close
1.

図書

図書
Hans Bisswanger
出版情報: Weinheim : WILEY-VCH, c2008  xviii, 301 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface to the Second English Edition
Preface to the First English Edition
Symbols and Abbreviations
Introduction and Definitions
References
Multiple Equilibria / 1:
Diffusion / 1.1:
Interaction between Macromolecules and Ligands / 1.2:
Binding Constants / 1.2.1:
Macromolecules with One Binding Site / 1.2.2:
Macromolecules with Identical Independent Binding Sites / 1.3:
General Binding Equation / 1.3.1:
Graphic Representations of the Binding Equation / 1.3.2:
Direct and Linear Diagrams / 1.3.2.1:
Analysis of Binding Data from Spectroscopic Titrations / 1.3.2.2:
Binding of Different Ligands, Competition / 1.3.3:
Non-competitive Binding / 1.3.4:
Macromolecules with Non-identical, Independent Binding Sites / 1.4:
Macromolecules with Identical, Interacting Binding Sites, Cooperativity / 1.5:
The Hill Equation / 1.5.1:
The Adair Equation / 1.5.2:
The Pauling Model / 1.5.3:
Allosteric Enzymes / 1.5.4:
The Symmetry or Concerted Model / 1.5.5:
The Sequential Model and Negative Cooperativity / 1.5.6:
Analysis of Cooperativity / 1.5.7:
Physiological Aspects of Cooperativity / 1.5.8:
Examples of Allosteric Enzymes / 1.5.9:
Hemoglobin / 1.5.9.1:
Aspartate Transcarbamoylase / 1.5.9.2:
Aspartokinase / 1.5.9.3:
Phosphofructokinase / 1.5.9.4:
Allosteric Regulation of the Glycogen Metabolism / 1.5.9.5:
Membrane Bound Enzymes and Receptors / 1.5.9.6:
Non-identical, Interacting Binding Sites / 1.6:
Enzyme Kinetics / 2:
Reaction Order / 2.1:
First Order Reactions / 2.1.1:
Second Order Reactions / 2.1.2:
Zero Order Reactions / 2.1.3:
Steady-State Kinetics and the Michaelis-Menten Equation / 2.2:
Derivation of the Michaelis-Menten Equation / 2.2.1:
Analysis of Enzyme Kinetic Data / 2.3:
Graphical Representations of the Michaelis-Menten Equation / 2.3.1:
Direct and Semi-logarithmic Representations / 2.3.1.1:
Direct Linear Plots / 2.3.1.2:
Linearization Methods / 2.3.1.3:
Analysis of Progress Curves / 2.3.2:
Integrated Michaelis-Menten Equation / 2.3.2.1:
Determination of Reaction Rates / 2.3.2.2:
Graphic Methods for Rate Determination / 2.3.2.3:
Graphic Determination of True Initial Rates / 2.3.2.4:
Reversible Enzyme Reactions / 2.4:
Rate Equation for Reversible Enzyme Reactions / 2.4.1:
The Haldane Relationship / 2.4.2:
Product Inhibition / 2.4.3:
Enzyme Inhibition / 2.5:
Unspecific Enzyme Inhibition / 2.5.1:
Irreversible Enzyme Inhibition / 2.5.2:
General Features of Irreversible Enzyme Inhibition / 2.5.2.1:
Suicide Substrates / 2.5.2.2:
Transition State Analogs / 2.5.2.3:
Analysis of Irreversible Inhibitions / 2.5.2.4:
Reversible Enzyme Inhibition / 2.5.3:
General Rate Equation / 2.5.3.1:
Non-Competitive Inhibition and Graphic Representation of Inhibition Data / 2.5.3.2:
Competitive Inhibition / 2.5.3.3:
Uncompetitive Inhibition / 2.5.3.4:
Partially Non-competitive Inhibition / 2.5.3.5:
Partially Uncompetitive Inhibition / 2.5.3.6:
Partially Competitive Inhibition / 2.5.3.7:
Noncompetitive and Uncompetitive Product Inhibition / 2.5.3.8:
Substrate Inhibition / 2.5.3.9:
Enzyme Reactions with Two Competing Substrates / 2.5.4:
Different Enzymes Catalyzing the Same Reaction / 2.5.5:
Multi-substrate Reactions / 2.6:
Nomenclature / 2.6.1:
Random Mechanism / 2.6.2:
Ordered Mechanism / 2.6.3:
Ping-pong Mechanism / 2.6.4:
Product Inhibition in Multi-substrate Reactions / 2.6.5:
Haldane Relationships in Multi-substrate Reactions / 2.6.6:
Mechanisms with more than Two Substrates / 2.6.7:
Other Nomenclatures for Multi-substrate Reactions / 2.6.8:
Derivation of Rate Equations of Complex Enzyme Mechanisms / 2.7:
King-Altmann Method / 2.7.1:
Simplified Derivations Applying Graph Theory / 2.7.2:
Combination of Equilibrium and Steady State Approach / 2.7.3:
Kinetic Treatment of Allosteric Enzymes / 2.8:
Hysteretic Enzymes / 2.8.1:
Kinetic Cooperativity, the Slow Transition Model / 2.8.2:
pH and Temperature Dependence of Enzymes / 2.9:
pH Optimum and Determination of pK Values / 2.9.1:
pH Stability / 2.9.2:
Temperature Dependence / 2.9.3:
Isotope Exchange / 2.10:
Isotope Exchange Kinetics / 2.10.1:
Isotope Effects / 2.10.2:
Primary Kinetic Isotope Effect / 2.10.2.1:
Influence of the Kinetic Isotope Effect on V and Km / 2.10.2.2:
Other Isotope Effects / 2.10.2.3:
Special Enzyme Mechanisms / 2.11:
Ribozymes / 2.11.1:
Polymer Substrates / 2.11.2:
Kinetics of Immobilized Enzymes / 2.11.3:
External Diffusion Limitation / 2.11.3.1:
Internal Diffusion Limitation / 2.11.3.2:
Inhibition of Immobilized Enzymes / 2.11.3.3:
pH and Temperature Behavior of Immobilized Enzymes / 2.11.3.4:
Transport Processes / 2.11.4:
Enzyme Reactions at Membrane Interfaces / 2.11.5:
Application of Statistical Methods in Enzyme Kinetics / 2.12:
General Remarks / 2.12.1:
Statistical Terms Used in Enzyme Kinetics / 2.12.2:
Methods / 3:
Methods for Investigation of Multiple Equilibria / 3.1:
Equilibrium Dialysis and General Aspects of Binding Measurements / 3.1.1:
Equilibrium Dialysis / 3.1.1.1:
Control Experiments and Sources of Error / 3.1.1.2:
Continuous Equilibrium Dialysis / 3.1.1.3:
Ultrafiltration / 3.1.2:
Gel Filtration / 3.1.3:
Batch Method / 3.1.3.1:
The Method of Hummel and Dreyer / 3.1.3.2:
Other Gel Filtration Methods / 3.1.3.3:
Ultracentrifugation / 3.1.4:
Fixed Angle Ultracentrifugation Methods / 3.1.4.1:
Sucrose Gradient Centrifugation / 3.1.4.2:
Surface Plasmon Resonance / 3.1.5:
Electrochemical Methods / 3.2:
The Oxygen Electrode / 3.2.1:
The CO2 Electrode / 3.2.2:
Potentiometry, Redox Potentials / 3.2.3:
The pH-stat / 3.2.4:
Polarography / 3.2.5:
Calorimetry / 3.3:
Spectroscopic Methods / 3.4:
Absorption Spectroscopy / 3.4.1:
The Lambert-Beer Law / 3.4.1.1:
Spectral Properties of Enzymes and Ligands / 3.4.1.2:
Structure of Spectrophotometers / 3.4.1.3:
Double Beam Spectrophotometer / 3.4.1.4:
Difference Spectroscopy / 3.4.1.5:
The Dual Wavelength Spectrophotometer / 3.4.1.6:
Photochemical Action Spectra / 3.4.1.7:
Bioluminescence / 3.4.2:
Fluorescence / 3.4.3:
Quantum Yield / 3.4.3.1:
Structure of Spectrofluorimeters / 3.4.3.2:
Perturbations of Fluorescence Measurements / 3.4.3.3:
Fluorescent Compounds (Fluorophores) / 3.4.3.4:
Radiationless Energy Transfer / 3.4.3.5:
Fluorescence Polarization / 3.4.3.6:
Pulse Fluorimetry / 3.4.3.7:
Circular Dichroism and Optical Rotation Dispersion / 3.4.4:
Infrared and Raman Spectroscopy / 3.4.5:
IR Spectroscopy / 3.4.5.1:
Raman Spectroscopy / 3.4.5.2:
Applications / 3.4.5.3:
Electron Paramagnetic Resonance Spectroscopy / 3.4.6:
Measurement of Fast Reactions / 3.5:
Flow Methods / 3.5.1:
The Continuous Flow Method / 3.5.1.1:
The Stopped-flow Method / 3.5.1.2:
Measurement of Enzyme Reactions by Flow Methods / 3.5.1.3:
Determination of the Dead Time / 3.5.1.4:
Relaxation Methods / 3.5.2:
The Temperature Jump Method / 3.5.2.1:
The Pressure Jump Method / 3.5.2.2:
The Electric Field Method / 3.5.2.3:
Flash Photolysis, Pico- and Femto-second Spectroscopy / 3.5.3:
Evaluation of Rapid Kinetic Reactions (Transient Kinetics) / 3.5.4:
Subject Index
Preface to the Second English Edition
Preface to the First English Edition
Symbols and Abbreviations
2.

電子ブック

EB
Jin Zhang
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
Scientific visualization and information visualization / 1.1.2:
Information retrieval / 1.2:
Browsing vs. query searching / 1.2.1:
Information at micro-level and macro-level / 1.2.2:
Spatial Characteristics of information space / 1.2.3:
Spatial characteristics of browsing / 1.2.4:
Perceptual and cognitive perspectives of visualization / 1.3:
Perceptual perspective / 1.3.1:
Cognitive perspective / 1.3.2:
Visualization for information retrieval / 1.4:
Rationale / 1.4.1:
Three information retrieval visualization paradigms / 1.4.2:
Procedures of establishing an information retrieval visualization model / 1.4.3:
Summary / 1.5:
Information Retrieval Preliminaries / Chapter 2:
Vector space model / 2.1:
Term weighting methods / 2.2:
Stop words / 2.2.1:
Inverse document frequency / 2.2.2:
The Salton term weighting method / 2.2.3:
Another term weighting method / 2.2.4:
Probability term weighting method / 2.2.5:
Similarity measures / 2.3:
Inner product similarity measure / 2.3.1:
Dice co-efficient similarity measure / 2.3.2:
The Jaccard co-efficient similarity measure / 2.3.3:
Overlap co-efficient similarity measure / 2.3.4:
Cosine similarity measure / 2.3.5:
Distance similarity measure / 2.3.6:
Angle-distance integrated similarity measure / 2.3.7:
The Pearson r correlation measure / 2.3.8:
Information retrieval (evaluation) models / 2.4:
Direction-based retrieval (evaluation) model / 2.4.1:
Distance-based retrieval (evaluation) model / 2.4.2:
Ellipse retrieval (evaluation) model / 2.4.3:
Conjunction retrieval (evaluation) model / 2.4.4:
Disjunction evaluation model / 2.4.5:
The Cassini oval retrieval (evaluation) model / 2.4.6:
Clustering algorithms / 2.5:
Non-hierarchical clustering algorithm / 2.5.1:
Hierarchical clustering algorithm / 2.5.2:
Evaluation of retrieval results / 2.6:
Visualization Models for Multiple Reference Points / 2.7:
Multiple references points / 3.1:
Model for fixed multiple reference points / 3.2:
Models for movable multiple reference points / 3.3:
Description of the original VIBE algorithm / 3.3.1:
Discussions about the model / 3.3.2:
Model for automatic reference point rotation / 3.4:
Definition of the visual space / 3.4.1:
Rotation of a reference point / 3.4.2:
Implication of information retrieval / 3.5:
Euclidean Spatial Characteristic Based Visualization Models / 3.6:
Euclidean space and its characteristics / 4.1:
Introduction to the information retrieval evaluation models / 4.2:
The distance-angel-based visualization model / 4.3:
The visual space definition / 4.3.1:
Visualization for information retrieval evaluation models / 4.3.2:
The angle-angle-based visualization model / 4.4:
The distance-distance-based visualization model / 4.4.1:
Kohonen Self-Organizing Map-An Artificial Neural Network / 4.5.1:
Introduction to neural networks / 5.1:
Definition of neural network / 5.1.1:
Characteristics and structures of neuron network / 5.1.2:
Kohonen self-organizing maps / 5.2:
Kohonen self-organizing map structures / 5.2.1:
Learning processing of the SOM algorithm / 5.2.2:
Feature map labeling / 5.2.3:
The SOM algorithm description / 5.2.4:
Implication of the SOM in information retrieval / 5.3:
Pathfinder Associative Network / 5.4:
Pathfinder associative network properties and descriptions / 6.1:
Definitions of concepts and explanations / 6.1.1:
The algorithm description / 6.1.2:
Graph layout method / 6.1.3:
Implications on information retrieval / 6.2:
Author co-citation analysis / 6.2.1:
Term associative network / 6.2.2:
Hyperlink / 6.2.3:
Search in Pathfinder associative networks / 6.2.4:
Multidimensional Scaling / 6.3:
MDS analysis method descriptions / 7.1:
Classical MDS / 7.1.1:
Non-metric MDS / 7.1.2:
Metric MDS / 7.1.3:
Implications of MDS techniques for information retrieval / 7.2:
Definitions of displayed objects and proximity between objects / 7.2.1:
Exploration in a MDS display space / 7.2.2:
Discussion / 7.2.3:
Internet Information Visualization / 7.3:
Introduction / 8.1:
Internet characteristics / 8.1.1:
Internet information organization and presentation methods / 8.1.2:
Internet information utilization / 8.1.3:
Challenges of the internet / 8.1.4:
Internet information visualization / 8.2:
Visualization of internet information structure / 8.2.1:
Internet information seeking visualization / 8.2.2:
Visualization of web traffic information / 8.2.3:
Discussion history visualization / 8.2.4:
Ambiguity in Information Visualization / 8.3:
Ambiguity and its implication in information visualization / 9.1:
Reason of ambiguity in information visualization / 9.1.1:
Implication of ambiguity for information visualization / 9.1.2:
Ambiguity analysis in information retrieval visualization models / 9.2:
Ambiguity in the Euclidean spatial characteristic based information models / 9.2.1:
Ambiguity in the multiple reference point based information visualization models / 9.2.2:
Ambiguity in the Pathfinder network / 9.2.3:
Ambiguity in SOM / 9.2.4:
Ambiguity in MDS / 9.2.5:
The Implication of Metaphors in Information Visualization / 9.3:
Definition, basic elements, and characteristics of a metaphor / 10.1:
Cognitive foundation of metaphors / 10.2:
Mental models, metaphors, and human computer interaction / 10.3:
Metaphors in human computer interaction / 10.3.1:
Mental models / 10.3.2:
Mental models in HCI / 10.3.3:
Metaphors in information visualization retrieval / 10.4:
Rationales for using metaphors / 10.4.1:
Metaphorical information retrieval visualization environments / 10.4.2:
Procedures and principles for metaphor application / 10.5:
Procedure for metaphor application / 10.5.1:
Guides for designing a good metaphorical visual information retrieval environment / 10.5.2:
Benchmarks and Evaluation Criteria for Information Retrieval Visualization / 10.6:
Information retrieval visualization evaluation / 11.1:
Benchmarks and evaluation standards / 11.2:
Factors affecting evaluation standards / 11.2.1:
Principles for developing evaluation benchmarks / 11.2.2:
Four proposed categories for evaluation criteria / 11.2.3:
Descriptions of proposed benchmarks / 11.2.4:
Afterthoughts / 11.3:
Comparisons of the introduced visualization models / 12.1:
Issues and challenges / 12.3:
Bibliography / 12.4:
Index
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
3.

