curiosity, Motivation and Attention Focus / 5:
Agents in Complex, Dynamic Environments / 5.1:
States / 5.1.1:
Actions / 5.1.2:
Reward and Motivation / 5.1.3:
Motivation and Attention Focus / 5.2:
Observations / 5.2.1:
Events / 5.2.2:
Tasks and Task Selection / 5.2.3:
Experience-Based Reward as Cognitive Motivation / 5.2.4:
Arbitration Functions / 5.2.5:
A General Experience-Based Motivation Function / 5.2.6:
Curiosity as Motivation for Support Characters / 5.3:
Curiosity as Interesting Events / 5.3.1:
Curiosity as Interesting and Competence / 5.3.2:
Motivated Reinforcement Learning Agents / 5.4:
A General Motivated Reinforcement Learning Model / 6.1:
Algorithms for Motivated Reinforcement Learning / 6.2:
Motivated Flat Reinforcement Learning / 6.2.1:
Motivated Multioption Reinforcement Learning / 6.2.2:
Motivated Hierarchical Reinforcement Learning / 6.2.3:
Curious Characters in Games / 6.3:
Curious Characters for Multiuser Games / 7:
Motivated Reinforcement Learning for Support Characters in Massively Multiplayer Online Role-Playing Games / 7.1:
Character Behaviour in Small-Scale, Isolated Games Locations / 7.2:
Case Studies of Individual Characters / 7.2.1:
General Trends in Character Behaviour / 7.2.2:
Curious Characters for Games in Complex, Dynamic Environments / 7.3:
Designing Characters That Can Multitask / 8.1:
Designing Characters for Complex Tasks / 8.1.1:
Games That Change While Characters Are Learning / 8.2.1:
Curious Characters for Games in Second Life / 8.3.1:
Motivated Reinforcement Learning in Open-Ended Simulation Games / 9.1:
Game Design / 9.1.1:
Character Design / 9.1.2:
Evaluating Character Behaviour in Response to Game Play Sequences / 9.2:
Discussion / 9.2.1:
Future / 9.3:
Towards the Future / 10:
Using Motivated Reinforcement Learning in Non-Player Characters / 10.1:
Other Gaming Applications for Motivated Reinforcement Learning / 10.2:
Dynamic Difficulty Adjustment / 10.2.1:
Procedural Content Generation / 10.2.2:
Beyond Curiosity / 10.3:
Biological Models of Motivation / 10.3.1:
Cognitive Models of Motivation / 10.3.2:
Social Models of Motivation / 10.3.3:
Combined Models of Motivation / 10.3.4:
New Models of Motivated Learning / 10.4:
Motivated Supervised Learning / 10.4.1:
Motivated Unsupervised Learning / 10.4.2:
Evaluating the Behaviour of Motivated Learning Agents / 10.5:
Concluding Remarks / 10.6:
Index / 10.7:
Non-Player Characters and Reinforcement Learning / Part I:
Non-Player Characters in Multiuser Games / 1:
Types of Multiuser Games / 1.1:
30.

電子ブック

EB
Kathryn E. Merrick, Mary Lou Maher
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Non-Player Characters and Reinforcement Learning / Part I:
Non-Player Characters in Multiuser Games / 1:
Types of Multiuser Games / 1.1:
Massively Multiplayer Online Role-Playing Games / 1.1.1:
Multiuser Simulation Games / 1.1.2:
Open-Ended Virtual Worlds / 1.1.3:
Character Roles in Multiuser Games / 1.2:
Existing Artificial Intelligence Techniques for Non-Player Characters in Multiuser Games / 1.3:
Reflexive Agents / 1.3.1:
Learning Agents / 1.3.2:
Evolutionary Agents / 1.3.3:
Smart Terrain / 1.3.4:
Summary / 1.4:
References / 1.5:
Motivation in Natural and Artificial Agents / 2:
Defining Motivation / 2.1:
Biological Theories of Motivation / 2.2:
Drive Theory / 2.2.1:
Motivational State Theory / 2.2.2:
Arousal / 2.2.3:
Cognitive Theories of Motivation / 2.3:
Curiosity / 2.3.1:
Operant Theory / 2.3.2:
Incentive / 2.3.3:
Achievement Motivation / 2.3.4:
Attribution Theory / 2.3.5:
Intrinsic Motivation / 2.3.6:
Social Theories of Motivation / 2.4:
Conformity / 2.4.1:
Cultural Effect / 2.4.2:
Evolution / 2.4.3:
Combined Motivation Theories / 2.5:
Maslow's Hierarchy of Needs / 2.5.1:
Existence Relatedness Growth Theory / 2.5.2:
Towards Motivated Reinforcement Learning / 2.6:
Defining Reinforcement Learning / 3.1:
Dynamic Programming / 3.1.1:
Monte Carlo Methods / 3.1.2:
Temporal Difference Learning / 3.1.3:
Reinforcement Learning in Complex Environments / 3.2:
Partially Observable Environments / 3.2.1:
Function Approximation / 3.2.2:
Hierarchical Reinforcement Learning / 3.2.3:
Motivated Reinforcement Learning / 3.3:
Using a Motivation Signal in Addition to a Reward Signal / 3.3.1:
Using a Motivation Signal Instead of a Reward Signal / 3.3.2:
Comparing the Behaviour of Learning Agents / 3.4:
Player Satisfaction / 4.1:
Psychological Flow / 4.1.1:
Structural Flow / 4.1.2:
Formalising Non-Player Character Behaviour / 4.2:
Models of Optimality for Reinforcement Learning / 4.2.1:
Characteristics of Motivated Reinforcement Learning / 4.2.2:
Comparing Motivated Reinforcement Learning Agents / 4.3:
Statistical Model for Identifying Learned Tasks / 4.3.1:
Behavioural Variety / 4.3.2:
Behavioural Complexity / 4.3.3:
Developing Curious Characters Using Motivated Reinforcement Learning / 4.4:
Curiosity, Motivation and Attention Focus / 5:
Agents in Complex, Dynamic Environments / 5.1:
States / 5.1.1:
Actions / 5.1.2:
Reward and Motivation / 5.1.3:
Motivation and Attention Focus / 5.2:
Observations / 5.2.1:
Events / 5.2.2:
Tasks and Task Selection / 5.2.3:
Experience-Based Reward as Cognitive Motivation / 5.2.4:
Arbitration Functions / 5.2.5:
A General Experience-Based Motivation Function / 5.2.6:
Curiosity as Motivation for Support Characters / 5.3:
Curiosity as Interesting Events / 5.3.1:
Curiosity as Interesting and Competence / 5.3.2:
Motivated Reinforcement Learning Agents / 5.4:
A General Motivated Reinforcement Learning Model / 6.1:
Algorithms for Motivated Reinforcement Learning / 6.2:
Motivated Flat Reinforcement Learning / 6.2.1:
Motivated Multioption Reinforcement Learning / 6.2.2:
Motivated Hierarchical Reinforcement Learning / 6.2.3:
Curious Characters in Games / 6.3:
Curious Characters for Multiuser Games / 7:
Motivated Reinforcement Learning for Support Characters in Massively Multiplayer Online Role-Playing Games / 7.1:
Character Behaviour in Small-Scale, Isolated Games Locations / 7.2:
Case Studies of Individual Characters / 7.2.1:
General Trends in Character Behaviour / 7.2.2:
Curious Characters for Games in Complex, Dynamic Environments / 7.3:
Designing Characters That Can Multitask / 8.1:
Designing Characters for Complex Tasks / 8.1.1:
Games That Change While Characters Are Learning / 8.2.1:
Curious Characters for Games in Second Life / 8.3.1:
Motivated Reinforcement Learning in Open-Ended Simulation Games / 9.1:
Game Design / 9.1.1:
Character Design / 9.1.2:
Evaluating Character Behaviour in Response to Game Play Sequences / 9.2:
Discussion / 9.2.1:
Future / 9.3:
Towards the Future / 10:
Using Motivated Reinforcement Learning in Non-Player Characters / 10.1:
Other Gaming Applications for Motivated Reinforcement Learning / 10.2:
Dynamic Difficulty Adjustment / 10.2.1:
Procedural Content Generation / 10.2.2:
Beyond Curiosity / 10.3:
Biological Models of Motivation / 10.3.1:
Cognitive Models of Motivation / 10.3.2:
Social Models of Motivation / 10.3.3:
Combined Models of Motivation / 10.3.4:
New Models of Motivated Learning / 10.4:
Motivated Supervised Learning / 10.4.1:
Motivated Unsupervised Learning / 10.4.2:
Evaluating the Behaviour of Motivated Learning Agents / 10.5:
Concluding Remarks / 10.6:
Index / 10.7:
Non-Player Characters and Reinforcement Learning / Part I:
Non-Player Characters in Multiuser Games / 1:
Types of Multiuser Games / 1.1:
31.

電子ブック

EB
Marcus S. Fisher
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Chapter 1:
Managing Verification and Validation / Chapter 2:
The Axioms of Leadership / Section 2.1:
Planning / Section 2.2:
Establishing the V&V Requirements / Section 2.2.1:
Establishing the V&V Plan / Section 2.2.2:
Managing the Plan / Section 2.3:
Effectiveness Measures / Section 2.3.2:
Control Gates / Section 2.3.3:
Risk Management / Section 2.4:
Identify / Section 2.4.1:
Analyze / Section 2.4.2:
Plan / Section 2.4.3:
Track / Section 2.4.4:
Control / Section 2.4.5:
Risk Management Plan / Section 2.4.6:
Communication Structures / Section 2.5:
References
The Verification and Validation Life Cycle / Chapter 3:
Traceability Analysis / Section 3.1:
Interface Analysis / Section 3.2:
Phase Dependent Analysis / Section 3.3:
Requirements Analysis / Section 3.3.1:
Design Analysis / Section 3.3.2:
Code Analysis / Section 3.3.3:
Test Analysis / Section 3.3.4:
V&V Testing / Section 3.4:
Systems V&V / Chapter 4:
Appendix A
Index
Introduction / Chapter 1:
Managing Verification and Validation / Chapter 2:
The Axioms of Leadership / Section 2.1:
32.

図書

図書
Gabriel A. Pall ; forewords by A. Blantin [i.e. Blanton] Godfrey, Stephan H. Haeckelsa
出版情報: Boca Raton : St. Lucie Press, c2000  xxix, 325 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
The Case for Process Centering / Part I:
Doing Business in the Face of Change / Chapter 1.:
The Changing Business Environment / 1.1:
The Fundamental Success Factors / 1.1.1:
The New Challenge: Accelerated and Unpredictable Change / 1.1.2:
The Results of Change: What Is Really Happening? / 1.1.3:
The History of Change / 1.1.4:
Where Are We Today? / 1.2:
Problems with Today's Corporation / 1.2.1:
Today's Challenge / 1.2.2:
Summary / 1.3:
Traditional Ways of Coping with Change / Chapter 2.:
The Nature and Sources of Change / 2.1:
The Ping-Pong Response of Organizations to Change / 2.1.1:
Today's Customer-Driven Environment / 2.1.2:
Competition in the 21st Century / 2.1.3:
Traditional Responses to Change / 2.2:
Total Quality Management / 2.2.1:
Business Process Reengineering / 2.2.2:
Limitations of Traditional Reengineering / 2.2.3:
Limitations of the Traditional Approaches to Process Change / 2.3:
The Imperfection of Customer Needs / 2.3.1:
The Process Paradox / 2.3.2:
What Now? A Change in Managerial Attitudes / 2.4:
The Economic Value in Process Centering / 2.5:
Managing Work for Value Enhancement / 3.1:
The Value Contribution of Work / 3.1.1:
The Questionable Value Contribution of Downsizing / 3.1.2:
Investment in Business Processes for Economic Value Added / 3.2:
Impact on the Customer / 3.2.1:
Relevance to Overall Strategic Direction / 3.2.2:
The Viability of the Process / 3.2.3:
The Worth of the Process / 3.2.4:
Process Cost / 3.3:
The Cost of Conformance / 3.3.1:
The Cost of Nonconformance / 3.3.2:
The Cost of Quality as Management Tool / 3.3.3:
Productivity and Value / 3.3.4:
The Intellectual Value in Process Centering / 3.4:
The Emergence of Intellectual Assets / 4.1:
Intellectual Value Added / 4.2:
Customer Capital / 4.2.1:
Intellectual Capital / 4.2.2:
Net Added Value of Information Processed / 4.2.3:
The Role of Knowledge Management in Process Design / 4.3:
Process Centering Fundamentals / 4.4:
Understanding Processes / Chapter 5.:
Process Fundamentals / 5.1:
Classic Definitions / 5.1.1:
Process Control / 5.1.2:
Process Capability / 5.1.3:
Core Concepts of Process Thinking / 5.2:
Subject Process / 5.2.1:
Example for Subject Processes / 5.2.2:
Process Feedback / 5.2.3:
Process Quality / 5.2.4:
The Concept of Social Processes: The Human Element / 5.3:
Open Systems / 5.3.1:
Business Processes / 5.3.2:
Process Centering: The Basic Approach / 5.4:
Process Centering as the Prerequisite for Change / 6.1:
Definition of Process Centering / 6.1.1:
Commitment Management / 6.1.2:
Process Reengineering / 6.1.3:
Organizational Adaptability / 6.1.4:
Process Performance and Adaptability / 6.2:
Definitions / 6.2.1:
Adaptive Loops in Processes / 6.2.2:
The Superiority of Process Centering / 6.2.3:
Commitment Coordination and Process Alignment / 6.2.4:
What Needs To Be Done / 6.2.5:
Process Centering: The Response to Change / 6.3:
Response to Change / 7.1:
Upsizing and Growth / 7.1.1:
The Nature of Change / 7.1.2:
Response Characteristics / 7.2:
Information Intensity and Process Adaptability / 7.2.1:
Process Robustness / 7.2.2:
The Economics of Increasing Returns / 7.2.3:
Response Strategies for Growth / 7.3:
Processes as Product Offerings / 7.3.1:
Market Preempting / 7.3.2:
Process Investment Strategies for Growth / 7.3.3:
Process Centering: Role of the Individual / 7.4:
Process People / 8.1:
Empowerment, Commitment and Accountability / 8.1.1:
The Process Professional / 8.1.2:
The Process Team / 8.1.3:
Process Work / 8.2:
Multifunctional Work / 8.2.1:
Multidimensional Work / 8.2.2:
Valuable Work / 8.2.3:
Productive Work / 8.2.4:
Knowledge-Based Work / 8.2.5:
Rewarding Work / 8.2.6:
Work-Driven Shift in Personal Characteristics and Skills / 8.2.7:
Process-Related Roles and Responsibilities / 8.3:
Process Centering: The Management Team / 8.4:
Overseers and Implementers / 9.1:
Enterprise Transformation Executive / 9.1.1:
Enterprise Transformation Council / 9.1.2:
Business Process Management Executive / 9.1.3:
Business Process Owner / 9.1.4:
Business Process Management Team / 9.1.5:
Business Process Management Team Leader / 9.1.6:
Business Process Stakeholders / 9.1.7:
Process Management Resources / 9.2:
Process Contract / 9.2.1:
Process Training / 9.2.2:
Information Technology: The Response Integrator / 9.3:
Change and Information Intensity / 10.1:
Information Technology / 10.1.1:
Information Management for Adaptability / 10.2:
Two Key Process Components / 10.2.1:
Basic Functional Capabilities / 10.2.2:
Technology Assessment / 10.2.3:
Networked Collaborative Systems / 10.3:
Employee Training / 10.3.1:
Collaborative Work Practices / 10.3.2:
Wide-Area Networks / 10.3.3:
Groupware and Collaborative Computing / 10.3.4:
Fundamentals of Online Collaborative Systems / 10.3.5:
Collaborative System Architecture / 10.3.6:
Information Technology as Integrator / 10.4:
Deductive Thinking / 10.4.1:
Inductive Thinking / 10.4.2:
The Need Paradox / 10.4.3:
Process-Centered Management / 10.5:
Basics of Business Process Management / Chapter 11.:
Process Management Overview / 11.1:
The Process Management Roadmap / 11.1.1:
Classification of Business Processes / 11.1.2:
Process Planning / 11.2:
Process Identification and Mapping / 11.2.1:
Process Selection for Reengineering / 11.2.2:
Process Definition / 11.2.3:
Customer Requirements / 11.2.4:
Effective Process-Centered Management / 11.3:
The Operational View / 12.1:
The Two Dimensions of Process Management / 12.1.1:
Commitment Management and Communications / 12.1.2:
Process Resources / 12.1.3:
Process Measurements and Controls / 12.1.4:
Process Adaptability / 12.1.5:
Process Centering / 12.2:
Process Structure: The Holistic View / 12.3:
The Dynamic Business Process / 13.1:
The Holistic Process Model / 13.1.1:
The Workflow and Adaptive Loops / 13.1.3:
Alignment Engineering / 13.2:
Process Performance and Resources / 13.3:
Performance Measurement and Control / 14.1:
Process Measurement / 14.1.1:
Cycle-Time Reduction / 14.1.2:
Cycle-Time Basics / 14.2.1:
Business Cycle Time / 14.2.2:
Time To Respond / 14.2.3:
Time to Commitment / 14.2.4:
Performance Cycle Time / 14.2.5:
Human Resources and Adaptive Management Organization / 14.3:
Groupware / 14.4:
Enterprise Applications / 14.4.2:
Business Processes as Assets / 14.4.3:
Design for Adaptability / 14.5:
Traditional Design Approach to Adaptability / 15.1:
The Holistic Design Approach / 15.2:
Process Design Concepts / 15.2.1:
Design of New Process Structure / 15.2.2:
Redesign of Existing Process Structure / 15.2.3:
Design for Robust Commitments / 15.3:
Design for Process Adaptability / 16.1:
Backbone Network of Commitments / 16.1.1:
Workflow Reconfiguration / 16.1.2:
Design for Accountability / 16.2:
Culture of Accountability / 16.3:
Continuous Improvement and Planning / 16.4:
Process Improvement / 16.4.1:
Launching the Process / 16.4.2:
Process Implementation Planning / 17.1:
Integrated Implementation Planning / 17.1.1:
The Three Steps of Implementation Planning / 17.1.2:
Planning for Implementation Problems / 17.2:
Company-Wide Constraints / 17.2.1:
Process-Level Impediments / 17.2.2:
Cultural Resistance / 17.2.3:
Technology Constraints / 17.2.4:
Planning for Action / 17.3:
Process Deployment / 17.4:
The Process-Centered Organization in Operation / 17.5:
The Business Process Level / 18.1:
Process Ownership / 18.1.1:
Accountability Framework / 18.1.2:
Process Stakeholders / 18.1.3:
Continuous Process Assessment / 18.1.4:
The Enterprise Level / 18.2:
Operational Responsibilities / 18.2.1:
The Millennium Enterprise / 18.2.2:
Appendixes / 18.3:
The Tools of Process Centering / Appendix 1.:
Stand-Alone Software Tools / A1.1:
Process Modeling Tools / A1.1.1:
Process Documentation Tools / A1.1.2:
Process Simulation Tools / A1.1.3:
Process Mapping-Related Activity-Based Costing Tools / A1.1.4:
Project Management Tools / A1.1.5:
Groupware/Software Tools for Team Effectiveness / A1.1.6:
ERP-Based Software Tools / A1.2:
SAP / A1.2.1:
Oracle / A1.2.2:
Abbreviations and Acronyms / Appendix 2.:
Glossary
Endnotes
Bibliography
Index
The Case for Process Centering / Part I:
Doing Business in the Face of Change / Chapter 1.:
The Changing Business Environment / 1.1:
33.

