close
1.

電子ブック

EB
Eric Setton, Bernd Girod
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 2:
Video Compression / 2.1:
H.264 Video Coding / 2.1.1:
Distortion Models / 2.1.2:
Video Streaming / 2.2:
Error Resilience / 2.2.1:
Congestion Control / 2.2.2:
Path Diversity / 2.2.3:
Multicast Architectures / 2.3:
IP Multicast / 2.3.1:
Content Delivery Networks / 2.3.2:
Peer-to-Peer Systems / 2.4:
Peer-to-Peer File Transfer, the Example of BitTorrent / 2.4.1:
Peer-to-Peer Streaming / 2.4.2:
Streaming over Throughput-Limited Paths / 3:
Video Encoding for Throughput-Limited Paths / 3.1:
End-to-End Rate-Distortion Performance Model / 3.1.1:
Experimental Results / 3.1.2:
Congestion-Distortion Optimized Scheduling / 3.2:
Channel Model / 3.2.1:
Evaluating a Schedule / 3.2.2:
Randomized Schedule Search / 3.2.3:
CoDiO Light / 3.2.4:
Chapter Summary / 3.2.5:
Peer-to-Peer Control Protocol / 4:
Protocol Description / 4.1:
Different Peer States / 4.1.1:
Different Tree Connection States / 4.1.2:
Multicast Source / 4.1.3:
Protocol Settings / 4.1.4:
Experimental Protocol Evaluation / 4.2:
Experimental Setup / 4.2.1:
Control Protocol Traffic Distribution / 4.2.2:
Join and Rejoin Latency / 4.2.3:
Scalability / 4.2.4:
Limiting Throughput / 4.2.5:
Video Streaming over a Peer-to-Peer Network / 4.3:
Video Streaming Protocol / 5.1:
Video Packet Transmission / 5.1.1:
Retransmissions / 5.1.2:
Peer-to-Peer CoDiO Scheduling / 5.2:
Sender-Driven Prioritization / 5.2.1:
Distortion-Optimized Retransmission Scheduling / 5.2.2:
Scheduler Evaluation / 5.2.3:
Video Sessions / 5.3:
Diversity / 5.3.2:
CoDiO P2P / 5.3.3:
Conclusions and Future Work / 5.4:
Conclusions / 6.1:
Future Work / 6.2:
Video Experiments / A:
Encoding Structures / A.1:
Latency-Constrained Video Streaming / A.1.2:
Error-Resilient Decoding / A.1.3:
Quality Metric / A.1.4:
Video Sequences / A.2:
Container / A.2.1:
Foreman / A.2.2:
Mobile / A.2.3:
Mother & Daughter / A.2.4:
News / A.2.5:
Salesman / A.2.6:
References
Index
Introduction / 1:
Background / 2:
Video Compression / 2.1:
2.

電子ブック

EB
Eric Setton, Bernd Girod
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 2:
Video Compression / 2.1:
H.264 Video Coding / 2.1.1:
Distortion Models / 2.1.2:
Video Streaming / 2.2:
Error Resilience / 2.2.1:
Congestion Control / 2.2.2:
Path Diversity / 2.2.3:
Multicast Architectures / 2.3:
IP Multicast / 2.3.1:
Content Delivery Networks / 2.3.2:
Peer-to-Peer Systems / 2.4:
Peer-to-Peer File Transfer, the Example of BitTorrent / 2.4.1:
Peer-to-Peer Streaming / 2.4.2:
Streaming over Throughput-Limited Paths / 3:
Video Encoding for Throughput-Limited Paths / 3.1:
End-to-End Rate-Distortion Performance Model / 3.1.1:
Experimental Results / 3.1.2:
Congestion-Distortion Optimized Scheduling / 3.2:
Channel Model / 3.2.1:
Evaluating a Schedule / 3.2.2:
Randomized Schedule Search / 3.2.3:
CoDiO Light / 3.2.4:
Chapter Summary / 3.2.5:
Peer-to-Peer Control Protocol / 4:
Protocol Description / 4.1:
Different Peer States / 4.1.1:
Different Tree Connection States / 4.1.2:
Multicast Source / 4.1.3:
Protocol Settings / 4.1.4:
Experimental Protocol Evaluation / 4.2:
Experimental Setup / 4.2.1:
Control Protocol Traffic Distribution / 4.2.2:
Join and Rejoin Latency / 4.2.3:
Scalability / 4.2.4:
Limiting Throughput / 4.2.5:
Video Streaming over a Peer-to-Peer Network / 4.3:
Video Streaming Protocol / 5.1:
Video Packet Transmission / 5.1.1:
Retransmissions / 5.1.2:
Peer-to-Peer CoDiO Scheduling / 5.2:
Sender-Driven Prioritization / 5.2.1:
Distortion-Optimized Retransmission Scheduling / 5.2.2:
Scheduler Evaluation / 5.2.3:
Video Sessions / 5.3:
Diversity / 5.3.2:
CoDiO P2P / 5.3.3:
Conclusions and Future Work / 5.4:
Conclusions / 6.1:
Future Work / 6.2:
Video Experiments / A:
Encoding Structures / A.1:
Latency-Constrained Video Streaming / A.1.2:
Error-Resilient Decoding / A.1.3:
Quality Metric / A.1.4:
Video Sequences / A.2:
Container / A.2.1:
Foreman / A.2.2:
Mobile / A.2.3:
Mother & Daughter / A.2.4:
News / A.2.5:
Salesman / A.2.6:
References
Index
Introduction / 1:
Background / 2:
Video Compression / 2.1:
3.

電子ブック

EB
Marcus S. Fisher
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Chapter 1:
Managing Verification and Validation / Chapter 2:
The Axioms of Leadership / Section 2.1:
Planning / Section 2.2:
Establishing the V&V Requirements / Section 2.2.1:
Establishing the V&V Plan / Section 2.2.2:
Managing the Plan / Section 2.3:
Effectiveness Measures / Section 2.3.2:
Control Gates / Section 2.3.3:
Risk Management / Section 2.4:
Identify / Section 2.4.1:
Analyze / Section 2.4.2:
Plan / Section 2.4.3:
Track / Section 2.4.4:
Control / Section 2.4.5:
Risk Management Plan / Section 2.4.6:
Communication Structures / Section 2.5:
References
The Verification and Validation Life Cycle / Chapter 3:
Traceability Analysis / Section 3.1:
Interface Analysis / Section 3.2:
Phase Dependent Analysis / Section 3.3:
Requirements Analysis / Section 3.3.1:
Design Analysis / Section 3.3.2:
Code Analysis / Section 3.3.3:
Test Analysis / Section 3.3.4:
V&V Testing / Section 3.4:
Systems V&V / Chapter 4:
Appendix A
Index
Introduction / Chapter 1:
Managing Verification and Validation / Chapter 2:
The Axioms of Leadership / Section 2.1:
4.

電子ブック

EB
Slav Petrov, Eugene Charniak
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Coarse-to-Fine Models / 1.1:
Coarse-to-Fine Inference / 1.2:
Latent Variable Grammars for Natural Language Parsing / 2:
Experimental Setup / 2.1:
Manual Grammar Refinement / 2.2:
Vertical and Horizontal Markovization / 2.2.1:
Additional Linguistic Refinements / 2.2.2:
Generative Latent Variable Grammars / 2.3:
Hierarchical Estimation / 2.3.1:
Adaptive Refinement / 2.3.2:
Smoothing / 2.3.3:
An Infinite Alternative / 2.3.4:
Inference / 2.4:
Hierarchical Coarse-to-Fine Pruning / 2.4.1:
Objective Functions for Parsing / 2.4.2:
Additional Experiments / 2.5:
Baseline Grammar Variation / 2.5.1:
Final Results WSJ / 2.5.3:
Multilingual Parsing / 2.5.4:
Corpus Variation / 2.5.5:
Training Size Variation / 2.5.6:
Analysis / 2.6:
Lexical Subcategories / 2.6.1:
Phrasal Subcategories / 2.6.2:
Multilingual Analysis / 2.6.3:
Summary and Future Work / 2.7:
Discriminative Latent Variable Grammars / 3:
Log-Linear Latent Variable Grammars / 3.1:
Single-Scale Discriminative Grammars / 3.3:
Efficient Discriminative Estimation / 3.3.1:
Experiments / 3.3.2:
Multi-scale Discriminative Grammars / 3.4:
Hierarchical Refinement / 3.4.1:
Learning Sparse Multi-scale Grammars / 3.4.2:
Additional Features / 3.4.3:
Structured Acoustic Models for Speech Recognition / 3.4.4:
Learning / 4.1:
The Hand-Aligned Case / 4.2.1:
Splitting / 4.2.2:
Merging / 4.2.3:
The Automatically-Aligned Case / 4.2.4:
Phone Recognition / 4.3:
Phone Classification / 4.4.2:
Coarse-to-Fine Machine Translation Decoding / 4.5:
Coarse-to-Fine Decoding / 5.1:
Related Work / 5.2.1:
Language Model Projections / 5.2.2:
Multipass Decoding / 5.2.3:
Inversion Transduction Grammars / 5.3:
Learning Coarse Languages / 5.4:
Random Projections / 5.4.1:
Frequency Clustering / 5.4.2:
HMM Clustering / 5.4.3:
JCluster / 5.4.4:
Clustering Results / 5.4.5:
Clustering / 5.5:
Spacing / 5.5.2:
Encoding Versus Order / 5.5.3:
Final Results / 5.5.4:
Search Error Analysis / 5.5.5:
Conclusions and Future Work / 5.6:
References
Introduction / 1:
Coarse-to-Fine Models / 1.1:
Coarse-to-Fine Inference / 1.2:
5.