電子ブック

EB
Rhodri H. Davies, Chris Taylor, Christopher J. Taylor, Carole Twining
出版情報: Springer eBooks Computer Science , Springer, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
Detecting Vertebral Fractures / 1.1.2:
Face Identification, Tracking, and Simulation of Ageing / 1.1.3:
Overview / 1.2:
Statistical Models of Shape and Appearance / 2:
Finite-Dimensional Representations of Shape / 2.1:
Shape Alignment / 2.1.1:
Statistics of Shapes / 2.1.2:
Principal Component Analysis / 2.1.3:
Modelling Distributions of Sets of Shapes / 2.2:
Gaussian Models / 2.2.1:
Kernel Density Estimation / 2.2.2:
Kernel Principal Component Analysis / 2.2.3:
Using Principal Components to Constrain Shape / 2.2.4:
Infinite-Dimensional Representations of Shape / 2.3:
Parameterised Representations of Shape / 2.3.1:
Applications of Shape Models / 2.4:
Active Shape Models / 2.4.1:
Active Appearance Models / 2.4.2:
Establishing Correspondence / 3:
The Correspondence Problem / 3.1:
Approaches to Establishing Correspondence / 3.2:
Manual Landmarking / 3.2.1:
Automatic Methods of Establishing Correspondence / 3.2.2:
Correspondence by Parameterisation / 3.2.2.1:
Distance-Based Correspondence / 3.2.2.2:
Feature-Based Correspondence / 3.2.2.3:
Correspondence Based on Physical Properties / 3.2.2.4:
Image-Based Correspondence / 3.2.2.5:
Summary / 3.2.3:
Correspondence by Optimisation / 3.3:
Objective Function / 3.3.1:
Manipulating Correspondence / 3.3.2:
Optimisation / 3.3.3:
Objective Functions / 4:
Shape-Based Objective Functions / 4.1:
Euclidian Distance and the Trace of the Model Covariance / 4.1.1:
Bending Energy / 4.1.2:
Curvature / 4.1.3:
Shape Context / 4.1.4:
Model-Based Objective Functions / 4.2:
The Determinant of the Model Covariance / 4.2.1:
Measuring Model Properties by Bootstrapping / 4.2.2:
Specificity / 4.2.2.1:
Generalization Ability / 4.2.2.2:
An Information Theoretic Objective Function / 4.3:
Shannon Codeword Length and Shannon Entropy / 4.3.1:
Description Length for a Multivariate Gaussian Model / 4.3.2:
Approximations to MDL / 4.3.3:
Gradient of Simplified MDL Objective Functions / 4.3.4:
Concluding Remarks / 4.4:
Re-parameterisation of Open and Closed Curves / 5:
Open Curves / 5.1:
Piecewise-Linear Re-parameterisation / 5.1.1:
Recursive Piecewise-Linear Re-parameterisation / 5.1.2:
Localized Re-parameterisation / 5.1.3:
Kernel-Based Representation of Re-parameterisation / 5.1.4:
Cauchy Kernels / 5.1.4.1:
Polynomial Re-parameterisation / 5.1.4.2:
Differentiable Re-parameterisations for Closed Curves / 5.2:
Wrapped Kernel Re-parameterisation for Closed Curves / 5.2.1:
Use in Optimisation / 5.3:
Parameterisation and Re-parameterisation of Surfaces / 6:
Surface Parameterisation / 6.1:
Initial Parameterisation for Open Surfaces / 6.1.1:
Initial Parameterisation for Closed Surfaces / 6.1.2:
Defining a Continuous Parameterisation / 6.1.3:
Removing Area Distortion / 6.1.4:
Consistent Parameterisation / 6.1.5:
Re-parameterisation of Surfaces / 6.2:
Re-parameterisation of Open Surfaces / 6.2.1:
Recursive Piecewise Linear Re-parameterisation / 6.2.1.1:
Re-parameterisation of Closed Surfaces / 6.2.1.2:
Recursive Piecewise-Linear Reparameterisation / 6.2.2.1:
Cauchy Kernel Re-parameterisation / 6.2.2.2:
Symmetric Theta Transformation / 6.2.2.4:
Asymmetric Theta Transformations / 6.2.2.5:
Shear Transformations / 6.2.2.6:
Re-parameterisation of Other Topologies / 6.2.3:
A Tractable Optimisation Approach / 6.3:
Optimising One Example at a Time / 7.1.1:
Stochastic Selection of Values for Auxiliary Parameters / 7.1.2:
Gradient Descent Optimisation / 7.1.3:
Optimising Pose / 7.1.4:
Tailoring Optimisation / 7.2:
Closed Curves and Surfaces / 7.2.1:
Open Surfaces / 7.2.2:
Multi-part Objects / 7.2.3:
Implementation Issues / 7.3:
Calculating the Covariance Matrix by Numerical Integration / 7.3.1:
Numerical Estimation of the Gradient / 7.3.2:
Sampling the Set of Shapes / 7.3.3:
Detecting Singularities in the Re-parameterisations / 7.3.4:
Example Optimisation Routines / 7.4:
Example 1: Open Curves / 7.4.1:
Example 2: Open Surfaces / 7.4.2:
Non-parametric Regularization / 8:
Regularization / 8.1:
Fluid Regularization / 8.1.1:
The Shape Manifold / 8.3:
The Induced Metric / 8.3.1:
Tangent Space / 8.3.2:
Covariant Derivatives / 8.3.3:
Shape Images / 8.4:
Iterative Updating of Shape Images / 8.5:
Dealing with Shapes with Spherical Topology / 8.5.2:
Avoiding Singularities by Re-gridding / 8.5.3:
Example Implementation of Non-parametric Regularization / 8.6:
Example Optimisation Routines Using Iterative Updating of Shape Images / 8.7:
Example 3: Open Surfaces Using Shape Images / 8.7.1:
Example 4: Optimisation of Closed Surfaces Using Shape Images / 8.7.2:
Evaluation of Statistical Models / 9:
Evaluation Using Ground Truth / 9.1:
Evaluation in the Absence of Ground Truth / 9.2:
Specificity and Generalization: Quantitative Measures / 9.2.1:
Specificity and Generalization as Graph-Based Estimators / 9.3:
Evaluating the Coefficients [beta subscript n, gamma] / 9.3.1:
Generalized Specificity / 9.3.2:
Specificity and Generalization in Practice / 9.4:
Discussion / 9.5:
Thin-Plate and Clamped-Plate Splines / Appendix A:
Curvature and Bending Energy / A.1:
Variational Formulation / A.2:
Green's Functions / A.3:
Green's Functions for the Thin-Plate Spline / A.3.1:
Green's Functions for the Clamped-Plate Spline / A.3.2:
Differentiating the Objective Function / Appendix B:
Finite-Dimensional Shape Representations / B.1:
The Pseudo-Inverse / B.1.1:
Varying the Shape / B.1.2:
From PCA to Singular Value Decomposition / B.1.3:
Infinite Dimensional Shape Representations / B.2:
Glossary
References
Index
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
34.

電子ブック

EB
Rhodri H. Davies, Chris Taylor, Christopher J. Taylor, Carole Twining
出版情報: SpringerLink Books - AutoHoldings , Springer, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
Detecting Vertebral Fractures / 1.1.2:
Face Identification, Tracking, and Simulation of Ageing / 1.1.3:
Overview / 1.2:
Statistical Models of Shape and Appearance / 2:
Finite-Dimensional Representations of Shape / 2.1:
Shape Alignment / 2.1.1:
Statistics of Shapes / 2.1.2:
Principal Component Analysis / 2.1.3:
Modelling Distributions of Sets of Shapes / 2.2:
Gaussian Models / 2.2.1:
Kernel Density Estimation / 2.2.2:
Kernel Principal Component Analysis / 2.2.3:
Using Principal Components to Constrain Shape / 2.2.4:
Infinite-Dimensional Representations of Shape / 2.3:
Parameterised Representations of Shape / 2.3.1:
Applications of Shape Models / 2.4:
Active Shape Models / 2.4.1:
Active Appearance Models / 2.4.2:
Establishing Correspondence / 3:
The Correspondence Problem / 3.1:
Approaches to Establishing Correspondence / 3.2:
Manual Landmarking / 3.2.1:
Automatic Methods of Establishing Correspondence / 3.2.2:
Correspondence by Parameterisation / 3.2.2.1:
Distance-Based Correspondence / 3.2.2.2:
Feature-Based Correspondence / 3.2.2.3:
Correspondence Based on Physical Properties / 3.2.2.4:
Image-Based Correspondence / 3.2.2.5:
Summary / 3.2.3:
Correspondence by Optimisation / 3.3:
Objective Function / 3.3.1:
Manipulating Correspondence / 3.3.2:
Optimisation / 3.3.3:
Objective Functions / 4:
Shape-Based Objective Functions / 4.1:
Euclidian Distance and the Trace of the Model Covariance / 4.1.1:
Bending Energy / 4.1.2:
Curvature / 4.1.3:
Shape Context / 4.1.4:
Model-Based Objective Functions / 4.2:
The Determinant of the Model Covariance / 4.2.1:
Measuring Model Properties by Bootstrapping / 4.2.2:
Specificity / 4.2.2.1:
Generalization Ability / 4.2.2.2:
An Information Theoretic Objective Function / 4.3:
Shannon Codeword Length and Shannon Entropy / 4.3.1:
Description Length for a Multivariate Gaussian Model / 4.3.2:
Approximations to MDL / 4.3.3:
Gradient of Simplified MDL Objective Functions / 4.3.4:
Concluding Remarks / 4.4:
Re-parameterisation of Open and Closed Curves / 5:
Open Curves / 5.1:
Piecewise-Linear Re-parameterisation / 5.1.1:
Recursive Piecewise-Linear Re-parameterisation / 5.1.2:
Localized Re-parameterisation / 5.1.3:
Kernel-Based Representation of Re-parameterisation / 5.1.4:
Cauchy Kernels / 5.1.4.1:
Polynomial Re-parameterisation / 5.1.4.2:
Differentiable Re-parameterisations for Closed Curves / 5.2:
Wrapped Kernel Re-parameterisation for Closed Curves / 5.2.1:
Use in Optimisation / 5.3:
Parameterisation and Re-parameterisation of Surfaces / 6:
Surface Parameterisation / 6.1:
Initial Parameterisation for Open Surfaces / 6.1.1:
Initial Parameterisation for Closed Surfaces / 6.1.2:
Defining a Continuous Parameterisation / 6.1.3:
Removing Area Distortion / 6.1.4:
Consistent Parameterisation / 6.1.5:
Re-parameterisation of Surfaces / 6.2:
Re-parameterisation of Open Surfaces / 6.2.1:
Recursive Piecewise Linear Re-parameterisation / 6.2.1.1:
Re-parameterisation of Closed Surfaces / 6.2.1.2:
Recursive Piecewise-Linear Reparameterisation / 6.2.2.1:
Cauchy Kernel Re-parameterisation / 6.2.2.2:
Symmetric Theta Transformation / 6.2.2.4:
Asymmetric Theta Transformations / 6.2.2.5:
Shear Transformations / 6.2.2.6:
Re-parameterisation of Other Topologies / 6.2.3:
A Tractable Optimisation Approach / 6.3:
Optimising One Example at a Time / 7.1.1:
Stochastic Selection of Values for Auxiliary Parameters / 7.1.2:
Gradient Descent Optimisation / 7.1.3:
Optimising Pose / 7.1.4:
Tailoring Optimisation / 7.2:
Closed Curves and Surfaces / 7.2.1:
Open Surfaces / 7.2.2:
Multi-part Objects / 7.2.3:
Implementation Issues / 7.3:
Calculating the Covariance Matrix by Numerical Integration / 7.3.1:
Numerical Estimation of the Gradient / 7.3.2:
Sampling the Set of Shapes / 7.3.3:
Detecting Singularities in the Re-parameterisations / 7.3.4:
Example Optimisation Routines / 7.4:
Example 1: Open Curves / 7.4.1:
Example 2: Open Surfaces / 7.4.2:
Non-parametric Regularization / 8:
Regularization / 8.1:
Fluid Regularization / 8.1.1:
The Shape Manifold / 8.3:
The Induced Metric / 8.3.1:
Tangent Space / 8.3.2:
Covariant Derivatives / 8.3.3:
Shape Images / 8.4:
Iterative Updating of Shape Images / 8.5:
Dealing with Shapes with Spherical Topology / 8.5.2:
Avoiding Singularities by Re-gridding / 8.5.3:
Example Implementation of Non-parametric Regularization / 8.6:
Example Optimisation Routines Using Iterative Updating of Shape Images / 8.7:
Example 3: Open Surfaces Using Shape Images / 8.7.1:
Example 4: Optimisation of Closed Surfaces Using Shape Images / 8.7.2:
Evaluation of Statistical Models / 9:
Evaluation Using Ground Truth / 9.1:
Evaluation in the Absence of Ground Truth / 9.2:
Specificity and Generalization: Quantitative Measures / 9.2.1:
Specificity and Generalization as Graph-Based Estimators / 9.3:
Evaluating the Coefficients [beta subscript n, gamma] / 9.3.1:
Generalized Specificity / 9.3.2:
Specificity and Generalization in Practice / 9.4:
Discussion / 9.5:
Thin-Plate and Clamped-Plate Splines / Appendix A:
Curvature and Bending Energy / A.1:
Variational Formulation / A.2:
Green's Functions / A.3:
Green's Functions for the Thin-Plate Spline / A.3.1:
Green's Functions for the Clamped-Plate Spline / A.3.2:
Differentiating the Objective Function / Appendix B:
Finite-Dimensional Shape Representations / B.1:
The Pseudo-Inverse / B.1.1:
Varying the Shape / B.1.2:
From PCA to Singular Value Decomposition / B.1.3:
Infinite Dimensional Shape Representations / B.2:
Glossary
References
Index
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
35.

電子ブック

EB
John Aldo Lee, M. Jordan, John A. Lee, Michel Verleysen
出版情報: Springer eBooks Computer Science , Springer New York, 2007
所蔵情報: loading…
目次情報: 続きを見る
Notations
Acronyms
High-Dimensional Data / 1:
Practical motivations / 1.1:
Fields of application / 1.1.1:
The goals to be reached / 1.1.2:
Theoretical motivations / 1.2:
How can we visualize high-dimensional spaces? / 1.2.1:
Curse of dimensionality and empty space phenomenon / 1.2.2:
Some directions to be explored / 1.3:
Relevance of the variables / 1.3.1:
Dependencies between the variables / 1.3.2:
About topology, spaces, and manifolds / 1.4:
Two benchmark manifolds / 1.5:
Overview of the next chapters / 1.6:
Characteristics of an Analysis Method / 2:
Purpose / 2.1:
Expected functionalities / 2.2:
Estimation of the number of latent variables / 2.2.1:
Embedding for dimensionality reduction / 2.2.2:
Embedding for latent variable separation / 2.2.3:
Internal characteristics / 2.3:
Underlying model / 2.3.1:
Algorithm / 2.3.2:
Criterion / 2.3.3:
Example: Principal component analysis / 2.4:
Data model of PCA / 2.4.1:
Criteria leading to PCA / 2.4.2:
Functionalities of PCA / 2.4.3:
Algorithms / 2.4.4:
Examples and limitations of PCA / 2.4.5:
Toward a categorization of DR methods / 2.5:
Hard vs. soft dimensionality reduction / 2.5.1:
Traditional vs. generative model / 2.5.2:
Linear vs. nonlinear model / 2.5.3:
Continuous vs. discrete model / 2.5.4:
Implicit vs. explicit mapping / 2.5.5:
Integrated vs. external estimation of the dimensionality / 2.5.6:
Layered vs. standalone embeddings / 2.5.7:
Single vs. multiple coordinate systems / 2.5.8:
Optional vs. mandatory vector quantization / 2.5.9:
Batch vs. online algorithm / 2.5.10:
Exact vs. approximate optimization / 2.5.11:
The type of criterion to be optimized / 2.5.12:
Estimation of the Intrinsic Dimension / 3:
Definition of the intrinsic dimension / 3.1:
Fractal dimensions / 3.2:
The q-dimension / 3.2.1:
Capacity dimension / 3.2.2:
Information dimension / 3.2.3:
Correlation dimension / 3.2.4:
Some inequalities / 3.2.5:
Practical estimation / 3.2.6:
Other dimension estimators / 3.3:
Local methods / 3.3.1:
Trial and error / 3.3.2:
Comparisons / 3.4:
Data Sets / 3.4.1:
PCA estimator / 3.4.2:
Local PCA estimator / 3.4.3:
Concluding remarks / 3.4.5:
Distance Preservation / 4:
State-of-the-art / 4.1:
Spatial distances / 4.2:
Metric space, distances, norms and scalar product / 4.2.1:
Multidimensional scaling / 4.2.2:
Sammon's nonlinear mapping / 4.2.3:
Curvilinear component analysis / 4.2.4:
Graph distances / 4.3:
Geodesic distance and graph distance / 4.3.1:
Isomap / 4.3.2:
Geodesic NLM / 4.3.3:
Curvilinear distance analysis / 4.3.4:
Other distances / 4.4:
Kernel PC A / 4.4.1:
Semidefinite embedding / 4.4.2:
Topology Preservation / 5:
State of the art / 5.1:
Predefined lattice / 5.2:
Self-Organizing Maps / 5.2.1:
Generative Topographic Mapping / 5.2.2:
Data-driven lattice / 5.3:
Locally linear embedding / 5.3.1:
Laplacian eigenmaps / 5.3.2:
Isotop / 5.3.3:
Method comparisons / 6:
Toy examples / 6.1:
The Swiss roll / 6.1.1:
Manifolds having essential loops or spheres / 6.1.2:
Cortex unfolding / 6.2:
Image processing / 6.3:
Artificial faces / 6.3.1:
Real faces / 6.3.2:
Conclusions / 7:
Summary of the book / 7.1:
The problem / 7.1.1:
A basic solution / 7.1.2:
Dimensionality reduction / 7.1.3:
Latent variable separation / 7.1.4:
Intrinsic dimensionality estimation / 7.1.5:
Data flow / 7.2:
Variable Selection / 7.2.1:
Calibration / 7.2.2:
Linear dimensionality reduction / 7.2.3:
Nonlinear dimensionality reduction / 7.2.4:
Further processing / 7.2.5:
Model complexity / 7.3:
Taxonomy / 7.4:
Distance preservation / 7.4.1:
Topology preservation / 7.4.2:
Spectral methods / 7.5:
Nonspectral methods / 7.6:
Tentative methodology / 7.7:
Perspectives / 7.8:
Matrix Calculus / A:
Singular value decomposition / A.1:
Eigenvalue decomposition / A.2:
Square root of a square matrix / A.3:
Gaussian Variables / B:
One-dimensional Gaussian distribution / B.1:
Multidimensional Gaussian distribution / B.2:
Uncorrelated Gaussian variables / B.2.1:
Isotropic multivariate Gaussian distribution / B.2.2:
Linearly mixed Gaussian variables / B.2.3:
Optimization / C:
Newton's method / C.1:
Finding extrema / C.1.1:
Multivariate version / C.1.2:
Gradient ascent/descent / C.2:
Stochastic gradient descent / C.2.1:
Vector quantization / D:
Classical techniques / D.1:
Competitive learning / D.2:
Initialization and ""dead units"" / D.3:
Graph Building / E:
Without vector quantization / E.1:
K-rule / E.1.1:
e-rule / E.1.2:
r-rule / E.1.3:
With vector quantization / E.2:
Data rule / E.2.1:
Histogram rule / E.2.2:
Implementation Issues / F:
Dimension estimation / F.1:
Computation of the closest point(s) / F.1.1:
References / F.3:
Index
Notations
Acronyms
High-Dimensional Data / 1:
36.

電子ブック

EB
John Aldo Lee, M. Jordan, John A. Lee, Michel Verleysen, B. Schölkopf
出版情報: SpringerLink Books - AutoHoldings , Springer New York, 2007
所蔵情報: loading…
目次情報: 続きを見る
Notations
Acronyms
High-Dimensional Data / 1:
Practical motivations / 1.1:
Fields of application / 1.1.1:
The goals to be reached / 1.1.2:
Theoretical motivations / 1.2:
How can we visualize high-dimensional spaces? / 1.2.1:
Curse of dimensionality and empty space phenomenon / 1.2.2:
Some directions to be explored / 1.3:
Relevance of the variables / 1.3.1:
Dependencies between the variables / 1.3.2:
About topology, spaces, and manifolds / 1.4:
Two benchmark manifolds / 1.5:
Overview of the next chapters / 1.6:
Characteristics of an Analysis Method / 2:
Purpose / 2.1:
Expected functionalities / 2.2:
Estimation of the number of latent variables / 2.2.1:
Embedding for dimensionality reduction / 2.2.2:
Embedding for latent variable separation / 2.2.3:
Internal characteristics / 2.3:
Underlying model / 2.3.1:
Algorithm / 2.3.2:
Criterion / 2.3.3:
Example: Principal component analysis / 2.4:
Data model of PCA / 2.4.1:
Criteria leading to PCA / 2.4.2:
Functionalities of PCA / 2.4.3:
Algorithms / 2.4.4:
Examples and limitations of PCA / 2.4.5:
Toward a categorization of DR methods / 2.5:
Hard vs. soft dimensionality reduction / 2.5.1:
Traditional vs. generative model / 2.5.2:
Linear vs. nonlinear model / 2.5.3:
Continuous vs. discrete model / 2.5.4:
Implicit vs. explicit mapping / 2.5.5:
Integrated vs. external estimation of the dimensionality / 2.5.6:
Layered vs. standalone embeddings / 2.5.7:
Single vs. multiple coordinate systems / 2.5.8:
Optional vs. mandatory vector quantization / 2.5.9:
Batch vs. online algorithm / 2.5.10:
Exact vs. approximate optimization / 2.5.11:
The type of criterion to be optimized / 2.5.12:
Estimation of the Intrinsic Dimension / 3:
Definition of the intrinsic dimension / 3.1:
Fractal dimensions / 3.2:
The q-dimension / 3.2.1:
Capacity dimension / 3.2.2:
Information dimension / 3.2.3:
Correlation dimension / 3.2.4:
Some inequalities / 3.2.5:
Practical estimation / 3.2.6:
Other dimension estimators / 3.3:
Local methods / 3.3.1:
Trial and error / 3.3.2:
Comparisons / 3.4:
Data Sets / 3.4.1:
PCA estimator / 3.4.2:
Local PCA estimator / 3.4.3:
Concluding remarks / 3.4.5:
Distance Preservation / 4:
State-of-the-art / 4.1:
Spatial distances / 4.2:
Metric space, distances, norms and scalar product / 4.2.1:
Multidimensional scaling / 4.2.2:
Sammon's nonlinear mapping / 4.2.3:
Curvilinear component analysis / 4.2.4:
Graph distances / 4.3:
Geodesic distance and graph distance / 4.3.1:
Isomap / 4.3.2:
Geodesic NLM / 4.3.3:
Curvilinear distance analysis / 4.3.4:
Other distances / 4.4:
Kernel PC A / 4.4.1:
Semidefinite embedding / 4.4.2:
Topology Preservation / 5:
State of the art / 5.1:
Predefined lattice / 5.2:
Self-Organizing Maps / 5.2.1:
Generative Topographic Mapping / 5.2.2:
Data-driven lattice / 5.3:
Locally linear embedding / 5.3.1:
Laplacian eigenmaps / 5.3.2:
Isotop / 5.3.3:
Method comparisons / 6:
Toy examples / 6.1:
The Swiss roll / 6.1.1:
Manifolds having essential loops or spheres / 6.1.2:
Cortex unfolding / 6.2:
Image processing / 6.3:
Artificial faces / 6.3.1:
Real faces / 6.3.2:
Conclusions / 7:
Summary of the book / 7.1:
The problem / 7.1.1:
A basic solution / 7.1.2:
Dimensionality reduction / 7.1.3:
Latent variable separation / 7.1.4:
Intrinsic dimensionality estimation / 7.1.5:
Data flow / 7.2:
Variable Selection / 7.2.1:
Calibration / 7.2.2:
Linear dimensionality reduction / 7.2.3:
Nonlinear dimensionality reduction / 7.2.4:
Further processing / 7.2.5:
Model complexity / 7.3:
Taxonomy / 7.4:
Distance preservation / 7.4.1:
Topology preservation / 7.4.2:
Spectral methods / 7.5:
Nonspectral methods / 7.6:
Tentative methodology / 7.7:
Perspectives / 7.8:
Matrix Calculus / A:
Singular value decomposition / A.1:
Eigenvalue decomposition / A.2:
Square root of a square matrix / A.3:
Gaussian Variables / B:
One-dimensional Gaussian distribution / B.1:
Multidimensional Gaussian distribution / B.2:
Uncorrelated Gaussian variables / B.2.1:
Isotropic multivariate Gaussian distribution / B.2.2:
Linearly mixed Gaussian variables / B.2.3:
Optimization / C:
Newton's method / C.1:
Finding extrema / C.1.1:
Multivariate version / C.1.2:
Gradient ascent/descent / C.2:
Stochastic gradient descent / C.2.1:
Vector quantization / D:
Classical techniques / D.1:
Competitive learning / D.2:
Initialization and ""dead units"" / D.3:
Graph Building / E:
Without vector quantization / E.1:
K-rule / E.1.1:
e-rule / E.1.2:
r-rule / E.1.3:
With vector quantization / E.2:
Data rule / E.2.1:
Histogram rule / E.2.2:
Implementation Issues / F:
Dimension estimation / F.1:
Computation of the closest point(s) / F.1.1:
References / F.3:
Index
Notations
Acronyms
High-Dimensional Data / 1:
37.

図書

図書
Michael Beetz
出版情報: Berlin : Springer, 2000  xvi, 213 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1772 . Lecture notes in artificial intelligence
所蔵情報: loading…
目次情報: 続きを見る
Abstract
Acknowledgements
List of Figures
Introduction / 1:
The Approach / 1.1:
Technical Challenges / 1.2:
Introductory Example / 1.3:
Motivation / 1.4:
Relevance for Autonomous Robot Control / 1.4.1:
Relevance for AI Planning / 1.4.2:
The Computational Problem and Its Solution / 1.5:
The Computational Problem / 1.5.1:
The Computational Model / 1.5.2:
Contributions / 1.6:
Outline of the Book / 1.7:
Reactivity / 2:
The DeliveryWorld / 2.1:
The World / 2.1.1:
Commands and Jobs / 2.1.2:
The Robot / 2.1.3:
Justification of the DeliveryWorld / 2.1.4:
The Implementation of Routine Activities / 2.2:
Plan Steps vs. Concurrent Control Processes / 2.2.1:
Interfacing Continuous Control Processes / 2.2.2:
Coordinating Control Processes / 2.2.3:
Synchronization of Concurrent Control Threads / 2.2.4:
Failure Recovery / 2.2.5:
Perception / 2.2.6:
State, Memory, and World Models / 2.2.7:
The Structure of Routine Activities / 2.2.8:
The Structured Reactive Controller / 2.3:
Behavior and Planning Modules / 2.3.1:
The Body of the Structured Reactive Controller / 2.3.2:
Global Fluents, Variables, and the Plan Library / 2.3.3:
The RPL Runtime System / 2.3.4:
Summary and Discussion / 2.4:
Planning / 3:
The Structured Reactive Plan / 3.1:
Plans as Syntactic Objects / 3.1.1:
RPL as a Plan Language / 3.1.2:
The Computational Structure / 3.2:
The "Criticize-Revise" Cycle / 3.2.1:
The "Criticize" Step / 3.2.2:
The "Revise" Step / 3.2.3:
The XFRM Planning Framework / 3.3:
Anticipation and Forestalling of Behavior Flaws / 3.4:
The Detection of Behavior Flaws / 3.4.1:
Behavior Flaws and Plan Revisions / 3.4.2:
The Diagnosis of Behavior Flaws / 3.4.3:
Transparent Reactive Plans / 3.5:
Declarative Statements / 4.1:
RPL Construct Descriptions / 4.1.1:
Achievement Goals / 4.1.2:
Perceptions / 4.1.3:
Beliefs / 4.1.4:
Other Declarative Statements / 4.1.5:
Using Declarative Statements / 4.1.6:
Routine Plans / 4.2:
The Plan Library / 4.3:
Behavior Modules / 4.3.1:
Low-level Plans / 4.3.2:
High-level Plans / 4.3.3:
Discussion / 4.4:
Representing Plan Revisions / 5:
Conceptualization / 5.1:
Making Inferences / 5.2:
Some Examples / 5.2.1:
Accessing Code Trees / 5.2.2:
Predicates on Plan Interpretations / 5.2.3:
Predicates on Timelines / 5.2.4:
Timelines and Plan Interpretation / 5.2.5:
Expressing Plan Revisions / 5.3:
XFRML - The Implementation / 5.4:
Forestalling Behavior Flaws / 5.5:
FAUST / 6.1:
The Behavior Critic / 6.1.1:
Detecting Behavior Flaws: Implementation / 6.1.2:
Diagnosing the Causes of Behavior Flaws: Implementation / 6.1.3:
The Bug Class "Behavior-Specification Violation" / 6.1.4:
The Elimination of Behavior Flaws / 6.1.5:
The Plan Revisions for the Example / 6.2:
Some Behavior Flaws and Their Revisions / 6.3:
Perceptual Confusion / 6.3.1:
Missed Deadlines / 6.3.2:
Planning Ongoing Activities / 6.4:
Extending RPL / 7.1:
The RUNTIME-PLAN Statement / 7.1.1:
Plan Swapping / 7.1.2:
Making Planning Assumptions / 7.1.3:
Deliberative Controllers / 7.2:
Improving Iterative Plans by Local Planning / 7.2.1:
Plan Execution a la Shakey / 7.2.2:
Execution Monitoring and Replanning / 7.2.3:
Recovering from Execution Failures / 7.2.4:
Some Robot Control Architectures / 7.2.5:
The Controller in the Experiment / 7.3:
Evaluation / 7.4:
Analysis of the Problem / 8.1:
Assessment of the Method / 8.2:
Description of the Method / 8.2.1:
Evaluation of the Method / 8.2.2:
Demonstration / 8.3:
Evaluating SRCs in Standard Situations / 8.3.1:
Comparing SRCs with the Appropriate Fixed Controller179 / 8.3.2:
Problems that Require SRCs / 8.3.3:
Related Work / 8.4:
Control Architectures for Competent Physical Agents / 8.4.1:
Control Languages for Reactive Control / 8.4.2:
Robot Planning / 8.4.3:
Conclusion / 9:
What Do Structured Reactive Controllers Do? / 9.1:
Why Do Structured Reactive Controllers Work? / 9.2:
Do Structured Reactive Controllers Work for Real Robots? / 9.3:
References
Abstract
Acknowledgements
List of Figures
38.