電子ブック

EB
Roland Zimmermann, Monique Calisti, Marius Walliser
出版情報: Springer eBooks Computer Science , Dordrecht : Birkh?user Basel, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
Event-related Information Logistics / 2.1.1:
Supply Networks / 2.1.2:
Formal Specification of the Problem / 2.1.3:
Requirements of an Event Management Solution / 2.2:
General Requirements / 2.2.1:
Functional Requirements / 2.2.2:
Data Requirements / 2.2.3:
Implications / 2.2.4:
Potential Benefits / 2.3:
Benefits for Single Enterprises / 2.3.1:
Analysis of Supply Network Effects / 2.3.2:
Benefits for Supply Networks / 2.3.3:
Summary on Potential Benefits / 2.3.4:
Existing Approaches / 2.4:
Tracking Systems / 2.4.1:
SCEM Software / 2.4.2:
Conclusion on Existing Approaches / 2.4.3:
Information Base for Event Management / 3:
Data Model / 3.1:
Representation of the Supply Network Domain / 3.1.1:
Aggregation and Refinement of Status Data / 3.1.2:
Disruptive Event Data for Decision Support / 3.1.3:
Extendable Data Structures / 3.1.4:
Semantic Interoperability / 3.2:
Requirements for Semantic Interoperability / 3.2.1:
Ontology for Supply Network Event Management / 3.2.2:
Data Sources / 3.3:
Data Bases / 3.3.1:
Internet Sources and Web Services / 3.3.2:
Radio Frequency Identification Technologies / 3.3.3:
Event Management Functions / 4:
Information Gathering in Supply Networks / 4.1:
Trigger Events / 4.1.1:
Inter-organizational Information Gathering / 4.1.2:
Proactive and Flexible Monitoring / 4.2:
Critical Profiles / 4.2.1:
Discovery of Critical Profiles / 4.2.2:
Continuous Assessment of Critical Profiles / 4.2.3:
Analysis and Interpretation of Event Data / 4.3:
Basic Approach / 4.3.1:
Data Interpretation with Fuzzy Logic / 4.3.2:
Aggregated Order Status / 4.3.3:
Assessment of Disruptive Events / 4.3.4:
Adjustment of Milestone Plans / 4.3.5:
Distribution of Event Data / 4.4:
Alert Management Process / 4.4.1:
Alert Decision Management / 4.4.2:
Escalation Management / 4.4.3:
Selection of Recipient and Media Type / 4.4.4:
Selection of Content / 4.4.5:
Event Management Process / 4.5:
Distributed Event Management in Supply Networks / 4.5.1:
Agent-based Concept / 5:
Software Agents and Supply Network Event Management / 5.1:
Introduction to Software Agents / 5.1.1:
Benefits of Agent Technology for Event Management / 5.1.2:
Related Work in Agent Technologies / 5.1.3:
Agent Oriented Software Engineering / 5.2:
Approaches / 5.2.1:
AUML for Supply Network Event Management / 5.2.2:
Agent Society for Supply Network Event Management / 5.3:
Roles and Agent Types / 5.3.1:
Agent Interactions / 5.3.2:
Institutional Agreements / 5.3.3:
Coordination Agent / 5.4:
Structure / 5.4.1:
Behaviors / 5.4.2:
Interactions / 5.4.3:
Surveillance Agent / 5.5:
Discourse Agent / 5.5.1:
Wrapper Agent / 5.6.1:
Prototype Implementations / 5.7.1:
Generic Prototype / 6.1:
Overview / 6.1.1:
Ontology Integration / 6.1.2:
Supply Network Testbed / 6.1.3:
Simulated Enterprise Data Base / 6.2.1:
Simulator / 6.2.2:
Industry Showcase / 6.3:
Evaluation / 6.3.1:
Concept / 7.1:
Constraints to an Evaluation / 7.1.1:
Multi-dimensional Evaluation / 7.1.2:
Analytical Evaluation / 7.2:
Effects of SNEM Cycles / 7.2.1:
Costs of Event Management / 7.2.2:
Cost-Benefit-Model and Benchmarks / 7.2.3:
Supply Network Effects / 7.2.4:
Event Management with Profiles / 7.2.5:
Conclusions / 7.2.6:
Experimental Evaluation / 7.3:
Reaction Function / 7.3.1:
Experimental Results / 7.3.2:
Cost-Benefit Analysis / 7.3.3:
Showcase Evaluation / 7.3.4:
Prototype Assessment / 7.4.1:
Analysis of Follow-up Costs / 7.4.2:
Summary - Benefits and Constraints / 7.4.3:
Conclusions and Outlook / 8:
Supply Network Event Management / 8.1:
Further Research Opportunities / 8.2:
Object Chips for Supply Network Event Management / 8.2.1:
Event Management in other Domains / 8.2.2:
Integration and Acceptance Issues / 8.2.3:
Appendices
References
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
6.

電子ブック

EB
Roland Zimmermann, Monique Calisti, Marius Walliser, Thomas Hempfling
出版情報: SpringerLink Books - AutoHoldings , Dordrecht : Birkhäuser Basel, 2006
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
Event-related Information Logistics / 2.1.1:
Supply Networks / 2.1.2:
Formal Specification of the Problem / 2.1.3:
Requirements of an Event Management Solution / 2.2:
General Requirements / 2.2.1:
Functional Requirements / 2.2.2:
Data Requirements / 2.2.3:
Implications / 2.2.4:
Potential Benefits / 2.3:
Benefits for Single Enterprises / 2.3.1:
Analysis of Supply Network Effects / 2.3.2:
Benefits for Supply Networks / 2.3.3:
Summary on Potential Benefits / 2.3.4:
Existing Approaches / 2.4:
Tracking Systems / 2.4.1:
SCEM Software / 2.4.2:
Conclusion on Existing Approaches / 2.4.3:
Information Base for Event Management / 3:
Data Model / 3.1:
Representation of the Supply Network Domain / 3.1.1:
Aggregation and Refinement of Status Data / 3.1.2:
Disruptive Event Data for Decision Support / 3.1.3:
Extendable Data Structures / 3.1.4:
Semantic Interoperability / 3.2:
Requirements for Semantic Interoperability / 3.2.1:
Ontology for Supply Network Event Management / 3.2.2:
Data Sources / 3.3:
Data Bases / 3.3.1:
Internet Sources and Web Services / 3.3.2:
Radio Frequency Identification Technologies / 3.3.3:
Event Management Functions / 4:
Information Gathering in Supply Networks / 4.1:
Trigger Events / 4.1.1:
Inter-organizational Information Gathering / 4.1.2:
Proactive and Flexible Monitoring / 4.2:
Critical Profiles / 4.2.1:
Discovery of Critical Profiles / 4.2.2:
Continuous Assessment of Critical Profiles / 4.2.3:
Analysis and Interpretation of Event Data / 4.3:
Basic Approach / 4.3.1:
Data Interpretation with Fuzzy Logic / 4.3.2:
Aggregated Order Status / 4.3.3:
Assessment of Disruptive Events / 4.3.4:
Adjustment of Milestone Plans / 4.3.5:
Distribution of Event Data / 4.4:
Alert Management Process / 4.4.1:
Alert Decision Management / 4.4.2:
Escalation Management / 4.4.3:
Selection of Recipient and Media Type / 4.4.4:
Selection of Content / 4.4.5:
Event Management Process / 4.5:
Distributed Event Management in Supply Networks / 4.5.1:
Agent-based Concept / 5:
Software Agents and Supply Network Event Management / 5.1:
Introduction to Software Agents / 5.1.1:
Benefits of Agent Technology for Event Management / 5.1.2:
Related Work in Agent Technologies / 5.1.3:
Agent Oriented Software Engineering / 5.2:
Approaches / 5.2.1:
AUML for Supply Network Event Management / 5.2.2:
Agent Society for Supply Network Event Management / 5.3:
Roles and Agent Types / 5.3.1:
Agent Interactions / 5.3.2:
Institutional Agreements / 5.3.3:
Coordination Agent / 5.4:
Structure / 5.4.1:
Behaviors / 5.4.2:
Interactions / 5.4.3:
Surveillance Agent / 5.5:
Discourse Agent / 5.5.1:
Wrapper Agent / 5.6.1:
Prototype Implementations / 5.7.1:
Generic Prototype / 6.1:
Overview / 6.1.1:
Ontology Integration / 6.1.2:
Supply Network Testbed / 6.1.3:
Simulated Enterprise Data Base / 6.2.1:
Simulator / 6.2.2:
Industry Showcase / 6.3:
Evaluation / 6.3.1:
Concept / 7.1:
Constraints to an Evaluation / 7.1.1:
Multi-dimensional Evaluation / 7.1.2:
Analytical Evaluation / 7.2:
Effects of SNEM Cycles / 7.2.1:
Costs of Event Management / 7.2.2:
Cost-Benefit-Model and Benchmarks / 7.2.3:
Supply Network Effects / 7.2.4:
Event Management with Profiles / 7.2.5:
Conclusions / 7.2.6:
Experimental Evaluation / 7.3:
Reaction Function / 7.3.1:
Experimental Results / 7.3.2:
Cost-Benefit Analysis / 7.3.3:
Showcase Evaluation / 7.3.4:
Prototype Assessment / 7.4.1:
Analysis of Follow-up Costs / 7.4.2:
Summary - Benefits and Constraints / 7.4.3:
Conclusions and Outlook / 8:
Supply Network Event Management / 8.1:
Further Research Opportunities / 8.2:
Object Chips for Supply Network Event Management / 8.2.1:
Event Management in other Domains / 8.2.2:
Integration and Acceptance Issues / 8.2.3:
Appendices
References
Introduction / 1:
Event Management in Supply Networks / 2:
Problem / 2.1:
7.