図書

図書
Charles E. Baukal, Jr.
出版情報: Boca Raton, Fla. : CRC Press, c2000  545 p. ; 27 cm
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Chapter 1:
Importance of Heat Transfer in Industrial Combustion / 1.1:
Energy Consumption / 1.1.1:
Research Needs / 1.1.2:
Literature Discussion / 1.2:
Heat Transfer / 1.2.1:
Combustion / 1.2.2:
Heat Transfer and Combustion / 1.2.3:
Combustion System Components / 1.3:
Burners / 1.3.1:
Competing Priorities / 1.3.1.1:
Design Factors / 1.3.1.2:
General Burner Types / 1.3.1.3:
Combustors / 1.3.2:
Design Considerations / 1.3.2.1:
General Classifications / 1.3.2.2:
Heat Load / 1.3.3:
Process Tubes / 1.3.3.1:
Moving Substrate / 1.3.3.2:
Opaque Materials / 1.3.3.3:
Transparent Materials / 1.3.3.4:
Heat Recovery Devices / 1.3.4:
Recuperators / 1.3.4.1:
Regenerators / 1.3.4.2:
References
Some Fundamentals of Combustion / Chapter 2:
Combustion Chemistry / 2.1:
Fuel Properties / 2.1.1:
Oxidizer Composition / 2.1.2:
Mixture Ratio / 2.1.3:
Operating Regimes / 2.1.4:
Combustion Properties / 2.2:
Combustion Products / 2.2.1:
Air and Fuel Preheat Temperature / 2.2.1.1:
Fuel Composition / 2.2.1.4:
Flame Temperature / 2.2.2:
Oxidizer and Fuel Composition / 2.2.2.1:
Oxidizer and Fuel Preheat Temperature / 2.2.2.2:
Available Heat / 2.2.3:
Flue Gas Volume / 2.2.4:
Exhaust Product Transport Properties / 2.3:
Density / 2.3.1:
Specific Heat / 2.3.2:
Thermal Conductivity / 2.3.3:
Viscosity / 2.3.4:
Prandtl Number / 2.3.5:
Lewis Number / 2.3.6:
Heat Transfer Modes / Chapter 3:
Convection / 3.1:
Forced Convection / 3.2.1:
Forced Convection from Flames / 3.2.1.1:
Forced Convection from Outside Combustor Wall / 3.2.1.2:
Forced Convection from Hot Gases to Tubes / 3.2.1.3:
Natural Convection / 3.2.2:
Natural Convection from Flames / 3.2.2.1:
Natural Convection from Outside Combustor Wall / 3.2.2.2:
Radiation / 3.3:
Surface Radiation / 3.3.1:
Nonluminous Radiation / 3.3.2:
Theory / 3.3.2.1:
Combustion Studies / 3.3.2.2:
Luminous Radiation / 3.3.3:
Conduction / 3.3.3.1:
Steady-State Conduction / 3.4.1:
Transient Conduction / 3.4.2:
Phase Change / 3.5:
Melting / 3.5.1:
Boiling / 3.5.2:
Internal Boiling / 3.5.2.1:
External Boiling / 3.5.2.2:
Condensation / 3.5.3:
Heat Sources and Sinks / Chapter 4:
Heat Sources / 4.1:
Combustibles / 4.1.1:
Fuel Combustion / 4.1.1.1:
Volatile Combustion / 4.1.1.2:
Thermochemical Heat Release / 4.1.2:
Equilibrium TCHR / 4.1.2.1:
Catalytic TCHR / 4.1.2.2:
Mixed TCHR / 4.1.2.3:
Heat Sinks / 4.2:
Load / 4.2.1:
Tubes / 4.2.1.1:
Substrate / 4.2.1.2:
Granular Solid / 4.2.1.3:
Molten Liquid / 4.2.1.4:
Surface Conditions / 4.2.1.5:
Wall Losses / 4.2.2:
Openings / 4.2.3:
Gas Flow Through Openings / 4.2.3.1:
Material Transport / 4.2.4:
Computer Modeling / Chapter 5:
Combustion Modeling / 5.1:
Modeling Approaches / 5.2:
Fluid Dynamics / 5.2.1:
Moment Averaging / 5.2.1.1:
Vortex Methods / 5.2.1.2:
Spectral Methods / 5.2.1.3:
Direct Numerical Simulation / 5.2.1.4:
Geometry / 5.2.2:
Zero-Dimensional Modeling / 5.2.2.1:
One-Dimensional Modeling / 5.2.2.2:
Multi-dimensional Modeling / 5.2.2.3:
Reaction Chemistry / 5.2.3:
Nonreacting Flows / 5.2.3.1:
Simplified Chemistry / 5.2.3.2:
Complex Chemistry / 5.2.3.3:
Nonradiating / 5.2.4:
Participating Media / 5.2.4.2:
Time Dependence / 5.2.5:
Steady State / 5.2.5.1:
Transient / 5.2.5.2:
Simplified Models / 5.3:
Computational Fluid Dynamic Modeling / 5.4:
Increasing Popularity of CFD / 5.4.1:
Potential Problems of CFD / 5.4.2:
Equations / 5.4.3:
Chemistry / 5.4.3.1:
Multiple Phases / 5.4.3.4:
Boundary and Initial Conditions / 5.4.4:
Inlets and Outlets / 5.4.4.1:
Surfaces / 5.4.4.2:
Symmetry / 5.4.4.3:
Discretization / 5.4.5:
Finite Difference Technique / 5.4.5.1:
Finite Volume Technique / 5.4.5.2:
Finite Element Technique / 5.4.5.3:
Mixed / 5.4.5.4:
None / 5.4.5.5:
Solution Methods / 5.4.6:
Model Validation / 5.4.7:
Industrial Combustion Examples / 5.4.8:
Modeling Burners / 5.4.8.1:
Modeling Combustors / 5.4.8.2:
Experimental Techniques / Chapter 6:
Heat Flux / 6.1:
Total Heat Flux / 6.2.1:
Steady-State Uncooled Solids / 6.2.1.1:
Steady-State Cooled Solids / 6.2.1.2:
Steady-State Cooled Gages / 6.2.1.3:
Transient Uncooled Targets / 6.2.1.4:
Transient Uncooled Gages / 6.2.1.5:
Radiant Heat Flux / 6.2.2:
Heat Flux Gage / 6.2.2.1:
Ellipsoidal Radiometer / 6.2.2.2:
Spectral Radiometer / 6.2.2.3:
Other Techniques / 6.2.2.4:
Convective Heat Flux / 6.2.3:
Temperature / 6.3:
Gas Temperature / 6.3.1:
Suction Pyrometer / 6.3.1.1:
Optical Techniques / 6.3.1.2:
Fine Wire Thermocouples / 6.3.1.3:
Line Reversal / 6.3.1.4:
Surface Temperature / 6.3.2:
Embedded Thermocouple / 6.3.2.1:
Infrared Detectors / 6.3.2.2:
Gas Flow / 6.4:
Gas Velocity / 6.4.1:
Pitot Tubes / 6.4.1.1:
Laser Doppler Velocimetry / 6.4.1.2:
Static Pressure Distribution / 6.4.1.3:
Stagnation Velocity Gradient / 6.4.2.1:
Stagnation Zone / 6.4.2.2:
Gas Species / 6.5:
Other Measurements / 6.6:
Physical Modeling / 6.7:
Flame Impingement / Chapter 7:
Experimental Conditions / 7.1:
Configurations / 7.2.1:
Flame Normal to a Cylinder in Crossflow / 7.2.1.1:
Flame Normal to a Hemispherically Nosed Cylinder / 7.2.1.2:
Flame Normal to a Plane Surface / 7.2.1.3:
Flame Parallel to a Plane Surface / 7.2.1.4:
Operating Conditions / 7.2.2:
Oxidizers / 7.2.2.1:
Fuels / 7.2.2.2:
Equivalence Ratios / 7.2.2.3:
Firing Rates / 7.2.2.4:
Reynolds Number / 7.2.2.5:
Nozzle Diameter / 7.2.2.6:
Location / 7.2.2.8:
Stagnation Targets / 7.2.3:
Size / 7.2.3.1:
Target Materials / 7.2.3.2:
Surface Preparation / 7.2.3.3:
Surface Temperatures / 7.2.3.4:
Measurements / 7.2.4:
Semianalytical Heat Transfer Solutions / 7.3:
Equation Parameters / 7.3.1:
Thermophysical Properties / 7.3.1.1:
Sibulkin Results / 7.3.1.2:
Fay and Riddell Results / 7.3.2.2:
Rosner Results / 7.3.2.3:
Comparisons With Experiments / 7.3.3:
Forced Convection (Negligible TCHR) / 7.3.3.1:
Forced Convection with TCHR / 7.3.3.2:
Sample Calculations / 7.3.4:
Laminar Flames Without TCHR / 7.3.4.1:
Turbulent Flames Without TCHR / 7.3.4.2:
Laminar Flames with TCHR
Summary / 7.3.5:
Empirical Heat Transfer Correlations / 7.4:
Flames Impinging Normal to a Cylinder / 7.4.1:
Local Convection Heat Transfer / 7.4.2.1:
Average Convection Heat Transfer / 7.4.2.2:
Average Convection Heat Transfer with TCHR / 7.4.2.3:
Average Radiation Heat Transfer / 7.4.2.4:
Maximum Convection and Radiation Heat Transfer / 7.4.2.5:
Flames Impining Normal to a Hemi-Nosed Cylinder / 7.4.3:
Local Convection Heat Transfer with TCHR / 7.4.3.1:
Flames Impinging Normal to a Plane Surface / 7.4.4:
Flames Parallel to a Plane Surface / 7.4.4.1:
Local Convection Heat Transfer With TCHR / 7.4.5.1:
Local Convection and Radiation Heat Transfer / 7.4.5.2:
Heat Transfer from Burners / Chapter 8:
Open-Flame Burners / 8.1:
Momentum Effects / 8.2.1:
Flame Luminosity / 8.2.2:
Firing Rate Effects / 8.2.3:
Flame Shape Effects / 8.2.4:
Radiant Burners / 8.3:
Perforated Ceramic or Wire Mesh Radiant Burners / 8.3.1:
Flame Impingement Radiant Burners / 8.3.2:
Porous Refractory Radiant Burners / 8.3.3:
Advanced Ceramic Radiant Burners / 8.3.4:
Radiant Wall Burners / 8.3.5:
Radiant Tube Burners / 8.3.6:
Effects on Heat Transfer / 8.4:
Fuel Effects / 8.4.1:
Solid Fuels / 8.4.1.1:
Liquid Fuels / 8.4.1.2:
Gaseous Fuels / 8.4.1.3:
Fuel Temperature / 8.4.1.4:
Oxidizer Effects / 8.4.2:
Oxidizer Temperature / 8.4.2.1:
Staging Effects / 8.4.3:
Fuel Staging / 8.4.3.1:
Oxidizer Staging / 8.4.3.2:
Burner Orientation / 8.4.4:
Hearth-Fired Burners / 8.4.4.1:
Wall-Fired Burners / 8.4.4.2:
Roof-Fired Burners / 8.4.4.3:
Side-Fired Burners / 8.4.4.4:
Heat Recuperation / 8.4.5:
Regenerative Burners / 8.4.5.1:
Recuperative Burners / 8.4.5.2:
Furnace or Flue Gas Recirculation / 8.4.5.3:
Pulse Combustion / 8.4.6:
In-Flame Treatment / 8.5:
Heat Transfer in Furnaces / Chapter 9:
Furnaces / 9.1:
Firing Method / 9.2.1:
Direct Firing / 9.2.1.1:
Indirect Firing / 9.2.1.2:
Heat Distribution / 9.2.1.3:
Load Processing Method / 9.2.2:
Batch Processing / 9.2.2.1:
Continuous Processing / 9.2.2.2:
Hybrid Processing / 9.2.2.3:
Heat Transfer Medium / 9.2.3:
Gaseous Medium / 9.2.3.1:
Vacuum / 9.2.3.2:
Liquid Medium / 9.2.3.3:
Solid Medium / 9.2.3.4:
Rotary Geometry / 9.2.4:
Rectangular Geometry / 9.2.4.2:
Ladle Geometry / 9.2.4.3:
Vertical Cylindrical Geometry / 9.2.4.4:
Furnace Types / 9.2.5:
Reverberatory Furnace / 9.2.5.1:
Shaft Kiln / 9.2.5.2:
Rotary Furnace / 9.2.5.3:
Heat Recovery / 9.3:
Gas Recirculation / 9.3.1:
Flue Gas Recirculation / 9.3.3.1:
Furnace Gas Recirculation / 9.3.3.2:
Lower Temperature Applications / Chapter 10:
Ovens and Dryers / 10.1:
Predryer / 10.2.1:
Dryer / 10.2.2:
Fired Heaters / 10.3:
Reformer / 10.3.1:
Process Heater / 10.3.2:
Heat Treating / 10.4:
Standard Atmosphere / 10.4.1:
Special Atmosphere / 10.4.2:
Higher Temperature Applications / Chapter 11:
Industries / 11.1:
Metals Industry / 11.2:
Ferrous Metal Production / 11.2.1:
Electric Arc Furnace / 11.2.1.1:
Smelting / 11.2.1.2:
Ladle Preheating / 11.2.1.3:
Reheating Furnace / 11.2.1.4:
Forging / 11.2.1.5:
Aluminum Metal Production / 11.2.2:
Minerals Industry / 11.3:
Glass / 11.3.1:
Types of Traditional Glass-Melting Furnaces / 11.3.1.1:
Unit Melter / 11.3.1.2:
Recuperative Melter / 11.3.1.3:
Regenerative or Siemens Furnace / 11.3.1.4:
Oxygen-Enhanced Combustion for Glass Production / 11.3.1.5:
Advanced Techniques for Glass Production / 11.3.1.6:
Cement and Lime / 11.3.2:
Bricks, Refractories, and Ceramics / 11.3.3:
Waste Incineration / 11.4:
Types of Incinerators / 11.4.1:
Municipal Waste Incinerators / 11.4.1.1:
Sludge Incinerators / 11.4.1.2:
Mobile Incinerators / 11.4.1.3:
Transportable Incinerators / 11.4.1.4:
Fixed Hazardous Waste Incinerators / 11.4.1.5:
Heat Transfer in Waste Incineration / 11.4.2:
Advanced Combustion Systems / Chapter 12:
Oxygen-Enhanced Combustion / 12.1:
Typical Use Methods / 12.2.1:
Air Enrichment / 12.2.1.1:
O[subscript 2] Lancing / 12.2.1.2:
Oxy/Fuel / 12.2.1.3:
Air-Oxy/Fuel / 12.2.1.4:
Heat Transfer Benefits / 12.2.2:
Increased Productivity / 12.2.3.1:
Higher Thermal Efficiencies / 12.2.3.2:
Higher Heat Transfer Efficiency / 12.2.3.3.:
Increased Flexibility / 12.2.3.4:
Potential Heat Transfer Problems / 12.2.4:
Refractory Damage / 12.2.4.1:
Nonuniform Heating / 12.2.4.2:
Industrial Heating Applications / 12.2.5:
Metals / 12.2.5.1:
Minerals / 12.2.5.2:
Incineration / 12.2.5.3:
Other / 12.2.5.4:
Submerged Combustion / 12.3:
Metals Production / 12.3.1:
Minerals Production / 12.3.2:
Liquid Heating / 12.3.3:
Miscellaneous / 12.4:
Surface Combustor-Heater / 12.4.1:
Direct-Fired Cylinder Dryer / 12.4.2:
Appendices
Reference Sources for Further Information / Appendix A:
Common Conversions / Appendix B:
Methods of Expressing Mixture Ratios for CH[subscript 4], C[subscript 3]H[subscript 8], and H[subscript 2] / Appendix C:
Properties for CH[subscript 4], C[subscript 3]H[subscript 8], and H[subscript 2] Flames / Appendix D:
Fluid Dynamics Equations / Appendix E:
Material Properties / Appendix F:
Author Index
Subject Index
Introduction / Chapter 1:
Importance of Heat Transfer in Industrial Combustion / 1.1:
Energy Consumption / 1.1.1:
39.

電子ブック

EB
Michael Beetz
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2000
所蔵情報: loading…
目次情報: 続きを見る
Abstract
Acknowledgements
List of Figures
Introduction / 1:
The Approach / 1.1:
Technical Challenges / 1.2:
Introductory Example / 1.3:
Motivation / 1.4:
Relevance for Autonomous Robot Control / 1.4.1:
Relevance for AI Planning / 1.4.2:
The Computational Problem and Its Solution / 1.5:
The Computational Problem / 1.5.1:
The Computational Model / 1.5.2:
Contributions / 1.6:
Outline of the Book / 1.7:
Reactivity / 2:
The DeliveryWorld / 2.1:
The World / 2.1.1:
Commands and Jobs / 2.1.2:
The Robot / 2.1.3:
Justification of the DeliveryWorld / 2.1.4:
The Implementation of Routine Activities / 2.2:
Plan Steps vs. Concurrent Control Processes / 2.2.1:
Interfacing Continuous Control Processes / 2.2.2:
Coordinating Control Processes / 2.2.3:
Synchronization of Concurrent Control Threads / 2.2.4:
Failure Recovery / 2.2.5:
Perception / 2.2.6:
State, Memory, and World Models / 2.2.7:
The Structure of Routine Activities / 2.2.8:
The Structured Reactive Controller / 2.3:
Behavior and Planning Modules / 2.3.1:
The Body of the Structured Reactive Controller / 2.3.2:
Global Fluents, Variables, and the Plan Library / 2.3.3:
The RPL Runtime System / 2.3.4:
Summary and Discussion / 2.4:
Planning / 3:
The Structured Reactive Plan / 3.1:
Plans as Syntactic Objects / 3.1.1:
RPL as a Plan Language / 3.1.2:
The Computational Structure / 3.2:
The "Criticize-Revise" Cycle / 3.2.1:
The "Criticize" Step / 3.2.2:
The "Revise" Step / 3.2.3:
The XFRM Planning Framework / 3.3:
Anticipation and Forestalling of Behavior Flaws / 3.4:
The Detection of Behavior Flaws / 3.4.1:
Behavior Flaws and Plan Revisions / 3.4.2:
The Diagnosis of Behavior Flaws / 3.4.3:
Transparent Reactive Plans / 3.5:
Declarative Statements / 4.1:
RPL Construct Descriptions / 4.1.1:
Achievement Goals / 4.1.2:
Perceptions / 4.1.3:
Beliefs / 4.1.4:
Other Declarative Statements / 4.1.5:
Using Declarative Statements / 4.1.6:
Routine Plans / 4.2:
The Plan Library / 4.3:
Behavior Modules / 4.3.1:
Low-level Plans / 4.3.2:
High-level Plans / 4.3.3:
Discussion / 4.4:
Representing Plan Revisions / 5:
Conceptualization / 5.1:
Making Inferences / 5.2:
Some Examples / 5.2.1:
Accessing Code Trees / 5.2.2:
Predicates on Plan Interpretations / 5.2.3:
Predicates on Timelines / 5.2.4:
Timelines and Plan Interpretation / 5.2.5:
Expressing Plan Revisions / 5.3:
XFRML - The Implementation / 5.4:
Forestalling Behavior Flaws / 5.5:
FAUST / 6.1:
The Behavior Critic / 6.1.1:
Detecting Behavior Flaws: Implementation / 6.1.2:
Diagnosing the Causes of Behavior Flaws: Implementation / 6.1.3:
The Bug Class "Behavior-Specification Violation" / 6.1.4:
The Elimination of Behavior Flaws / 6.1.5:
The Plan Revisions for the Example / 6.2:
Some Behavior Flaws and Their Revisions / 6.3:
Perceptual Confusion / 6.3.1:
Missed Deadlines / 6.3.2:
Planning Ongoing Activities / 6.4:
Extending RPL / 7.1:
The RUNTIME-PLAN Statement / 7.1.1:
Plan Swapping / 7.1.2:
Making Planning Assumptions / 7.1.3:
Deliberative Controllers / 7.2:
Improving Iterative Plans by Local Planning / 7.2.1:
Plan Execution a la Shakey / 7.2.2:
Execution Monitoring and Replanning / 7.2.3:
Recovering from Execution Failures / 7.2.4:
Some Robot Control Architectures / 7.2.5:
The Controller in the Experiment / 7.3:
Evaluation / 7.4:
Analysis of the Problem / 8.1:
Assessment of the Method / 8.2:
Description of the Method / 8.2.1:
Evaluation of the Method / 8.2.2:
Demonstration / 8.3:
Evaluating SRCs in Standard Situations / 8.3.1:
Comparing SRCs with the Appropriate Fixed Controller179 / 8.3.2:
Problems that Require SRCs / 8.3.3:
Related Work / 8.4:
Control Architectures for Competent Physical Agents / 8.4.1:
Control Languages for Reactive Control / 8.4.2:
Robot Planning / 8.4.3:
Conclusion / 9:
What Do Structured Reactive Controllers Do? / 9.1:
Why Do Structured Reactive Controllers Work? / 9.2:
Do Structured Reactive Controllers Work for Real Robots? / 9.3:
References
Abstract
Acknowledgements
List of Figures
40.

電子ブック

EB
Sushil Jajodia, Hirosh Joseph, Abhishek Singh, Baibhav Singh
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
Analysis of WEP flaws / 1.2.1:
Key Stream Reuse / 1.2.2:
Message Modification / 1.2.3:
Message Injection / 1.2.4:
Authentication Spoofing / 1.2.5:
IP Redirection / 1.2.6:
Wireless Frame Generation / 1.2.7:
AirJack / 1.2.7.1:
Wavesec / 1.2.7.2:
Libwlan / 1.2.7.3:
FakeAP / 1.2.7.4:
Wnet / 1.2.7.5:
Scapy / 1.2.7.7:
Encryption Cracking Tools / 1.2.8:
Wepcrack / 1.2.8.1:
Dweputils / 1.2.8.2:
Wep tools / 1.2.8.3:
Wep Attack / 1.2.8.4:
Retrieving the WEP keys from Client Host / 1.2.9:
Traffic Inection Tools / 1.2.10:
802.1x Cracking Tools / 1.2.11:
Asleap-imp and Leap / 1.2.11.1:
Wireless DoS Attacks / 1.2.12:
Physical Layer Attack or Jamming / 1.2.12.1:
Signal Strength / 1.2.12.1.1:
Carrier Sensing Time / 1.2.12.1.2:
Packet Delivery Ratio / 1.2.12.1.3:
Signal Strength Consistency check / 1.2.12.1.4:
Spoofed Dessociation and Deauthentication Frames / 1.2.12.2:
Spoofed Malformed Authentication Frames / 1.2.12.3:
Flooding the Access Point Association and Authentication Buffer / 1.2.12.4:
Frame Deletion Attack / 1.2.12.5:
DoS attack dependent upon specific Wireless Setting / 1.2.12.6:
Attack against the 802.11i implementations / 1.2.13:
Authentication Mechanism Attacks / 1.2.13.1:
Prevention and Modifications / 1.3:
TKIP: temporal Key Integrity Protocol / 1.3.1:
TKIP Implementation / 1.3.1.1:
Message Integrity / 1.3.1.1.1:
Initialization Vector / 1.3.1.1.2:
Prevention against the FMS Attack / 1.3.1.1.3:
Per Packet key Mixing / 1.3.1.1.4:
Implementation Details of TKIP / 1.3.1.1.5:
Details of Per Packet Key mixing / 1.3.1.1.6:
Attack on TKIP / 1.3.1.2:
AES - CCMP / 1.3.2:
CCMP Header / 1.3.2.1:
Implementation / 1.3.2.2:
Encryption Process in MPDU / 1.3.2.2.1:
Decrypting MPDU / 1.3.2.2.2:
Prevention Method using Detection Devices / 1.4:
Conclusion / 1.5:
Vulnerability Analysis for Mail Protocols / 2.0:
Format String Specifiers / 2.1:
Format String Vulnerability / 2.2.1:
Format String Denial of Service Attack / 2.2.1.1:
Format String Vulnerability Reading Attack / 2.2.1.2:
Format String Vulnerability Writing Attack / 2.2.1.3:
Preventive Measures for Format String vulnerability / 2.2.1.4:
Buffer Overflow Attack / 2.3:
Buffer Overflow Prevention / 2.3.1:
Directory Traversal Attacks / 2.4:
Remote Detection / 2.4.1:
False Positive in Remote Detection for Mail Traffic / 2.5:
False Positive in case of SMTP Traffic / 2.5.1:
False Positive in case of IMAP Traffic / 2.5.2:
Vulnerability Analysis for FTP and TFTP / 2.6:
Buffer Overflow in FTP / 3.1:
Directory Traversal Attack in FTP / 3.1.2:
TFTP Vulnerability Analysis / 3.2:
Vulnerability Analysis / 3.2.1:
Vulnerability Analysis for HTTP / 3.3:
XSS Attack / 4.1:
Prevention against Cross Site Scripting Attacks / 4.2.1:
Vulnerability Protection / 4.2.1.1:
SQL Injection Attacks / 4.3:
SQL Injection Case Study / 4.3.1:
Preventive Measures / 4.3.2:
SQL injection in Oracle Data base / 4.3.2.1:
Stored Procedures / 4.3.2.2.1:
Remote Detection for Oracle Database / 4.3.2.2.2:
Other Preventive Measures / 4.3.3:
Preventive Measures by developers / 4.3.3.1:
MS DoS Device Name Vulnerability / 4.4:
Prevention from DoS Device Name Vulnerability / 4.4.1:
False Positive in HTTP / 4.5:
Evasion of HTTP Signatures / 4.6:
Vulnerability Analysis for DNS and DHCP / 4.7:
Introduction of DNS Protocol / 5.1:
Vulnerabilities in a DNS Protocol / 5.1.1:
DNS Cache Poisoning / 5.1.1.1:
Redirection Attack / 5.1.1.2:
Buffer Overflow Vulnerability / 5.1.1.3:
DNS Man in the Middle Attack or DNS Hijacking / 5.1.1.4:
DNS Amplification Attack / 5.1.1.5:
False Positives in a DNS Protocol / 5.1.2:
Introduction of DHCP / 5.2:
Vulnerabilities in DHCP / 5.2.1:
Client Masquerading / 5.2.1.1:
Flooding / 5.2.1.2:
Client Misconfiguration / 5.2.1.3:
Theft of Service / 5.2.1.4:
Packet Altercation / 5.2.1.5:
Key Exposure / 5.2.1.6:
Key Distribution / 5.2.1.7:
Protocol Agreement Issues / 5.2.1.8:
False Positive in DHCP / 5.2.2:
Vulnerability Analysis for LDAP and SNMP / 5.3:
ASN and BER Encoding / 6.1:
BER implementation for LDAP / 6.3:
Threat Analysis for Directory Services / 6.3.1:
SNMP / 6.4:
Vulnerability Analysis for SNMP / 6.4.1:
Vulnerability Analysis for RPC / 6.5:
RPC Message Protocol / 7.1:
NDR Format / 7.3:
Port Mapper / 7.4:
False Positive for SMB RPC Protocol / 7.5:
Evasion in RPC / 7.6:
Multiple Binding UUID / 7.6.1:
Fragment Data across many Requests / 7.6.2:
Bind to one UUID then alter Context / 7.6.3:
Prepend an ObjectID / 7.6.4:
Bind with an authentication field / 7.6.5:
One packet UDP function call / 7.6.6:
Endianess Selection / 7.6.7:
Chaining SMB commands / 7.6.8:
Out of order chaining / 7.6.9:
Chaining with random data in between commands / 7.6.10:
Unicode and non-Unicode evasion / 7.6.11:
SMB CreateAndX Path Names / 7.6.12:
Malware / 7.7:
Malware Naming Convention / 8.1:
Worms / 8.2.1:
Trojans / 8.2.2:
Spyware & Adware / 8.2.3:
Malware Threat Analysis / 8.3:
Creating controlled Environment / 8.3.1:
Confinement with the Hard Virtual Machines / 8.3.1.1:
Confinement with the Soft Virtual Machines / 8.3.1.2:
Confinement with Jails and Chroot / 8.3.1.3:
Confinement with System call Sensors / 8.3.1.4:
Confinement with System call Spoofing / 8.3.1.5:
Behavioral Analysis / 8.3.2:
Code Analysis / 8.3.3:
Root Kits / 8.4:
User and Kernel Mode Communication / 8.4.1:
I/O Request Packets (IRP) / 8.4.2:
Interrupt Descriptor Table / 8.4.3:
Service Descriptor Table / 8.4.4:
Direct Kernel Object Manipulation / 8.4.5:
Detection of Rootkits / 8.4.6:
Spyware / 8.5:
Methods of Spyware installation and propagation / 8.5.1:
Drive- By- Downloads / 8.5.1.1:
Bundling / 8.5.1.2:
From Other Spyware / 8.5.1.3:
Security Holes / 8.5.1.4:
Iframe Exploit / 8.5.2:
IE .chm File processing Vulnerability / 8.5.2.2:
Internet Code Download Link / 8.5.2.3:
Anti Spyware Signature Development / 8.5.3:
Vulnerability Signature / 8.5.3.1:
CLSID Data base / 8.5.3.2:
Spyware Specific Signature / 8.5.3.3:
Information Stealing / 8.5.3.4:
Preventing Information from being sent as emails / 8.5.3.5:
Reverse Engineering / 8.6:
Anti Reversing Technique / 9.1:
Anti Disassembly / 9.2.1:
Linear Sweep Disassembler / 9.2.1.1:
Recursive Traversal Disassembler / 9.2.1.2:
Evasion Technique for Disasembler / 9.2.1.3:
Self-Modifying Code / 9.2.2:
Virtual Machine Obfuscation / 9.2.3:
Anti Debugging Technique / 9.3:
Break Points / 9.3.1:
Software break point / 9.3.1.1:
Hardware break point / 9.3.1.2:
Detection of Breakpoint / 9.3.1.3:
Virtual Machine Detection / 9.4:
Checking finger print / 9.4.1:
Checking system tables / 9.4.2:
Checking processor instruction set / 9.4.3:
Unpacking / 9.5:
Manual unpacking of malware / 9.5.1:
Finding an original entry point of an executable / 9.5.1.1:
Taking memory Dump / 9.5.1.2:
Import Table Reconstruction / 9.5.1.3:
Import redirection and code emulation / 9.5.1.4:
Index / 9.6:
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
41.

電子ブック

EB
Sushil Jajodia, Hirosh Joseph, Abhishek Singh, Baibhav Singh, H. Joseph, B. Singh
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
Analysis of WEP flaws / 1.2.1:
Key Stream Reuse / 1.2.2:
Message Modification / 1.2.3:
Message Injection / 1.2.4:
Authentication Spoofing / 1.2.5:
IP Redirection / 1.2.6:
Wireless Frame Generation / 1.2.7:
AirJack / 1.2.7.1:
Wavesec / 1.2.7.2:
Libwlan / 1.2.7.3:
FakeAP / 1.2.7.4:
Wnet / 1.2.7.5:
Scapy / 1.2.7.7:
Encryption Cracking Tools / 1.2.8:
Wepcrack / 1.2.8.1:
Dweputils / 1.2.8.2:
Wep tools / 1.2.8.3:
Wep Attack / 1.2.8.4:
Retrieving the WEP keys from Client Host / 1.2.9:
Traffic Inection Tools / 1.2.10:
802.1x Cracking Tools / 1.2.11:
Asleap-imp and Leap / 1.2.11.1:
Wireless DoS Attacks / 1.2.12:
Physical Layer Attack or Jamming / 1.2.12.1:
Signal Strength / 1.2.12.1.1:
Carrier Sensing Time / 1.2.12.1.2:
Packet Delivery Ratio / 1.2.12.1.3:
Signal Strength Consistency check / 1.2.12.1.4:
Spoofed Dessociation and Deauthentication Frames / 1.2.12.2:
Spoofed Malformed Authentication Frames / 1.2.12.3:
Flooding the Access Point Association and Authentication Buffer / 1.2.12.4:
Frame Deletion Attack / 1.2.12.5:
DoS attack dependent upon specific Wireless Setting / 1.2.12.6:
Attack against the 802.11i implementations / 1.2.13:
Authentication Mechanism Attacks / 1.2.13.1:
Prevention and Modifications / 1.3:
TKIP: temporal Key Integrity Protocol / 1.3.1:
TKIP Implementation / 1.3.1.1:
Message Integrity / 1.3.1.1.1:
Initialization Vector / 1.3.1.1.2:
Prevention against the FMS Attack / 1.3.1.1.3:
Per Packet key Mixing / 1.3.1.1.4:
Implementation Details of TKIP / 1.3.1.1.5:
Details of Per Packet Key mixing / 1.3.1.1.6:
Attack on TKIP / 1.3.1.2:
AES - CCMP / 1.3.2:
CCMP Header / 1.3.2.1:
Implementation / 1.3.2.2:
Encryption Process in MPDU / 1.3.2.2.1:
Decrypting MPDU / 1.3.2.2.2:
Prevention Method using Detection Devices / 1.4:
Conclusion / 1.5:
Vulnerability Analysis for Mail Protocols / 2.0:
Format String Specifiers / 2.1:
Format String Vulnerability / 2.2.1:
Format String Denial of Service Attack / 2.2.1.1:
Format String Vulnerability Reading Attack / 2.2.1.2:
Format String Vulnerability Writing Attack / 2.2.1.3:
Preventive Measures for Format String vulnerability / 2.2.1.4:
Buffer Overflow Attack / 2.3:
Buffer Overflow Prevention / 2.3.1:
Directory Traversal Attacks / 2.4:
Remote Detection / 2.4.1:
False Positive in Remote Detection for Mail Traffic / 2.5:
False Positive in case of SMTP Traffic / 2.5.1:
False Positive in case of IMAP Traffic / 2.5.2:
Vulnerability Analysis for FTP and TFTP / 2.6:
Buffer Overflow in FTP / 3.1:
Directory Traversal Attack in FTP / 3.1.2:
TFTP Vulnerability Analysis / 3.2:
Vulnerability Analysis / 3.2.1:
Vulnerability Analysis for HTTP / 3.3:
XSS Attack / 4.1:
Prevention against Cross Site Scripting Attacks / 4.2.1:
Vulnerability Protection / 4.2.1.1:
SQL Injection Attacks / 4.3:
SQL Injection Case Study / 4.3.1:
Preventive Measures / 4.3.2:
SQL injection in Oracle Data base / 4.3.2.1:
Stored Procedures / 4.3.2.2.1:
Remote Detection for Oracle Database / 4.3.2.2.2:
Other Preventive Measures / 4.3.3:
Preventive Measures by developers / 4.3.3.1:
MS DoS Device Name Vulnerability / 4.4:
Prevention from DoS Device Name Vulnerability / 4.4.1:
False Positive in HTTP / 4.5:
Evasion of HTTP Signatures / 4.6:
Vulnerability Analysis for DNS and DHCP / 4.7:
Introduction of DNS Protocol / 5.1:
Vulnerabilities in a DNS Protocol / 5.1.1:
DNS Cache Poisoning / 5.1.1.1:
Redirection Attack / 5.1.1.2:
Buffer Overflow Vulnerability / 5.1.1.3:
DNS Man in the Middle Attack or DNS Hijacking / 5.1.1.4:
DNS Amplification Attack / 5.1.1.5:
False Positives in a DNS Protocol / 5.1.2:
Introduction of DHCP / 5.2:
Vulnerabilities in DHCP / 5.2.1:
Client Masquerading / 5.2.1.1:
Flooding / 5.2.1.2:
Client Misconfiguration / 5.2.1.3:
Theft of Service / 5.2.1.4:
Packet Altercation / 5.2.1.5:
Key Exposure / 5.2.1.6:
Key Distribution / 5.2.1.7:
Protocol Agreement Issues / 5.2.1.8:
False Positive in DHCP / 5.2.2:
Vulnerability Analysis for LDAP and SNMP / 5.3:
ASN and BER Encoding / 6.1:
BER implementation for LDAP / 6.3:
Threat Analysis for Directory Services / 6.3.1:
SNMP / 6.4:
Vulnerability Analysis for SNMP / 6.4.1:
Vulnerability Analysis for RPC / 6.5:
RPC Message Protocol / 7.1:
NDR Format / 7.3:
Port Mapper / 7.4:
False Positive for SMB RPC Protocol / 7.5:
Evasion in RPC / 7.6:
Multiple Binding UUID / 7.6.1:
Fragment Data across many Requests / 7.6.2:
Bind to one UUID then alter Context / 7.6.3:
Prepend an ObjectID / 7.6.4:
Bind with an authentication field / 7.6.5:
One packet UDP function call / 7.6.6:
Endianess Selection / 7.6.7:
Chaining SMB commands / 7.6.8:
Out of order chaining / 7.6.9:
Chaining with random data in between commands / 7.6.10:
Unicode and non-Unicode evasion / 7.6.11:
SMB CreateAndX Path Names / 7.6.12:
Malware / 7.7:
Malware Naming Convention / 8.1:
Worms / 8.2.1:
Trojans / 8.2.2:
Spyware & Adware / 8.2.3:
Malware Threat Analysis / 8.3:
Creating controlled Environment / 8.3.1:
Confinement with the Hard Virtual Machines / 8.3.1.1:
Confinement with the Soft Virtual Machines / 8.3.1.2:
Confinement with Jails and Chroot / 8.3.1.3:
Confinement with System call Sensors / 8.3.1.4:
Confinement with System call Spoofing / 8.3.1.5:
Behavioral Analysis / 8.3.2:
Code Analysis / 8.3.3:
Root Kits / 8.4:
User and Kernel Mode Communication / 8.4.1:
I/O Request Packets (IRP) / 8.4.2:
Interrupt Descriptor Table / 8.4.3:
Service Descriptor Table / 8.4.4:
Direct Kernel Object Manipulation / 8.4.5:
Detection of Rootkits / 8.4.6:
Spyware / 8.5:
Methods of Spyware installation and propagation / 8.5.1:
Drive- By- Downloads / 8.5.1.1:
Bundling / 8.5.1.2:
From Other Spyware / 8.5.1.3:
Security Holes / 8.5.1.4:
Iframe Exploit / 8.5.2:
IE .chm File processing Vulnerability / 8.5.2.2:
Internet Code Download Link / 8.5.2.3:
Anti Spyware Signature Development / 8.5.3:
Vulnerability Signature / 8.5.3.1:
CLSID Data base / 8.5.3.2:
Spyware Specific Signature / 8.5.3.3:
Information Stealing / 8.5.3.4:
Preventing Information from being sent as emails / 8.5.3.5:
Reverse Engineering / 8.6:
Anti Reversing Technique / 9.1:
Anti Disassembly / 9.2.1:
Linear Sweep Disassembler / 9.2.1.1:
Recursive Traversal Disassembler / 9.2.1.2:
Evasion Technique for Disasembler / 9.2.1.3:
Self-Modifying Code / 9.2.2:
Virtual Machine Obfuscation / 9.2.3:
Anti Debugging Technique / 9.3:
Break Points / 9.3.1:
Software break point / 9.3.1.1:
Hardware break point / 9.3.1.2:
Detection of Breakpoint / 9.3.1.3:
Virtual Machine Detection / 9.4:
Checking finger print / 9.4.1:
Checking system tables / 9.4.2:
Checking processor instruction set / 9.4.3:
Unpacking / 9.5:
Manual unpacking of malware / 9.5.1:
Finding an original entry point of an executable / 9.5.1.1:
Taking memory Dump / 9.5.1.2:
Import Table Reconstruction / 9.5.1.3:
Import redirection and code emulation / 9.5.1.4:
Index / 9.6:
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
42.