電子ブック

EB
Zhaohui Wu, Hua-jun Chen, Huajun Chen, Zhao-hui Wu
出版情報: Springer eBooks Computer Science , Springer, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 1.1:
Grid Computing / 1.1.1:
Semantic Web / 1.1.2:
Semantic Grid / 1.2:
Basic Concepts / 1.2.1:
Brief History / 1.2.2:
Basic Issues / 1.3:
Knowledge Representation for the Semantic Grid / 1.3.1:
Semantic Data Integration / 1.3.2:
Semantic Service Composition and Process Coordination / 1.3.3:
Semantic Mining and Knowledge Discovery in the Semantic Grid / 1.3.4:
Trust and Security / 1.3.5:
Case Studies / 1.4:
myGrid / 1.4.1:
CombeChem / 1.4.2:
CoAKTinG / 1.4.3:
K-WF Grid / 1.4.4:
Semantic Grid Research and Development in China / 1.4.5:
Summary and Conclusion / 1.5:
References
Knowledge Representation / 2:
Mathematical Logic / 2.2.1:
Semantic Network / 2.2.2:
Frames / 2.2.3:
Ontology / 2.2.4:
Description Logic / 2.3:
Knowledge Representation Framework for the Semantic Grid / 2.4:
XML and XML Schema / 2.4.1:
RDF and RDF Schema / 2.4.2:
Web Ontology Language / 2.4.3:
Ontology Development and Application for TCM / 2.5:
Ontology Design and Development for UTCMLS / 2.5.1:
TCM Ontology / 2.5.2:
Dynamic Problem Solving in the Semantic Grid / 2.6:
Problem Solving / 3.1:
Cooperative Distributed Problem Solving / 3.1.2:
Multi-Agent System / 3.1.3:
Grid-based Problem Solving / 3.2:
Grid and Problem Solving / 3.2.1:
Problem Solving in the Semantic Grid / 3.2.2:
Ontology Management for Grid-based Problem Solving / 3.3:
Grid-based Ontology Management / 3.3.1:
Ontology Grid Node / 3.3.2:
Semantic View / 3.3.3:
Ontology Reuse for Grid-based Problem Solving / 3.4:
Dynamic Memory Model / 3.4.1:
Case-based Ontology Repository / 3.4.2:
Dynamic Problem Solving Based on SubO Evolution / 3.5:
Sub-Ontology Manipulations / 3.5.1:
Terminology / 3.5.2:
Problem-Solving Environment / 3.5.3:
Sub-Ontology Based Problem Solving / 3.5.4:
The Relationship between Problem Solving and the Semantic Grid / 3.6:
Related Works / 3.7:
Trust Computing in the Semantic Grid / 3.8:
Trust for the Semantic Grid / 4.1:
Characteristic Features of Trust / 4.2.1:
Cost and Utility / 4.2.2:
Distributed vs. Centralized / 4.2.3:
Semantics of Information / 4.2.4:
Closed Trust Model / 4.3:
Open Trust Model / 4.4:
Experiments / 4.5:
Related Work / 4.6:
Data Integration in the Semantic Grid / 4.7:
Preliminaries / 5.1:
Semantic Mapping in the Semantic Grid / 5.2:
The Mapping Issue / 5.2.1:
Basic Mapping System / 5.2.2:
Constraint Mapping / 5.2.3:
Semantic Query Processing in the Semantic Grid / 5.3:
Answering Queries Using SHIQ-RDM Views / 5.3.1:
Rewriting SPARQL Queries Using SHIQ-RDM Views / 5.3.2:
Service Flow Management in the Semantic Grid / 5.4:
Research Framework of Service Flow Management / 6.1:
Service Matchmaking and Discovery / 6.2.1:
Service Composition / 6.2.2:
Service Composition Verification / 6.2.3:
Service Matchmaking in DartFlow / 6.3:
An Extended Service Model / 6.3.1:
Service Matchmaking / 6.3.2:
Performance Evaluation / 6.3.3:
Service Composition in DartFlow / 6.4:
Service Composition Framework / 6.4.1:
Rules Types and Definitions / 6.4.2:
Automatic Service Composition Based on Rules / 6.4.3:
Service Flow Verification in DartFlow / 6.5:
Overview of [pi]-Calculus / 6.5.1:
Modeling Service Behavior Using [pi]-Calculus / 6.5.2:
Verification of Service Compatibility / 6.5.3:
Data Mining and Knowledge Discovery in the Semantic Grid / 6.6:
Development of KDD System Architecture / 7.1:
Single-computer-based Architecture / 7.2.1:
Parallelized Architecture / 7.2.2:
Distributed Architecture / 7.2.3:
Grid-based Architecture / 7.2.4:
A Summary of the Development of KDD System Architecture / 7.2.5:
Knowledge Discovery Based on the Semantic Grid / 7.3:
Virtual Organizations of Knowledge Discovery in the Semantic Grid / 7.3.1:
Architecture and Components of Knowledge Discovery in the Semantic Grid / 7.3.2:
Characteristics of Knowledge Discovery in the Semantic Grid / 7.3.3:
Drug Community Discovery Utilizing TCM Semantic Grid / 7.4:
Semantic Graph Mining Methodology / 7.4.1:
Use Case: TCM Formulae Interpretation and Herb-Drug Interaction Analysis / 7.4.2:
DartGrid: A Semantic Grid Implementation / 7.5:
DartDB-A Semantic Data Integration Toolkit / 8.1:
Overview / 8.2.1:
System Features / 8.2.2:
System Architecture / 8.2.3:
Mapping from Relational Data to Semantic Web Ontology / 8.2.4:
Semantic Browser and Query Tool / 8.2.5:
Semantic Search Engine / 8.2.6:
DartFlow-A Service Flow Management Prototype / 8.3:
Main Functions / 8.3.1:
Semantic Grid Applications for Traditional Chinese Medicine / 8.4:
Background, Status, and Problems of TCM Informatics / 9.1:
Background of TCM Informatics / 9.1.1:
Status of TCM Informatics / 9.1.2:
Problems of TCM Informatics / 9.1.3:
The Architecture of TCM e-Science Semantic Grid / 9.2:
Three Layers of TCM e-Science Environment / 9.2.1:
Application Platforms in TCM e-Science Environment / 9.2.3:
Collaborative TCM Ontology Engineering / 9.3:
Creating a Semantic Grid of TCM Databases / 9.4:
A Semantic Grid Environment for Database Construction / 9.5:
TCM Knowledge Discovery Platform / 9.6:
Summary / 9.7:
Semantic Grid Applications in Intelligent Transportation Systems / 10:
ITS System and Grid Computing / 10.1:
ITS System and Ontology / 10.1.2:
Layered Architecture for ITS-Grid / 10.2:
ITS Semantic Grid / 10.3:
The Development of an ITS Ontology / 10.3.1:
ITS-Grid Applications / 10.3.2:
Case Study / 10.4:
Index / 10.5:
Introduction / 1:
Background / 1.1:
Grid Computing / 1.1.1:
8.