電子ブック

EB
Zoya Ignatova, Israel Mart?nez-P?rez
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
References
Theoretical Computer Science / 2:
Graphs / 2.1:
Basic Notions / 2.1.1:
Paths and Cycles / 2.1.2:
Closures and Paths / 2.1.3:
Trees / 2.1.4:
Bipartite Graphs / 2.1.5:
Finite State Automata / 2.2:
Strings and Languages / 2.2.1:
Deterministic Finite State Automata / 2.2.2:
Non-Deterministic Finite State Automata / 2.2.3:
Regular Expressions / 2.2.4:
Stochastic Finite State Automata / 2.2.5:
Computability / 2.3:
Turing Machines / 2.3.1:
Universal Turing Machines / 2.3.2:
Church's Thesis / 2.3.3:
Register Machines / 2.3.4:
Cellular Automata / 2.3.5:
Formal Grammars / 2.4:
Grammars and Languages / 2.4.1:
Chomsky's Hierarchy / 2.4.2:
Grammars and Machines / 2.4.3:
Undecidability / 2.4.4:
Combinatorial Logic / 2.5:
Boolean Circuits / 2.5.1:
Compound Circuits / 2.5.2:
Minterms and Maxterms / 2.5.3:
Canonical Circuits / 2.5.4:
Adder Circuits / 2.5.5:
Computational Complexity / 2.6:
Time Complexity / 2.6.1:
Infinite Asymptotics / 2.6.2:
Decision Problems / 2.6.3:
Optimization Problems / 2.6.4:
Molecular Biology / 3:
DNA / 3.1:
Molecular Structure / 3.1.1:
Manipulation of DNA / 3.1.2:
Physical Chemistry / 3.2:
Thermodynamics / 3.2.1:
Chemical Kinetics / 3.2.2:
DNA Annealing Kinetics / 3.2.3:
Strand Displacement Kinetics / 3.2.4:
Stochastic Chemical Kinetics / 3.2.5:
Genes / 3.3:
Structure and Biosynthesis / 3.3.1:
DNA Recombination / 3.3.2:
Genomes / 3.3.3:
Gene Expression / 3.4:
Protein Biosynthesis / 3.4.1:
Proteins - Molecular Structure / 3.4.2:
Enzymes / 3.4.3:
Cells and Organisms / 3.5:
Eukaryotes and Prokaryotes / 3.5.1:
Viruses / 3.6:
General Structure and Classification / 3.6.1:
Applications / 3.6.2:
Word Design for DNA Computing / 4:
Constraints / 4.1:
Free Energy and Melting Temperature / 4.1.1:
Distance / 4.1.2:
Similarity / 4.1.3:
DNA Languages / 4.2:
Bond-Free Languages / 4.2.1:
Hybridization Properties / 4.2.2:
Small DNA Languages / 4.2.3:
DNA Code Constructions and Bounds / 4.3:
Reverse and Reverse-Complement Codes / 4.3.1:
Constant GC-Content Codes / 4.3.2:
Similarity-Based Codes / 4.3.3:
In Vitro Random Selection / 4.4:
General Selection Model / 4.4.1:
Selective Word Design / 4.4.2:
Concluding Remarks
Non-Autonomous DNA Models / 5:
Seminal Work / 5.1:
Adleman's First Experiment / 5.1.1:
Lipton's First Paper / 5.1.2:
Filtering Models / 5.2:
Memory-Less Filtering / 5.2.1:
Memory-Based Filtering / 5.2.2:
Mark-and-Destroy Filtering / 5.2.3:
Split-and-Merge Filtering / 5.2.4:
Filtering by Blocking / 5.2.5:
Surface-Based Filtering / 5.2.6:
Sticker Systems / 5.3:
Sticker Machines / 5.3.1:
Combinatorial Libraries / 5.3.2:
Useful Subroutines / 5.3.3:
NP-Complete Problems / 5.3.4:
Splicing Systems / 5.4:
Basic Splicing Systems / 5.4.1:
Recursively Enumerable Splicing Systems / 5.4.2:
Universal Splicing Systems / 5.4.3:
Recombinant Systems / 5.4.4:
Autonomous DNA Models / 6:
Algorithmic Self-Assembly / 6.1:
Self-Assembly / 6.1.1:
DNA Graphs / 6.1.2:
Linear Self-Assembly / 6.1.3:
Tile Assembly / 6.1.4:
Finite State Automaton Models / 6.2:
Two-State Two-Symbol Automata / 6.2.1:
Length-Encoding Automata / 6.2.2:
Sticker Automata / 6.2.3:
Stochastic Automata / 6.2.4:
DNA Hairpin Model / 6.3:
Whiplash PCR / 6.3.1:
Satisfiability / 6.3.2:
Hamiltonian Paths / 6.3.3:
Maximum Cliques / 6.3.4:
Hairpin Structures / 6.3.5:
Computational Models / 6.4:
Neural Networks / 6.4.1:
Tic-Tac-Toe Networks / 6.4.2:
Logic Circuits / 6.4.3:
Cellular DNA Computing / 6.4.4:
Ciliate Computing / 7.1:
Ciliates / 7.1.1:
Models of Gene Assembly / 7.1.2:
Intramolecular String Model / 7.1.3:
Intramolecular Graph Model / 7.1.4:
Intermolecular String Model / 7.1.5:
Biomolecular Computing / 7.2:
Gene Therapy / 7.2.1:
Anti-Sense Technology / 7.2.2:
Cell-Based Finite State Automata / 7.3:
Anti-Sense Finite State Automata / 7.4:
Basic Model / 7.4.1:
Diagnostic Rules / 7.4.2:
Diagnosis and Therapy / 7.4.3:
Computational Genes / 7.5:
Index / 7.5.1:
Introduction / 1:
References
Theoretical Computer Science / 2:
43.

図書

図書
Jean-Paul Pier
出版情報: Oxford : Oxford University Press, 2001  x, 428 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The scope of analysis / 1.1:
The great classics on analysis / 1.1.1:
The changing object of analysis / 1.1.2:
Main streams in a turbulent activity / 1.2:
The question of subdividing mathematical analysis / 1.2.1:
How to organize the subject / 1.2.2:
General Topology / 2:
Evolution 1900-1950 / 2.1:
Topological axiomatizations / 2.1.1:
Topological algebra / 2.1.2:
Filtrations / 2.1.3:
Dimension theory / 2.1.4:
Complementary inputs / 2.1.5:
Flashes 1950-2000 / 2.2:
An accomplished subject / 2.2.1:
Generalized topological concepts / 2.2.2:
Integration and Measure / 3:
Lebesgue integration / 3.1:
The general concept of measure / 3.1.2:
Paradoxical decomposition / 3.1.3:
Period of consolidation / 3.1.4:
Standing problems / 3.2:
Abstract formulations / 3.2.2:
Generalized Riemann integrals / 3.2.3:
Outlook / 3.2.4:
Functional analysis / 4:
New objectives / 4.1:
Theory of integral equations / 4.1.2:
Banach spaces / 4.1.3:
Hilbert spaces / 4.1.4:
von Neumann algebras / 4.1.5:
Banach algebras / 4.1.6:
Distributions / 4.1.7:
Topological vector spaces / 4.2:
Extension of Weierstra[beta]'s theorem / 4.2.2:
Frechet spaces, Schwartz spaces, Sobolev spaces / 4.2.3:
Banach space properties / 4.2.4:
Hilbert space properties / 4.2.5:
Banach algebra and C*-algebra properties / 4.2.6:
Approximation properties / 4.2.7:
Nuclearity / 4.2.8:
von Neumann algebra properties / 4.2.9:
Specific topics / 4.2.10:
Harmonic analysis / 5:
Fourier series / 5.1:
Invariant measures / 5.1.2:
Almost periodic functions / 5.1.3:
Uniqueness of invariant measures / 5.1.4:
Convolutions / 5.1.5:
An evolution linked to the history of physics / 5.1.6:
Representation theory / 5.1.7:
Structural properties of topological groups / 5.1.8:
Positive-definite functions / 5.1.9:
Harmonic synthesis / 5.1.10:
Metric locally compact Abelian groups / 5.1.11:
Fourier transforms / 5.2:
Convolution properties / 5.2.2:
Group representations / 5.2.3:
Remarkable Banach algebras of functions on a locally compact group / 5.2.4:
Specific sets / 5.2.5:
Specific groups / 5.2.6:
Harmonic analysis on semigroups / 5.2.7:
Wavelets / 5.2.8:
Generalized actions / 5.2.9:
Lie groups / 6:
Lie groups and Lie algebras / 6.1:
Symmetric Riemannian spaces / 6.1.2:
Hilbert's problem for Lie groups / 6.1.3:
Representations of Lie groups / 6.1.4:
The wide range of Lie group theory / 6.2:
Solution of Hilbert's problem on Lie groups / 6.2.2:
Ergodicity problems / 6.2.3:
Specific classes of Lie groups / 6.2.4:
Extensions of Lie group theory / 6.2.5:
Theory of functions and analytic geometry / 7:
The nineteenth century continued / 7.1:
Potential theory / 7.1.2:
Conformal mappings / 7.1.3:
Towards a theory of several complex variables / 7.1.4:
Accomplishments on previous topics / 7.2:
Hardy spaces / 7.2.2:
The dominance of the theory of several complex variables / 7.2.3:
Iteration problems / 7.2.4:
Ordinary and Partial Differential Equations / 8:
New trends for classical problems / 8.1:
Fixed point properties / 8.1.2:
From the ordinary differential case to the partial differential case / 8.1.3:
Differential equations / 8.2:
Partial differential equations / 8.2.2:
Tentacular subjects / 8.2.3:
Algebraic topology / 9:
The origins of algebraic topology / 9.1:
Simplicial theories / 9.1.2:
Homotopy theory / 9.1.3:
Fibres and fibrations / 9.1.4:
The breakthroughs due to Eilenberg, MacLane, and Leray / 9.1.5:
The power of the machinery / 9.2:
Generalizations / 9.2.2:
Differential topology / 10:
The beginning of the century / 10.1:
E. Cartan's work / 10.1.2:
Tensor products and exterior differentials / 10.1.3:
Morse theory / 10.1.4:
Whitney's work / 10.1.5:
De Rham's work / 10.1.6:
Hodge theory / 10.1.7:
The framing of the subject / 10.1.8:
The status of differentiable manifolds / 10.2:
Foliations / 10.2.2:
From Poincare's heritage / 10.2.3:
Global analysis / 10.2.5:
Probability / 11:
First results / 11.1:
Brownian motion / 11.1.2:
Ergodicity / 11.1.3:
Probabilities as measures / 11.1.4:
Stochastic integrals / 11.1.5:
Probability theory, a part of analysis / 11.2:
Dynamical systems and ergodicity / 11.2.2:
Entropy / 11.2.3:
Stochastic processes / 11.2.4:
Algebraic geometry / 12:
Algebraic geometry and number theory / 12.1:
The Mordell conjecture / 12.1.2:
Transcendence and prime numbers / 12.1.3:
The Riemann conjecture / 12.1.4:
Arithmetical properties / 12.2:
Investigations on transcendental numbers / 12.2.2:
A central object of study / 12.2.3:
Etale cohomology / 12.2.4:
The general Riemann-Roch theorems / 12.2.5:
K-theory / 12.2.6:
Further studies / 12.2.7:
References
Index of Names
Index of Terms
List of Symbols / Appendix:
Introduction / 1:
The scope of analysis / 1.1:
The great classics on analysis / 1.1.1:
44.