電子ブック

EB
Zhaohui Wu, Hua-jun Chen, Huajun Chen, Zhao-hui Wu
出版情報: SpringerLink Books - AutoHoldings , Springer, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 1.1:
Grid Computing / 1.1.1:
Semantic Web / 1.1.2:
Semantic Grid / 1.2:
Basic Concepts / 1.2.1:
Brief History / 1.2.2:
Basic Issues / 1.3:
Knowledge Representation for the Semantic Grid / 1.3.1:
Semantic Data Integration / 1.3.2:
Semantic Service Composition and Process Coordination / 1.3.3:
Semantic Mining and Knowledge Discovery in the Semantic Grid / 1.3.4:
Trust and Security / 1.3.5:
Case Studies / 1.4:
myGrid / 1.4.1:
CombeChem / 1.4.2:
CoAKTinG / 1.4.3:
K-WF Grid / 1.4.4:
Semantic Grid Research and Development in China / 1.4.5:
Summary and Conclusion / 1.5:
References
Knowledge Representation / 2:
Mathematical Logic / 2.2.1:
Semantic Network / 2.2.2:
Frames / 2.2.3:
Ontology / 2.2.4:
Description Logic / 2.3:
Knowledge Representation Framework for the Semantic Grid / 2.4:
XML and XML Schema / 2.4.1:
RDF and RDF Schema / 2.4.2:
Web Ontology Language / 2.4.3:
Ontology Development and Application for TCM / 2.5:
Ontology Design and Development for UTCMLS / 2.5.1:
TCM Ontology / 2.5.2:
Dynamic Problem Solving in the Semantic Grid / 2.6:
Problem Solving / 3.1:
Cooperative Distributed Problem Solving / 3.1.2:
Multi-Agent System / 3.1.3:
Grid-based Problem Solving / 3.2:
Grid and Problem Solving / 3.2.1:
Problem Solving in the Semantic Grid / 3.2.2:
Ontology Management for Grid-based Problem Solving / 3.3:
Grid-based Ontology Management / 3.3.1:
Ontology Grid Node / 3.3.2:
Semantic View / 3.3.3:
Ontology Reuse for Grid-based Problem Solving / 3.4:
Dynamic Memory Model / 3.4.1:
Case-based Ontology Repository / 3.4.2:
Dynamic Problem Solving Based on SubO Evolution / 3.5:
Sub-Ontology Manipulations / 3.5.1:
Terminology / 3.5.2:
Problem-Solving Environment / 3.5.3:
Sub-Ontology Based Problem Solving / 3.5.4:
The Relationship between Problem Solving and the Semantic Grid / 3.6:
Related Works / 3.7:
Trust Computing in the Semantic Grid / 3.8:
Trust for the Semantic Grid / 4.1:
Characteristic Features of Trust / 4.2.1:
Cost and Utility / 4.2.2:
Distributed vs. Centralized / 4.2.3:
Semantics of Information / 4.2.4:
Closed Trust Model / 4.3:
Open Trust Model / 4.4:
Experiments / 4.5:
Related Work / 4.6:
Data Integration in the Semantic Grid / 4.7:
Preliminaries / 5.1:
Semantic Mapping in the Semantic Grid / 5.2:
The Mapping Issue / 5.2.1:
Basic Mapping System / 5.2.2:
Constraint Mapping / 5.2.3:
Semantic Query Processing in the Semantic Grid / 5.3:
Answering Queries Using SHIQ-RDM Views / 5.3.1:
Rewriting SPARQL Queries Using SHIQ-RDM Views / 5.3.2:
Service Flow Management in the Semantic Grid / 5.4:
Research Framework of Service Flow Management / 6.1:
Service Matchmaking and Discovery / 6.2.1:
Service Composition / 6.2.2:
Service Composition Verification / 6.2.3:
Service Matchmaking in DartFlow / 6.3:
An Extended Service Model / 6.3.1:
Service Matchmaking / 6.3.2:
Performance Evaluation / 6.3.3:
Service Composition in DartFlow / 6.4:
Service Composition Framework / 6.4.1:
Rules Types and Definitions / 6.4.2:
Automatic Service Composition Based on Rules / 6.4.3:
Service Flow Verification in DartFlow / 6.5:
Overview of [pi]-Calculus / 6.5.1:
Modeling Service Behavior Using [pi]-Calculus / 6.5.2:
Verification of Service Compatibility / 6.5.3:
Data Mining and Knowledge Discovery in the Semantic Grid / 6.6:
Development of KDD System Architecture / 7.1:
Single-computer-based Architecture / 7.2.1:
Parallelized Architecture / 7.2.2:
Distributed Architecture / 7.2.3:
Grid-based Architecture / 7.2.4:
A Summary of the Development of KDD System Architecture / 7.2.5:
Knowledge Discovery Based on the Semantic Grid / 7.3:
Virtual Organizations of Knowledge Discovery in the Semantic Grid / 7.3.1:
Architecture and Components of Knowledge Discovery in the Semantic Grid / 7.3.2:
Characteristics of Knowledge Discovery in the Semantic Grid / 7.3.3:
Drug Community Discovery Utilizing TCM Semantic Grid / 7.4:
Semantic Graph Mining Methodology / 7.4.1:
Use Case: TCM Formulae Interpretation and Herb-Drug Interaction Analysis / 7.4.2:
DartGrid: A Semantic Grid Implementation / 7.5:
DartDB-A Semantic Data Integration Toolkit / 8.1:
Overview / 8.2.1:
System Features / 8.2.2:
System Architecture / 8.2.3:
Mapping from Relational Data to Semantic Web Ontology / 8.2.4:
Semantic Browser and Query Tool / 8.2.5:
Semantic Search Engine / 8.2.6:
DartFlow-A Service Flow Management Prototype / 8.3:
Main Functions / 8.3.1:
Semantic Grid Applications for Traditional Chinese Medicine / 8.4:
Background, Status, and Problems of TCM Informatics / 9.1:
Background of TCM Informatics / 9.1.1:
Status of TCM Informatics / 9.1.2:
Problems of TCM Informatics / 9.1.3:
The Architecture of TCM e-Science Semantic Grid / 9.2:
Three Layers of TCM e-Science Environment / 9.2.1:
Application Platforms in TCM e-Science Environment / 9.2.3:
Collaborative TCM Ontology Engineering / 9.3:
Creating a Semantic Grid of TCM Databases / 9.4:
A Semantic Grid Environment for Database Construction / 9.5:
TCM Knowledge Discovery Platform / 9.6:
Summary / 9.7:
Semantic Grid Applications in Intelligent Transportation Systems / 10:
ITS System and Grid Computing / 10.1:
ITS System and Ontology / 10.1.2:
Layered Architecture for ITS-Grid / 10.2:
ITS Semantic Grid / 10.3:
The Development of an ITS Ontology / 10.3.1:
ITS-Grid Applications / 10.3.2:
Case Study / 10.4:
Index / 10.5:
Introduction / 1:
Background / 1.1:
Grid Computing / 1.1.1:
9.

電子ブック

EB
Qingfeng Chen, Takeo Kanade, Chengqi Zhang, Shichao Zhang
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
What Is Security Protocol? / 1.1:
Needs of Formal Analysis for Secure Transaction Protocols / 1.2:
Formal Methods and Related Areas / 1.3:
Emerging Issues and Trends / 1.4:
A Brief Discussion on the Chapters / 1.5:
Summary / 1.6:
Overview of Security Protocol Analysis / 2:
The Formalism / 2.1:
Basic Notations and Terminology / 2.1.1:
Inference Rules / 2.1.2:
Security Protocols / 2.2:
SET Protocol / 2.2.1:
Netbill Protocol / 2.2.2:
Security Services / 2.2.3:
Principles of Cryptography / 2.2.4:
Threats in Security Protocols / 2.2.5:
Research into Analysis of Security Protocols / 2.3:
A Discussion of Formal Methods and Security Protocols / 2.3.1:
A Brief Introduction to Protocol Abstraction / 2.3.2:
A Classification of Approaches for Protocol Analysis / 2.3.3:
Attack-Construction Approach / 2.4:
Approaches by Dolev and Yao / 2.4.1:
NRL Protocol Analyser / 2.4.2:
Inference-Construction Approach / 2.5:
BAN Logic / 2.5.1:
Extensions to BAN Logic / 2.5.2:
Proof-Construction Approach / 2.6:
Approaches Using Formal Tools and Specification Languages / 2.7:
Formal Analysis of Secure Transaction Protocols / 2.8:
Research into Verifying Electronic Transaction Protocols / 3.1:
Formalism for Protocol Analysis Using Process Calculi / 3.2.1:
Formal Analysis Using an Observational Transition System / 3.2.2:
Formal Analysis of Card-Based Payment Systems in Mobile Devices / 3.2.3:
A Computational Model / 3.3:
Basic Terms and Statements / 3.4:
Logical Framework and Statement of ENDL / 3.5:
Axiom / 3.5.1:
Inference Format / 3.5.2:
Verification Instances of Security Protocols in ENDL / 3.5.4:
Model Checking in Security Protocol Analysis / 3.6:
An Overview of Model Checking in Analysing E-Commerce Protocols / 4.1:
Model Checking for Failure Analysis of Protocols / 4.1.1:
Automatic Analysis of E-commerce Protocols Using UML / 4.1.2:
An ENDL-Based Verification Model / 4.2:
Components / 4.2.1:
Designing the Model / 4.2.2:
Handling the Knowledge and Facts / 4.2.3:
Recognition / 4.2.4:
Comparison with Theorem Proving / 4.3:
Discussion / 4.4:
Uncertainty Issues in Secure Messages / 4.5:
Estimation of Inconsistency of Secure Messages / 5.1:
Related Work / 5.2.1:
Semantics Description / 5.2.2:
Measuring Inconsistency in Secure Messages / 5.2.3:
Examples of Measuring Inconsistency / 5.2.4:
Experiments / 5.2.5:
Integration of Conflicting Beliefs in Secure Messages / 5.3:
Basic Concepts / 5.3.1:
Handling Inconsistent Beliefs in Secure Messages / 5.3.3:
Applications of Data Mining in Protocol Analysis / 5.3.4:
Association Rule Mining for Inconsistent Secure Messages / 6.1:
The Basics of Association Rule Mining / 6.4.1:
Data Preparation / 6.4.2:
Identifying Association Rules of Interest / 6.4.3:
Algorithms and Experiments / 6.5:
Algorithms / 6.5.1:
Detection Models of Collusion Attacks / 6.5.2:
Identification of Frequent Patterns for Collusion Attack Detection / 7.1:
A Framework to Detect Collusion Attacks / 7.3.1:
Dealing with Knowledge and Facts / 7.3.3:
A Case Study / 7.3.4:
Estimation of the Probability of Collusion Attacks / 7.4:
Motivations / 7.4.1:
Preliminaries / 7.4.2:
Identifying Collusion Attack Using Bayesian Network / 7.4.3:
Conclusion and Future Works / 7.4.4:
Conclusion / 8.1:
Future Work / 8.2:
References
Index
Introduction / 1:
What Is Security Protocol? / 1.1:
Needs of Formal Analysis for Secure Transaction Protocols / 1.2:
10.