電子ブック

EB
Zoya Ignatova, Israel Martínez-Pérez, Karl-Heinz Zimmermann
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
References
Theoretical Computer Science / 2:
Graphs / 2.1:
Basic Notions / 2.1.1:
Paths and Cycles / 2.1.2:
Closures and Paths / 2.1.3:
Trees / 2.1.4:
Bipartite Graphs / 2.1.5:
Finite State Automata / 2.2:
Strings and Languages / 2.2.1:
Deterministic Finite State Automata / 2.2.2:
Non-Deterministic Finite State Automata / 2.2.3:
Regular Expressions / 2.2.4:
Stochastic Finite State Automata / 2.2.5:
Computability / 2.3:
Turing Machines / 2.3.1:
Universal Turing Machines / 2.3.2:
Church's Thesis / 2.3.3:
Register Machines / 2.3.4:
Cellular Automata / 2.3.5:
Formal Grammars / 2.4:
Grammars and Languages / 2.4.1:
Chomsky's Hierarchy / 2.4.2:
Grammars and Machines / 2.4.3:
Undecidability / 2.4.4:
Combinatorial Logic / 2.5:
Boolean Circuits / 2.5.1:
Compound Circuits / 2.5.2:
Minterms and Maxterms / 2.5.3:
Canonical Circuits / 2.5.4:
Adder Circuits / 2.5.5:
Computational Complexity / 2.6:
Time Complexity / 2.6.1:
Infinite Asymptotics / 2.6.2:
Decision Problems / 2.6.3:
Optimization Problems / 2.6.4:
Molecular Biology / 3:
DNA / 3.1:
Molecular Structure / 3.1.1:
Manipulation of DNA / 3.1.2:
Physical Chemistry / 3.2:
Thermodynamics / 3.2.1:
Chemical Kinetics / 3.2.2:
DNA Annealing Kinetics / 3.2.3:
Strand Displacement Kinetics / 3.2.4:
Stochastic Chemical Kinetics / 3.2.5:
Genes / 3.3:
Structure and Biosynthesis / 3.3.1:
DNA Recombination / 3.3.2:
Genomes / 3.3.3:
Gene Expression / 3.4:
Protein Biosynthesis / 3.4.1:
Proteins - Molecular Structure / 3.4.2:
Enzymes / 3.4.3:
Cells and Organisms / 3.5:
Eukaryotes and Prokaryotes / 3.5.1:
Viruses / 3.6:
General Structure and Classification / 3.6.1:
Applications / 3.6.2:
Word Design for DNA Computing / 4:
Constraints / 4.1:
Free Energy and Melting Temperature / 4.1.1:
Distance / 4.1.2:
Similarity / 4.1.3:
DNA Languages / 4.2:
Bond-Free Languages / 4.2.1:
Hybridization Properties / 4.2.2:
Small DNA Languages / 4.2.3:
DNA Code Constructions and Bounds / 4.3:
Reverse and Reverse-Complement Codes / 4.3.1:
Constant GC-Content Codes / 4.3.2:
Similarity-Based Codes / 4.3.3:
In Vitro Random Selection / 4.4:
General Selection Model / 4.4.1:
Selective Word Design / 4.4.2:
Concluding Remarks
Non-Autonomous DNA Models / 5:
Seminal Work / 5.1:
Adleman's First Experiment / 5.1.1:
Lipton's First Paper / 5.1.2:
Filtering Models / 5.2:
Memory-Less Filtering / 5.2.1:
Memory-Based Filtering / 5.2.2:
Mark-and-Destroy Filtering / 5.2.3:
Split-and-Merge Filtering / 5.2.4:
Filtering by Blocking / 5.2.5:
Surface-Based Filtering / 5.2.6:
Sticker Systems / 5.3:
Sticker Machines / 5.3.1:
Combinatorial Libraries / 5.3.2:
Useful Subroutines / 5.3.3:
NP-Complete Problems / 5.3.4:
Splicing Systems / 5.4:
Basic Splicing Systems / 5.4.1:
Recursively Enumerable Splicing Systems / 5.4.2:
Universal Splicing Systems / 5.4.3:
Recombinant Systems / 5.4.4:
Autonomous DNA Models / 6:
Algorithmic Self-Assembly / 6.1:
Self-Assembly / 6.1.1:
DNA Graphs / 6.1.2:
Linear Self-Assembly / 6.1.3:
Tile Assembly / 6.1.4:
Finite State Automaton Models / 6.2:
Two-State Two-Symbol Automata / 6.2.1:
Length-Encoding Automata / 6.2.2:
Sticker Automata / 6.2.3:
Stochastic Automata / 6.2.4:
DNA Hairpin Model / 6.3:
Whiplash PCR / 6.3.1:
Satisfiability / 6.3.2:
Hamiltonian Paths / 6.3.3:
Maximum Cliques / 6.3.4:
Hairpin Structures / 6.3.5:
Computational Models / 6.4:
Neural Networks / 6.4.1:
Tic-Tac-Toe Networks / 6.4.2:
Logic Circuits / 6.4.3:
Cellular DNA Computing / 6.4.4:
Ciliate Computing / 7.1:
Ciliates / 7.1.1:
Models of Gene Assembly / 7.1.2:
Intramolecular String Model / 7.1.3:
Intramolecular Graph Model / 7.1.4:
Intermolecular String Model / 7.1.5:
Biomolecular Computing / 7.2:
Gene Therapy / 7.2.1:
Anti-Sense Technology / 7.2.2:
Cell-Based Finite State Automata / 7.3:
Anti-Sense Finite State Automata / 7.4:
Basic Model / 7.4.1:
Diagnostic Rules / 7.4.2:
Diagnosis and Therapy / 7.4.3:
Computational Genes / 7.5:
Index / 7.5.1:
Introduction / 1:
References
Theoretical Computer Science / 2:
45.

図書

図書
M. Hinze ... [et al.]
出版情報: [Dordrecht] : Springer, c2009  xi, 270 p. ; 24 cm
シリーズ名: Mathematical modelling : theory and applications ; v. 23
所蔵情報: loading…
目次情報: 続きを見る
Preface
Analytical Background and Optimality Theory / 1:
Stefan Ulbrich
Introduction and Examples / 1.1:
Introduction / 1.1.1:
Examples for Optimization Problems with PDEs / 1.1.2:
Optimization of a Stationary Heating Process / 1.1.3:
Optimization of an Unsteady Heating Processes / 1.1.4:
Optimal Design / 1.1.5:
Linear Functional Analysis and Sobolev Spaces / 1.2:
Banach and Hilbert Spaces / 1.2.1:
Sobolev Spaces / 1.2.2:
Weak Convergence / 1.2.3:
Weak Solutions of Elliptic and Parabolic PDEs / 1.3:
Weak Solutions of Elliptic PDEs / 1.3.1:
Weak Solutions of Parabolic PDEs / 1.3.2:
Gateaux- and Fréchet Differentiability / 1.4:
Basic Definitions / 1.4.1:
Implicit Function Theorem / 1.4.2:
Existence of Optimal Controls / 1.5:
Existence Result for a General Linear-Quadratic Problem / 1.5.1:
Existence Result for Nonlinear Problems / 1.5.2:
Applications / 1.5.3:
Reduced Problem, Sensitivities and Adjoints / 1.6:
Sensitivity Approach / 1.6.1:
Adjoint Approach / 1.6.2:
Application to a Linear-Quadratic Optimal Control Problem / 1.6.3:
A Lagrangian-Based View of the Adjoint Approach / 1.6.4:
Second Derivatives / 1.6.5:
Optimality Conditions / 1.7:
Optimality Conditions for Simply Constrained Problems / 1.7.1:
Optimality Conditions for Control-Constrained Problems / 1.7.2:
Optimality Conditions for Problems with General Constraints / 1.7.3:
Optimal Control of Instationary Incompressible Navier-Stokes Flow / 1.8:
Functional Analytic Setting / 1.8.1:
Analysis of the Flow Control Problem / 1.8.2:
Reduced Optimal Control Problem / 1.8.3:
Optimization Methods in Banach Spaces / 2:
Michael Ulbrich
Synopsis / 2.1:
Globally Convergent Methods in Banach Spaces / 2.2:
Unconstrained Optimization / 2.2.1:
Optimization on Closed Convex Sets / 2.2.2:
General Optimization Problems / 2.2.3:
Newton-Based Methods-A Preview / 2.3:
Unconstrained Problems-Newton's Method / 2.3.1:
Simple Constraints / 2.3.2:
General Inequality Constraints / 2.3.3:
Generalized Newton Methods / 2.4:
Motivation: Application to Optimal Control / 2.4.1:
A General Superlinear Convergence Result / 2.4.2:
The Classical Newton's Method / 2.4.3:
Generalized Differential and Semismoothness / 2.4.4:
Semismooth Newton Methods / 2.4.5:
Semismooth Newton Methods in Function Spaces / 2.5:
Semismoothness of Superposition Operators / 2.5.1:
Application to Optimal Control / 2.5.3:
Application to Elliptic Optimal Control Problems / 2.5.5:
Optimal Control of the Incompressible Navier-Stokes Equations / 2.5.7:
Sequential Quadratic Programming / 2.6:
Lagrange-Newton Methods for Equality Constrained Problems / 2.6.1:
The Josephy-Newton Method / 2.6.2:
SQP Methods for Inequality Constrained Problems / 2.6.3:
State-Constrained Problems / 2.7:
SQP Methods / 2.7.1:
Further Aspects / 2.7.2:
Mesh Independence / 2.8.1:
Application of Fast Solvers / 2.8.2:
Other Methods / 2.8.3:
Discrete Concepts in PDE Constrained Optimization / 3:
Michael Hinze
Control Constraints / 3.1:
Stationary Model Problem / 3.2.1:
First Discretize, Then Optimize / 3.2.2:
First Optimize, Then Discretize / 3.2.3:
Discussion and Implications / 3.2.4:
The Variational Discretization Concept / 3.2.5:
Error Estimates / 3.2.6:
Boundary Control / 3.2.7:
Some Literature Related to Control Constraints / 3.2.8:
Constraints on the State / 3.3:
Pointwise Bounds on the State / 3.3.1:
Pointwise Bounds on the Gradient of the State / 3.3.2:
Time Dependent Problem / 3.4:
Mathematical Model, State Equation / 3.4.1:
Optimization Problem / 3.4.2:
Discretization / 3.4.3:
Further Literature on Control of Time-Dependent Problems / 3.4.4:
Rene Pinnau / 4:
Optimal Semiconductor Design / 4.1:
Semiconductor Device Physics / 4.1.1:
The Optimization Problem / 4.1.2:
Numerical Results / 4.1.3:
Optimal Control of Glass Cooling / 4.2:
Modeling / 4.2.1:
Optimal Boundary Control / 4.2.2:
References / 4.2.3:
Preface
Analytical Background and Optimality Theory / 1:
Stefan Ulbrich
46.

図書

図書
Oded Goldreich
出版情報: Cambridge : Cambridge University Press, 2008  xxiv, 606 p. ; 27 cm
所蔵情報: loading…
目次情報: 続きを見る
List of Figures
Preface
Organization and Chapter Summaries
Acknowledgments
Introduction and Preliminaries / 1:
Introduction / 1.1:
A Brief Overview of Complexity Theory / 1.1.1:
Characteristics of Complexity Theory / 1.1.2:
Contents of This Book / 1.1.3:
Approach and Style of This Book / 1.1.4:
Standard Notations and Other Conventions / 1.1.5:
Computational Tasks and Models / 1.2:
Representation / 1.2.1:
Computational Tasks / 1.2.2:
Uniform Models (Algorithms) / 1.2.3:
Non-uniform Models (Circuits and Advice) / 1.2.4:
Complexity Classes / 1.2.5:
Chapter Notes
P, NP, and NP-Completeness / 2:
The P Versus NP Question / 2.1:
The Search Version: Finding Versus Checking / 2.1.1:
The Decision Version: Proving Versus Verifying / 2.1.2:
Equivalence of the Two Formulations / 2.1.3:
Two Technical Comments Regarding NP / 2.1.4:
The Traditional Definition of NP / 2.1.5:
In Support of P Different from NP / 2.1.6:
Philosophical Meditations / 2.1.7:
Polynomial-Time Reductions / 2.2:
The General Notion of a Reduction / 2.2.1:
Reducing Optimization Problems to Search Problems / 2.2.2:
Self-Reducibility of Search Problems / 2.2.3:
Digest and General Perspective / 2.2.4:
NP-Completeness / 2.3:
Definitions / 2.3.1:
The Existence of NP-Complete Problems / 2.3.2:
Some Natural NP-Complete Problems / 2.3.3:
NP Sets That Are Neither in P nor NP-Complete / 2.3.4:
Reflections on Complete Problems / 2.3.5:
Three Relatively Advanced Topics / 2.4:
Promise Problems / 2.4.1:
Optimal Search Algorithms for NP / 2.4.2:
The Class coNP and Its Intersection with NP / 2.4.3:
Exercises
Variations on P and NP / 3:
Non-uniform Polynomial Time (P/poly) / 3.1:
Boolean Circuits / 3.1.1:
Machines That Take Advice / 3.1.2:
The Polynomial-Time Hierarchy (PH) / 3.2:
Alternation of Quantifiers / 3.2.1:
Non-deterministic Oracle Machines / 3.2.2:
The P/poly Versus NP Question and PH / 3.2.3:
More Resources, More Power? / 4:
Non-uniform Complexity Hierarchies / 4.1:
Time Hierarchies and Gaps / 4.2:
Time Hierarchies / 4.2.1:
Time Gaps and Speedup / 4.2.2:
Space Hierarchies and Gaps / 4.3:
Space Complexity / 5:
General Preliminaries and Issues / 5.1:
Important Conventions / 5.1.1:
On the Minimal Amount of Useful Computation Space / 5.1.2:
Time Versus Space / 5.1.3:
Circuit Evaluation / 5.1.4:
Logarithmic Space / 5.2:
The Class L / 5.2.1:
Log-Space Reductions / 5.2.2:
Log-Space Uniformity and Stronger Notions / 5.2.3:
Undirected Connectivity / 5.2.4:
Non-deterministic Space Complexity / 5.3:
Two Models / 5.3.1:
NL and Directed Connectivity / 5.3.2:
A Retrospective Discussion / 5.3.3:
PSPACE and Games / 5.4:
Randomness and Counting / 6:
Probabilistic Polynomial Time / 6.1:
Basic Modeling Issues / 6.1.1:
Two-Sided Error: The Complexity Class BPP / 6.1.2:
One-Sided Error: The Complexity Classes RP and coRP / 6.1.3:
Zero-Sided Error: The Complexity Class ZPP / 6.1.4:
Randomized Log-Space / 6.1.5:
Counting / 6.2:
Exact Counting / 6.2.1:
Approximate Counting / 6.2.2:
Searching for Unique Solutions / 6.2.3:
Uniform Generation of Solutions / 6.2.4:
The Bright Side of Hardness / 7:
One-Way Functions / 7.1:
Generating Hard Instances and One-Way Functions / 7.1.1:
Amplification of Weak One-Way Functions / 7.1.2:
Hard-Core Preicates / 7.1.3:
Reflections on Hardness Amplification / 7.1.4:
Hard Problems in E / 7.2:
Amplification with Respect to Polynomial-Size Circuits / 7.2.1:
Amplification with Respect to Exponential-Size Circuits / 7.2.2:
Pseudorandom Generators / 8:
The General Paradigm / 8.1:
General-Purpose Pseudorandom Generators / 8.2:
The Basic Definition / 8.2.1:
The Archetypical Application / 8.2.2:
Computational Indistinguishability / 8.2.3:
Amplifying the Stretch Function / 8.2.4:
Constructions / 8.2.5:
Non-uniformly Strong Pseudorandom Generators / 8.2.6:
Stronger Notions and Conceptual Reflections / 8.2.7:
Derandomization of Time-Complexity Classes / 8.3:
Defining Canonical Derandomizers / 8.3.1:
Constructing Canonical Derandomizers / 8.3.2:
Technical Variations and Conceptual Reflections / 8.3.3:
Space-Bounded Distinguishers / 8.4:
Definitional Issues / 8.4.1:
Two Constructions / 8.4.2:
Special-Purpose Generators / 8.5:
Pairwise Independence Generators / 8.5.1:
Small-Bias Generators / 8.5.2:
Random Walks on Expanders / 8.5.3:
Probabilistic Proof Systems / 9:
Interactive Proof Systems / 9.1:
Motivation and Perspective / 9.1.1:
Definition / 9.1.2:
The Power of Interactive Proofs / 9.1.3:
Variants and Finer Structure: An Overview / 9.1.4:
On Computationally Bounded Provers: An Overview / 9.1.5:
Zero-Knowledge Proof Systems / 9.2:
The Power of Zero-Knowledge / 9.2.1:
Proofs of Knowledge - A Parenthetical Subsection / 9.2.3:
Probabilistically Checkable Proof Systems / 9.3:
The Power of Probabilistically Checkable Proofs / 9.3.1:
PCP and Approximation / 9.3.3:
More on PCP Itself: An Overview / 9.3.4:
Relaxing the Requirements / 10:
Approximation / 10.1:
Search or Optimization / 10.1.1:
Decision or Property Testing / 10.1.2:
Average-Case Complexity / 10.2:
The Basic Theory / 10.2.1:
Ramifications / 10.2.2:
Epilogue
Glossary of Complexity Classes / Appendix A:
Preliminaries / A.1:
Algorithm-Based Classes / A.2:
Time Complexity Classes / A.2.1:
Space Complexity Classes / A.2.2:
Circuit-Based Classes / A.3:
On the Quest for Lower Bounds / Appendix B:
Boolean Circuit Complexity / B.1:
Basic Results and Questions / B.2.1:
Monotone Circuits / B.2.2:
Bounded-Depth Circuits / B.2.3:
Formula Size / B.2.4:
Arithmetic Circuits / B.3:
Univariate Polynomials / B.3.1:
Multivariate Polynomials / B.3.2:
Proof Complexity / B.4:
Logical Proof Systems / B.4.1:
Algebraic Proof Systems / B.4.2:
Geometric Proof Systems / B.4.3:
On the Foundations of Modern Cryptography / Appendix C:
The Underlying Principles / C.1:
The Computational Model / C.1.2:
Organization and Beyond / C.1.3:
Computational Difficulty / C.2:
Hard-Core Predicates / C.2.1:
Pseudorandomness / C.3:
Pseudorandom Functions / C.3.1:
Zero-Knowledge / C.4:
The Simulation Paradigm / C.4.1:
The Actual Definition / C.4.2:
A General Result and a Generic Application / C.4.3:
Definitional Variations and Related Notions / C.4.4:
Encryption Schemes / C.5:
Beyond Eavesdropping Security / C.5.1:
Signatures and Message Authentication / C.6:
General Cryptographic Protocols / C.6.1:
The Definitional Approach and Some Models / C.7.1:
Some Known Results / C.7.2:
Construction Paradigms and Two Simple Protocols / C.7.3:
Concluding Remarks / C.7.4:
Probabilistic Preliminaries and Advanced Topics in Randomization / Appendix D:
Probabilistic Preliminaries / D.1:
Notational Conventions / D.1.1:
Three Inequalities / D.1.2:
Hashing / D.2:
The Leftover Hash Lemma / D.2.1:
Sampling / D.3:
Formal Setting / D.3.1:
Known Results / D.3.2:
Hitters / D.3.3:
Randomnes Extractors / D.4:
Definitions and Various Perspectives / D.4.1:
Explicit Constructions / D.4.2:
Error-Correcting Codes / E.1:
Basic Notions / E.1.1:
A Few Popular Codes / E.1.2:
Two Additional Computational Problems / E.1.3:
A List-Decoding Bound / E.1.4:
Expander Graphs / E.2:
Definitions and Properties / E.2.1:
Some Omitted Proofs / E.2.2:
Proving That PH Reduces to #P / F.1:
Proving That IP(f) [characters not reproducible] AM(O(f)) [characters not reproducible] AM(f) / F.2:
Emulating General Interactive Proofs by AM-Games / F.2.1:
Linear Speedup for AM / F.2.2:
Some Computational Problems / Appendix G:
Graphs / G.1:
Boolean Formulae / G.2:
Finite Fields, Polynomials, and Vector Spaces / G.3:
The Determinant and the Permanent / G.4:
Primes and Composite Numbers / G.5:
Bibliography
Index
List of Figures
Preface
Organization and Chapter Summaries
47.