電子ブック

EB
Qingfeng Chen, Takeo Kanade, Chengqi Zhang, Shichao Zhang
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
What Is Security Protocol? / 1.1:
Needs of Formal Analysis for Secure Transaction Protocols / 1.2:
Formal Methods and Related Areas / 1.3:
Emerging Issues and Trends / 1.4:
A Brief Discussion on the Chapters / 1.5:
Summary / 1.6:
Overview of Security Protocol Analysis / 2:
The Formalism / 2.1:
Basic Notations and Terminology / 2.1.1:
Inference Rules / 2.1.2:
Security Protocols / 2.2:
SET Protocol / 2.2.1:
Netbill Protocol / 2.2.2:
Security Services / 2.2.3:
Principles of Cryptography / 2.2.4:
Threats in Security Protocols / 2.2.5:
Research into Analysis of Security Protocols / 2.3:
A Discussion of Formal Methods and Security Protocols / 2.3.1:
A Brief Introduction to Protocol Abstraction / 2.3.2:
A Classification of Approaches for Protocol Analysis / 2.3.3:
Attack-Construction Approach / 2.4:
Approaches by Dolev and Yao / 2.4.1:
NRL Protocol Analyser / 2.4.2:
Inference-Construction Approach / 2.5:
BAN Logic / 2.5.1:
Extensions to BAN Logic / 2.5.2:
Proof-Construction Approach / 2.6:
Approaches Using Formal Tools and Specification Languages / 2.7:
Formal Analysis of Secure Transaction Protocols / 2.8:
Research into Verifying Electronic Transaction Protocols / 3.1:
Formalism for Protocol Analysis Using Process Calculi / 3.2.1:
Formal Analysis Using an Observational Transition System / 3.2.2:
Formal Analysis of Card-Based Payment Systems in Mobile Devices / 3.2.3:
A Computational Model / 3.3:
Basic Terms and Statements / 3.4:
Logical Framework and Statement of ENDL / 3.5:
Axiom / 3.5.1:
Inference Format / 3.5.2:
Verification Instances of Security Protocols in ENDL / 3.5.4:
Model Checking in Security Protocol Analysis / 3.6:
An Overview of Model Checking in Analysing E-Commerce Protocols / 4.1:
Model Checking for Failure Analysis of Protocols / 4.1.1:
Automatic Analysis of E-commerce Protocols Using UML / 4.1.2:
An ENDL-Based Verification Model / 4.2:
Components / 4.2.1:
Designing the Model / 4.2.2:
Handling the Knowledge and Facts / 4.2.3:
Recognition / 4.2.4:
Comparison with Theorem Proving / 4.3:
Discussion / 4.4:
Uncertainty Issues in Secure Messages / 4.5:
Estimation of Inconsistency of Secure Messages / 5.1:
Related Work / 5.2.1:
Semantics Description / 5.2.2:
Measuring Inconsistency in Secure Messages / 5.2.3:
Examples of Measuring Inconsistency / 5.2.4:
Experiments / 5.2.5:
Integration of Conflicting Beliefs in Secure Messages / 5.3:
Basic Concepts / 5.3.1:
Handling Inconsistent Beliefs in Secure Messages / 5.3.3:
Applications of Data Mining in Protocol Analysis / 5.3.4:
Association Rule Mining for Inconsistent Secure Messages / 6.1:
The Basics of Association Rule Mining / 6.4.1:
Data Preparation / 6.4.2:
Identifying Association Rules of Interest / 6.4.3:
Algorithms and Experiments / 6.5:
Algorithms / 6.5.1:
Detection Models of Collusion Attacks / 6.5.2:
Identification of Frequent Patterns for Collusion Attack Detection / 7.1:
A Framework to Detect Collusion Attacks / 7.3.1:
Dealing with Knowledge and Facts / 7.3.3:
A Case Study / 7.3.4:
Estimation of the Probability of Collusion Attacks / 7.4:
Motivations / 7.4.1:
Preliminaries / 7.4.2:
Identifying Collusion Attack Using Bayesian Network / 7.4.3:
Conclusion and Future Works / 7.4.4:
Conclusion / 8.1:
Future Work / 8.2:
References
Index
Introduction / 1:
What Is Security Protocol? / 1.1:
Needs of Formal Analysis for Secure Transaction Protocols / 1.2:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