電子ブック

EB
Roland Zimmermann, Monique Calisti, Marius Walliser
出版情報: Springer eBooks Computer Science , Dordrecht : Birkh?user Basel, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
Event-related Information Logistics / 2.1.1:
Supply Networks / 2.1.2:
Formal Specification of the Problem / 2.1.3:
Requirements of an Event Management Solution / 2.2:
General Requirements / 2.2.1:
Functional Requirements / 2.2.2:
Data Requirements / 2.2.3:
Implications / 2.2.4:
Potential Benefits / 2.3:
Benefits for Single Enterprises / 2.3.1:
Analysis of Supply Network Effects / 2.3.2:
Benefits for Supply Networks / 2.3.3:
Summary on Potential Benefits / 2.3.4:
Existing Approaches / 2.4:
Tracking Systems / 2.4.1:
SCEM Software / 2.4.2:
Conclusion on Existing Approaches / 2.4.3:
Information Base for Event Management / 3:
Data Model / 3.1:
Representation of the Supply Network Domain / 3.1.1:
Aggregation and Refinement of Status Data / 3.1.2:
Disruptive Event Data for Decision Support / 3.1.3:
Extendable Data Structures / 3.1.4:
Semantic Interoperability / 3.2:
Requirements for Semantic Interoperability / 3.2.1:
Ontology for Supply Network Event Management / 3.2.2:
Data Sources / 3.3:
Data Bases / 3.3.1:
Internet Sources and Web Services / 3.3.2:
Radio Frequency Identification Technologies / 3.3.3:
Event Management Functions / 4:
Information Gathering in Supply Networks / 4.1:
Trigger Events / 4.1.1:
Inter-organizational Information Gathering / 4.1.2:
Proactive and Flexible Monitoring / 4.2:
Critical Profiles / 4.2.1:
Discovery of Critical Profiles / 4.2.2:
Continuous Assessment of Critical Profiles / 4.2.3:
Analysis and Interpretation of Event Data / 4.3:
Basic Approach / 4.3.1:
Data Interpretation with Fuzzy Logic / 4.3.2:
Aggregated Order Status / 4.3.3:
Assessment of Disruptive Events / 4.3.4:
Adjustment of Milestone Plans / 4.3.5:
Distribution of Event Data / 4.4:
Alert Management Process / 4.4.1:
Alert Decision Management / 4.4.2:
Escalation Management / 4.4.3:
Selection of Recipient and Media Type / 4.4.4:
Selection of Content / 4.4.5:
Event Management Process / 4.5:
Distributed Event Management in Supply Networks / 4.5.1:
Agent-based Concept / 5:
Software Agents and Supply Network Event Management / 5.1:
Introduction to Software Agents / 5.1.1:
Benefits of Agent Technology for Event Management / 5.1.2:
Related Work in Agent Technologies / 5.1.3:
Agent Oriented Software Engineering / 5.2:
Approaches / 5.2.1:
AUML for Supply Network Event Management / 5.2.2:
Agent Society for Supply Network Event Management / 5.3:
Roles and Agent Types / 5.3.1:
Agent Interactions / 5.3.2:
Institutional Agreements / 5.3.3:
Coordination Agent / 5.4:
Structure / 5.4.1:
Behaviors / 5.4.2:
Interactions / 5.4.3:
Surveillance Agent / 5.5:
Discourse Agent / 5.5.1:
Wrapper Agent / 5.6.1:
Prototype Implementations / 5.7.1:
Generic Prototype / 6.1:
Overview / 6.1.1:
Ontology Integration / 6.1.2:
Supply Network Testbed / 6.1.3:
Simulated Enterprise Data Base / 6.2.1:
Simulator / 6.2.2:
Industry Showcase / 6.3:
Evaluation / 6.3.1:
Concept / 7.1:
Constraints to an Evaluation / 7.1.1:
Multi-dimensional Evaluation / 7.1.2:
Analytical Evaluation / 7.2:
Effects of SNEM Cycles / 7.2.1:
Costs of Event Management / 7.2.2:
Cost-Benefit-Model and Benchmarks / 7.2.3:
Supply Network Effects / 7.2.4:
Event Management with Profiles / 7.2.5:
Conclusions / 7.2.6:
Experimental Evaluation / 7.3:
Reaction Function / 7.3.1:
Experimental Results / 7.3.2:
Cost-Benefit Analysis / 7.3.3:
Showcase Evaluation / 7.3.4:
Prototype Assessment / 7.4.1:
Analysis of Follow-up Costs / 7.4.2:
Summary - Benefits and Constraints / 7.4.3:
Conclusions and Outlook / 8:
Supply Network Event Management / 8.1:
Further Research Opportunities / 8.2:
Object Chips for Supply Network Event Management / 8.2.1:
Event Management in other Domains / 8.2.2:
Integration and Acceptance Issues / 8.2.3:
Appendices
References
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
48.

図書

図書
A.A. Martynyuk
出版情報: New York : Marcel Dekker, c2002  x, 301 p. ; 24 cm
シリーズ名: Monographs and textbooks in pure and applied mathematics ; 246
所蔵情報: loading…
目次情報: 続きを見る
Preface
Preliminaries / 1:
Introduction / 1.1:
Nonlinear Continuous Systems / 1.2:
General equations of nonlinear dynamics / 1.2.1:
Perturbed motion equations / 1.2.2:
Definitions of Stability / 1.3:
Scalar, Vector and Matrix-Valued Liapunov Functions / 1.4:
Auxiliary scalar functions / 1.4.1:
Comparison functions / 1.4.2:
Vector Liapunov functions / 1.4.3:
Matrix-valued metafunction / 1.4.4:
Comparison Principle / 1.5:
Liapunov-Like Theorems / 1.6:
Matrix-valued function and its properties / 1.6.1:
A version of the original theorems of Liapunov / 1.6.2:
Advantages of Cone-Valued Liapunov Functions / 1.7:
Stability with respect to two measures / 1.7.1:
Stability analysis of large scale systems / 1.7.2:
Liapunov's Theorems for Large Scale Systems in General / 1.8:
Why are matrix-valued Liapunov functions needed? / 1.8.1:
Stability and instability of large scale systems / 1.8.2:
Notes / 1.9:
Qualitative Analysis of Continuous Systems / 2:
Nonlinear Systems with Mixed Hierarchy of Subsystems / 2.1:
Mixed hierarchical structures / 2.2.1:
Hierarchical matrix function structure / 2.2.2:
Structure of hierarchical matrix function derivative / 2.2.3:
Stability and instability conditions / 2.2.4:
Linear autonomous system / 2.2.5:
Examples of third order systems / 2.2.6:
Dynamics of the Systems with Regular Hierarchy Subsystems / 2.3:
Ikeda-Siljak hierarchical decomposition / 2.3.1:
Hierarchical Liapunov's matrix-valued functions / 2.3.2:
Linear nonautonomous systems / 2.3.3:
Stability Analysis of Large Scale Systems / 2.4:
A class of large scale systems / 2.4.1:
Construction of nondiagonal elements of matrix-valued function / 2.4.2:
Test for stability analysis / 2.4.3:
Linear large scale system / 2.4.4:
Discussion and numerical example / 2.4.5:
Overlapping Decomposition and Matrix-Valued Function Construction / 2.5:
Dynamical system extension / 2.5.1:
Liapunov matrix-valued function construction / 2.5.2:
Test for stability of system (2.5.1) / 2.5.3:
Numerical example / 2.5.4:
Exponential Polystability Analysis of Separable Motions / 2.6:
Statement of the Problem / 2.6.1:
A method for the solution of the problem / 2.6.2:
Autonomous system / 2.6.3:
Polystability by the first order approximations / 2.6.4:
Integral and Lipschitz Stability / 2.7:
Definitions / 2.7.1:
Sufficient conditions for integral and asymptotic integral stability / 2.7.2:
Uniform Lipschitz stability / 2.7.3:
Qualitative Analysis of Discrete-Time Systems / 2.8:
Systems Described by Difference Equations / 3.1:
Matrix-Valued Liapunov Functions Method / 3.3:
Auxiliary results / 3.3.1:
Comparison principle application / 3.3.2:
General theorems on stability / 3.3.3:
Large Scale System Decomposition / 3.4:
Stability and Instability of Large Scale Systems / 3.5:
Auxiliary estimates / 3.5.1:
Autonomous Large Scale Systems / 3.5.2:
Hierarchical Analysis of Stability / 3.7:
Hierarchical decomposition and stability conditions / 3.7.1:
Novel tests for connective stability / 3.7.2:
Controlled Systems / 3.8:
Nonlinear Dynamics of Impulsive Systems / 3.9:
Large Scale Impulsive Systems in General / 4.1:
Notations and definitions / 4.2.1:
Sufficient stability conditions / 4.2.2:
Instability conditions / 4.2.4:
Hierarchical Impulsive Systems / 4.3:
Analytical Construction of Liapunov Function / 4.4:
Structure of hierarchical matrix-valued Liapunov function / 4.4.1:
Structure of the total derivative of hierarchical matrix-valued function / 4.4.2:
Uniqueness and Continuability of Solutions / 4.5:
On Boundedness of the Solutions / 4.6:
Novel Methodology for Stability / 4.7:
Stability conditions / 4.7.1:
Applications / 4.8:
Estimations of Asymptotic Stability Domains in General / 5.1:
A fundamental Zubov's result / 5.2.1:
Some estimates for quadratic matrix-valued functions / 5.2.2:
Algorithm of constructing a point network covering boundary of domain E / 5.2.3:
Numerical realization and discussion of the algorithm / 5.2.4:
Illustrative examples / 5.2.5:
Construction of Estimate for the Domain E of Power System / 5.3:
Oscillations and Stability of Some Mechanical Systems / 5.4:
Three-mass systems / 5.4.1:
Nonautonomous oscillator / 5.4.2:
Absolute Stability of Discrete Systems / 5.5:
References / 5.6:
Subject Index
Preface
Preliminaries / 1:
Introduction / 1.1:
49.

電子ブック

EB
Roland Zimmermann, Monique Calisti, Marius Walliser, Thomas Hempfling
出版情報: SpringerLink Books - AutoHoldings , Dordrecht : Birkhäuser Basel, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
Event-related Information Logistics / 2.1.1:
Supply Networks / 2.1.2:
Formal Specification of the Problem / 2.1.3:
Requirements of an Event Management Solution / 2.2:
General Requirements / 2.2.1:
Functional Requirements / 2.2.2:
Data Requirements / 2.2.3:
Implications / 2.2.4:
Potential Benefits / 2.3:
Benefits for Single Enterprises / 2.3.1:
Analysis of Supply Network Effects / 2.3.2:
Benefits for Supply Networks / 2.3.3:
Summary on Potential Benefits / 2.3.4:
Existing Approaches / 2.4:
Tracking Systems / 2.4.1:
SCEM Software / 2.4.2:
Conclusion on Existing Approaches / 2.4.3:
Information Base for Event Management / 3:
Data Model / 3.1:
Representation of the Supply Network Domain / 3.1.1:
Aggregation and Refinement of Status Data / 3.1.2:
Disruptive Event Data for Decision Support / 3.1.3:
Extendable Data Structures / 3.1.4:
Semantic Interoperability / 3.2:
Requirements for Semantic Interoperability / 3.2.1:
Ontology for Supply Network Event Management / 3.2.2:
Data Sources / 3.3:
Data Bases / 3.3.1:
Internet Sources and Web Services / 3.3.2:
Radio Frequency Identification Technologies / 3.3.3:
Event Management Functions / 4:
Information Gathering in Supply Networks / 4.1:
Trigger Events / 4.1.1:
Inter-organizational Information Gathering / 4.1.2:
Proactive and Flexible Monitoring / 4.2:
Critical Profiles / 4.2.1:
Discovery of Critical Profiles / 4.2.2:
Continuous Assessment of Critical Profiles / 4.2.3:
Analysis and Interpretation of Event Data / 4.3:
Basic Approach / 4.3.1:
Data Interpretation with Fuzzy Logic / 4.3.2:
Aggregated Order Status / 4.3.3:
Assessment of Disruptive Events / 4.3.4:
Adjustment of Milestone Plans / 4.3.5:
Distribution of Event Data / 4.4:
Alert Management Process / 4.4.1:
Alert Decision Management / 4.4.2:
Escalation Management / 4.4.3:
Selection of Recipient and Media Type / 4.4.4:
Selection of Content / 4.4.5:
Event Management Process / 4.5:
Distributed Event Management in Supply Networks / 4.5.1:
Agent-based Concept / 5:
Software Agents and Supply Network Event Management / 5.1:
Introduction to Software Agents / 5.1.1:
Benefits of Agent Technology for Event Management / 5.1.2:
Related Work in Agent Technologies / 5.1.3:
Agent Oriented Software Engineering / 5.2:
Approaches / 5.2.1:
AUML for Supply Network Event Management / 5.2.2:
Agent Society for Supply Network Event Management / 5.3:
Roles and Agent Types / 5.3.1:
Agent Interactions / 5.3.2:
Institutional Agreements / 5.3.3:
Coordination Agent / 5.4:
Structure / 5.4.1:
Behaviors / 5.4.2:
Interactions / 5.4.3:
Surveillance Agent / 5.5:
Discourse Agent / 5.5.1:
Wrapper Agent / 5.6.1:
Prototype Implementations / 5.7.1:
Generic Prototype / 6.1:
Overview / 6.1.1:
Ontology Integration / 6.1.2:
Supply Network Testbed / 6.1.3:
Simulated Enterprise Data Base / 6.2.1:
Simulator / 6.2.2:
Industry Showcase / 6.3:
Evaluation / 6.3.1:
Concept / 7.1:
Constraints to an Evaluation / 7.1.1:
Multi-dimensional Evaluation / 7.1.2:
Analytical Evaluation / 7.2:
Effects of SNEM Cycles / 7.2.1:
Costs of Event Management / 7.2.2:
Cost-Benefit-Model and Benchmarks / 7.2.3:
Supply Network Effects / 7.2.4:
Event Management with Profiles / 7.2.5:
Conclusions / 7.2.6:
Experimental Evaluation / 7.3:
Reaction Function / 7.3.1:
Experimental Results / 7.3.2:
Cost-Benefit Analysis / 7.3.3:
Showcase Evaluation / 7.3.4:
Prototype Assessment / 7.4.1:
Analysis of Follow-up Costs / 7.4.2:
Summary - Benefits and Constraints / 7.4.3:
Conclusions and Outlook / 8:
Supply Network Event Management / 8.1:
Further Research Opportunities / 8.2:
Object Chips for Supply Network Event Management / 8.2.1:
Event Management in other Domains / 8.2.2:
Integration and Acceptance Issues / 8.2.3:
Appendices
References
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
50.

電子ブック

EB
Ralf Küsters
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2001
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Description Logics / 2:
History / 2.1:
Syntax and Semantics of Description Logics / 2.2:
Concept Descriptions / 2.2.1:
Terminologies (TBoxes) / 2.2.2:
World Descriptions (ABoxes) / 2.2.3:
Standard Inferences / 2.3:
Decision Algorithms / 2.4:
Non-Standard Inferences / 3:
LCS and MSC / 3.1:
Definition of LCS and MSC / 3.1.1:
Applications of LCS and MSC / 3.1.2:
Previous Results / 3.1.3:
New Results / 3.1.4:
Matching / 3.2:
Definition of Matching Problems / 3.2.1:
Applications of Matching / 3.2.2:
Solutions of Matching Problems / 3.2.3:
The Underlying Techniques / 3.2.4:
Other Non-Standard Inferences / 3.4:
Characterizing Subsumption / 4:
Subsumption in ALNS / 4.1:
A Graph-Based Characterization of Subsumption / 4.1.1:
A Description-Based Characterization of Subsumption / 4.1.2:
Subsumption in ALE / 4.2:
A Tree-Based Characterization of Subsumption / 4.3.1:
LCS for ALNS-Concept Descriptions / 4.3.2:
The LCS in ALNS / 5.1.1:
The LCS in LS / 5.1.2:
LCS for ALE-Concept Descriptions / 5.2:
Matching in ALNS / 6:
Deciding the Solvability of Matching Problems / 6.1.1:
Computing Minimal i-Complete Sets / 6.1.2:
Computing Minimal d-Complete Sets / 6.1.3:
Deciding the Solvability of Matching / 6.2:
Matching in ALE / 6.2.2:
Matching in EL / 6.3.1:
Equivalence of ALE-Concept Descriptions / 6.3.2:
Deciding the Solvability of Matching in FLE / 6.3.3:
Deciding the Solvability of Matching in ALE / 6.3.4:
Computing i-Minimal Matchers in ALE / 6.3.5:
Computing d-Minimal Matchers in ALE / 6.3.6:
Conclusion / 7:
References
Index
Introduction / 1:
Description Logics / 2:
History / 2.1:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