電子ブック

EB
Jin Zhang
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
Scientific visualization and information visualization / 1.1.2:
Information retrieval / 1.2:
Browsing vs. query searching / 1.2.1:
Information at micro-level and macro-level / 1.2.2:
Spatial Characteristics of information space / 1.2.3:
Spatial characteristics of browsing / 1.2.4:
Perceptual and cognitive perspectives of visualization / 1.3:
Perceptual perspective / 1.3.1:
Cognitive perspective / 1.3.2:
Visualization for information retrieval / 1.4:
Rationale / 1.4.1:
Three information retrieval visualization paradigms / 1.4.2:
Procedures of establishing an information retrieval visualization model / 1.4.3:
Summary / 1.5:
Information Retrieval Preliminaries / Chapter 2:
Vector space model / 2.1:
Term weighting methods / 2.2:
Stop words / 2.2.1:
Inverse document frequency / 2.2.2:
The Salton term weighting method / 2.2.3:
Another term weighting method / 2.2.4:
Probability term weighting method / 2.2.5:
Similarity measures / 2.3:
Inner product similarity measure / 2.3.1:
Dice co-efficient similarity measure / 2.3.2:
The Jaccard co-efficient similarity measure / 2.3.3:
Overlap co-efficient similarity measure / 2.3.4:
Cosine similarity measure / 2.3.5:
Distance similarity measure / 2.3.6:
Angle-distance integrated similarity measure / 2.3.7:
The Pearson r correlation measure / 2.3.8:
Information retrieval (evaluation) models / 2.4:
Direction-based retrieval (evaluation) model / 2.4.1:
Distance-based retrieval (evaluation) model / 2.4.2:
Ellipse retrieval (evaluation) model / 2.4.3:
Conjunction retrieval (evaluation) model / 2.4.4:
Disjunction evaluation model / 2.4.5:
The Cassini oval retrieval (evaluation) model / 2.4.6:
Clustering algorithms / 2.5:
Non-hierarchical clustering algorithm / 2.5.1:
Hierarchical clustering algorithm / 2.5.2:
Evaluation of retrieval results / 2.6:
Visualization Models for Multiple Reference Points / 2.7:
Multiple references points / 3.1:
Model for fixed multiple reference points / 3.2:
Models for movable multiple reference points / 3.3:
Description of the original VIBE algorithm / 3.3.1:
Discussions about the model / 3.3.2:
Model for automatic reference point rotation / 3.4:
Definition of the visual space / 3.4.1:
Rotation of a reference point / 3.4.2:
Implication of information retrieval / 3.5:
Euclidean Spatial Characteristic Based Visualization Models / 3.6:
Euclidean space and its characteristics / 4.1:
Introduction to the information retrieval evaluation models / 4.2:
The distance-angel-based visualization model / 4.3:
The visual space definition / 4.3.1:
Visualization for information retrieval evaluation models / 4.3.2:
The angle-angle-based visualization model / 4.4:
The distance-distance-based visualization model / 4.4.1:
Kohonen Self-Organizing Map-An Artificial Neural Network / 4.5.1:
Introduction to neural networks / 5.1:
Definition of neural network / 5.1.1:
Characteristics and structures of neuron network / 5.1.2:
Kohonen self-organizing maps / 5.2:
Kohonen self-organizing map structures / 5.2.1:
Learning processing of the SOM algorithm / 5.2.2:
Feature map labeling / 5.2.3:
The SOM algorithm description / 5.2.4:
Implication of the SOM in information retrieval / 5.3:
Pathfinder Associative Network / 5.4:
Pathfinder associative network properties and descriptions / 6.1:
Definitions of concepts and explanations / 6.1.1:
The algorithm description / 6.1.2:
Graph layout method / 6.1.3:
Implications on information retrieval / 6.2:
Author co-citation analysis / 6.2.1:
Term associative network / 6.2.2:
Hyperlink / 6.2.3:
Search in Pathfinder associative networks / 6.2.4:
Multidimensional Scaling / 6.3:
MDS analysis method descriptions / 7.1:
Classical MDS / 7.1.1:
Non-metric MDS / 7.1.2:
Metric MDS / 7.1.3:
Implications of MDS techniques for information retrieval / 7.2:
Definitions of displayed objects and proximity between objects / 7.2.1:
Exploration in a MDS display space / 7.2.2:
Discussion / 7.2.3:
Internet Information Visualization / 7.3:
Introduction / 8.1:
Internet characteristics / 8.1.1:
Internet information organization and presentation methods / 8.1.2:
Internet information utilization / 8.1.3:
Challenges of the internet / 8.1.4:
Internet information visualization / 8.2:
Visualization of internet information structure / 8.2.1:
Internet information seeking visualization / 8.2.2:
Visualization of web traffic information / 8.2.3:
Discussion history visualization / 8.2.4:
Ambiguity in Information Visualization / 8.3:
Ambiguity and its implication in information visualization / 9.1:
Reason of ambiguity in information visualization / 9.1.1:
Implication of ambiguity for information visualization / 9.1.2:
Ambiguity analysis in information retrieval visualization models / 9.2:
Ambiguity in the Euclidean spatial characteristic based information models / 9.2.1:
Ambiguity in the multiple reference point based information visualization models / 9.2.2:
Ambiguity in the Pathfinder network / 9.2.3:
Ambiguity in SOM / 9.2.4:
Ambiguity in MDS / 9.2.5:
The Implication of Metaphors in Information Visualization / 9.3:
Definition, basic elements, and characteristics of a metaphor / 10.1:
Cognitive foundation of metaphors / 10.2:
Mental models, metaphors, and human computer interaction / 10.3:
Metaphors in human computer interaction / 10.3.1:
Mental models / 10.3.2:
Mental models in HCI / 10.3.3:
Metaphors in information visualization retrieval / 10.4:
Rationales for using metaphors / 10.4.1:
Metaphorical information retrieval visualization environments / 10.4.2:
Procedures and principles for metaphor application / 10.5:
Procedure for metaphor application / 10.5.1:
Guides for designing a good metaphorical visual information retrieval environment / 10.5.2:
Benchmarks and Evaluation Criteria for Information Retrieval Visualization / 10.6:
Information retrieval visualization evaluation / 11.1:
Benchmarks and evaluation standards / 11.2:
Factors affecting evaluation standards / 11.2.1:
Principles for developing evaluation benchmarks / 11.2.2:
Four proposed categories for evaluation criteria / 11.2.3:
Descriptions of proposed benchmarks / 11.2.4:
Afterthoughts / 11.3:
Comparisons of the introduced visualization models / 12.1:
Issues and challenges / 12.3:
Bibliography / 12.4:
Index
Information Retrieval and Visualization / Chapter 1:
Visualization / 1.1:
Definition / 1.1.1:
4.

電子ブック

EB
Rhodri H. Davies, Chris Taylor, Christopher J. Taylor, Carole Twining
出版情報: Springer eBooks Computer Science , Springer, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
Detecting Vertebral Fractures / 1.1.2:
Face Identification, Tracking, and Simulation of Ageing / 1.1.3:
Overview / 1.2:
Statistical Models of Shape and Appearance / 2:
Finite-Dimensional Representations of Shape / 2.1:
Shape Alignment / 2.1.1:
Statistics of Shapes / 2.1.2:
Principal Component Analysis / 2.1.3:
Modelling Distributions of Sets of Shapes / 2.2:
Gaussian Models / 2.2.1:
Kernel Density Estimation / 2.2.2:
Kernel Principal Component Analysis / 2.2.3:
Using Principal Components to Constrain Shape / 2.2.4:
Infinite-Dimensional Representations of Shape / 2.3:
Parameterised Representations of Shape / 2.3.1:
Applications of Shape Models / 2.4:
Active Shape Models / 2.4.1:
Active Appearance Models / 2.4.2:
Establishing Correspondence / 3:
The Correspondence Problem / 3.1:
Approaches to Establishing Correspondence / 3.2:
Manual Landmarking / 3.2.1:
Automatic Methods of Establishing Correspondence / 3.2.2:
Correspondence by Parameterisation / 3.2.2.1:
Distance-Based Correspondence / 3.2.2.2:
Feature-Based Correspondence / 3.2.2.3:
Correspondence Based on Physical Properties / 3.2.2.4:
Image-Based Correspondence / 3.2.2.5:
Summary / 3.2.3:
Correspondence by Optimisation / 3.3:
Objective Function / 3.3.1:
Manipulating Correspondence / 3.3.2:
Optimisation / 3.3.3:
Objective Functions / 4:
Shape-Based Objective Functions / 4.1:
Euclidian Distance and the Trace of the Model Covariance / 4.1.1:
Bending Energy / 4.1.2:
Curvature / 4.1.3:
Shape Context / 4.1.4:
Model-Based Objective Functions / 4.2:
The Determinant of the Model Covariance / 4.2.1:
Measuring Model Properties by Bootstrapping / 4.2.2:
Specificity / 4.2.2.1:
Generalization Ability / 4.2.2.2:
An Information Theoretic Objective Function / 4.3:
Shannon Codeword Length and Shannon Entropy / 4.3.1:
Description Length for a Multivariate Gaussian Model / 4.3.2:
Approximations to MDL / 4.3.3:
Gradient of Simplified MDL Objective Functions / 4.3.4:
Concluding Remarks / 4.4:
Re-parameterisation of Open and Closed Curves / 5:
Open Curves / 5.1:
Piecewise-Linear Re-parameterisation / 5.1.1:
Recursive Piecewise-Linear Re-parameterisation / 5.1.2:
Localized Re-parameterisation / 5.1.3:
Kernel-Based Representation of Re-parameterisation / 5.1.4:
Cauchy Kernels / 5.1.4.1:
Polynomial Re-parameterisation / 5.1.4.2:
Differentiable Re-parameterisations for Closed Curves / 5.2:
Wrapped Kernel Re-parameterisation for Closed Curves / 5.2.1:
Use in Optimisation / 5.3:
Parameterisation and Re-parameterisation of Surfaces / 6:
Surface Parameterisation / 6.1:
Initial Parameterisation for Open Surfaces / 6.1.1:
Initial Parameterisation for Closed Surfaces / 6.1.2:
Defining a Continuous Parameterisation / 6.1.3:
Removing Area Distortion / 6.1.4:
Consistent Parameterisation / 6.1.5:
Re-parameterisation of Surfaces / 6.2:
Re-parameterisation of Open Surfaces / 6.2.1:
Recursive Piecewise Linear Re-parameterisation / 6.2.1.1:
Re-parameterisation of Closed Surfaces / 6.2.1.2:
Recursive Piecewise-Linear Reparameterisation / 6.2.2.1:
Cauchy Kernel Re-parameterisation / 6.2.2.2:
Symmetric Theta Transformation / 6.2.2.4:
Asymmetric Theta Transformations / 6.2.2.5:
Shear Transformations / 6.2.2.6:
Re-parameterisation of Other Topologies / 6.2.3:
A Tractable Optimisation Approach / 6.3:
Optimising One Example at a Time / 7.1.1:
Stochastic Selection of Values for Auxiliary Parameters / 7.1.2:
Gradient Descent Optimisation / 7.1.3:
Optimising Pose / 7.1.4:
Tailoring Optimisation / 7.2:
Closed Curves and Surfaces / 7.2.1:
Open Surfaces / 7.2.2:
Multi-part Objects / 7.2.3:
Implementation Issues / 7.3:
Calculating the Covariance Matrix by Numerical Integration / 7.3.1:
Numerical Estimation of the Gradient / 7.3.2:
Sampling the Set of Shapes / 7.3.3:
Detecting Singularities in the Re-parameterisations / 7.3.4:
Example Optimisation Routines / 7.4:
Example 1: Open Curves / 7.4.1:
Example 2: Open Surfaces / 7.4.2:
Non-parametric Regularization / 8:
Regularization / 8.1:
Fluid Regularization / 8.1.1:
The Shape Manifold / 8.3:
The Induced Metric / 8.3.1:
Tangent Space / 8.3.2:
Covariant Derivatives / 8.3.3:
Shape Images / 8.4:
Iterative Updating of Shape Images / 8.5:
Dealing with Shapes with Spherical Topology / 8.5.2:
Avoiding Singularities by Re-gridding / 8.5.3:
Example Implementation of Non-parametric Regularization / 8.6:
Example Optimisation Routines Using Iterative Updating of Shape Images / 8.7:
Example 3: Open Surfaces Using Shape Images / 8.7.1:
Example 4: Optimisation of Closed Surfaces Using Shape Images / 8.7.2:
Evaluation of Statistical Models / 9:
Evaluation Using Ground Truth / 9.1:
Evaluation in the Absence of Ground Truth / 9.2:
Specificity and Generalization: Quantitative Measures / 9.2.1:
Specificity and Generalization as Graph-Based Estimators / 9.3:
Evaluating the Coefficients [beta subscript n, gamma] / 9.3.1:
Generalized Specificity / 9.3.2:
Specificity and Generalization in Practice / 9.4:
Discussion / 9.5:
Thin-Plate and Clamped-Plate Splines / Appendix A:
Curvature and Bending Energy / A.1:
Variational Formulation / A.2:
Green's Functions / A.3:
Green's Functions for the Thin-Plate Spline / A.3.1:
Green's Functions for the Clamped-Plate Spline / A.3.2:
Differentiating the Objective Function / Appendix B:
Finite-Dimensional Shape Representations / B.1:
The Pseudo-Inverse / B.1.1:
Varying the Shape / B.1.2:
From PCA to Singular Value Decomposition / B.1.3:
Infinite Dimensional Shape Representations / B.2:
Glossary
References
Index
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
5.

電子ブック

EB
Rhodri H. Davies, Chris Taylor, Christopher J. Taylor, Carole Twining
出版情報: SpringerLink Books - AutoHoldings , Springer, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
Detecting Vertebral Fractures / 1.1.2:
Face Identification, Tracking, and Simulation of Ageing / 1.1.3:
Overview / 1.2:
Statistical Models of Shape and Appearance / 2:
Finite-Dimensional Representations of Shape / 2.1:
Shape Alignment / 2.1.1:
Statistics of Shapes / 2.1.2:
Principal Component Analysis / 2.1.3:
Modelling Distributions of Sets of Shapes / 2.2:
Gaussian Models / 2.2.1:
Kernel Density Estimation / 2.2.2:
Kernel Principal Component Analysis / 2.2.3:
Using Principal Components to Constrain Shape / 2.2.4:
Infinite-Dimensional Representations of Shape / 2.3:
Parameterised Representations of Shape / 2.3.1:
Applications of Shape Models / 2.4:
Active Shape Models / 2.4.1:
Active Appearance Models / 2.4.2:
Establishing Correspondence / 3:
The Correspondence Problem / 3.1:
Approaches to Establishing Correspondence / 3.2:
Manual Landmarking / 3.2.1:
Automatic Methods of Establishing Correspondence / 3.2.2:
Correspondence by Parameterisation / 3.2.2.1:
Distance-Based Correspondence / 3.2.2.2:
Feature-Based Correspondence / 3.2.2.3:
Correspondence Based on Physical Properties / 3.2.2.4:
Image-Based Correspondence / 3.2.2.5:
Summary / 3.2.3:
Correspondence by Optimisation / 3.3:
Objective Function / 3.3.1:
Manipulating Correspondence / 3.3.2:
Optimisation / 3.3.3:
Objective Functions / 4:
Shape-Based Objective Functions / 4.1:
Euclidian Distance and the Trace of the Model Covariance / 4.1.1:
Bending Energy / 4.1.2:
Curvature / 4.1.3:
Shape Context / 4.1.4:
Model-Based Objective Functions / 4.2:
The Determinant of the Model Covariance / 4.2.1:
Measuring Model Properties by Bootstrapping / 4.2.2:
Specificity / 4.2.2.1:
Generalization Ability / 4.2.2.2:
An Information Theoretic Objective Function / 4.3:
Shannon Codeword Length and Shannon Entropy / 4.3.1:
Description Length for a Multivariate Gaussian Model / 4.3.2:
Approximations to MDL / 4.3.3:
Gradient of Simplified MDL Objective Functions / 4.3.4:
Concluding Remarks / 4.4:
Re-parameterisation of Open and Closed Curves / 5:
Open Curves / 5.1:
Piecewise-Linear Re-parameterisation / 5.1.1:
Recursive Piecewise-Linear Re-parameterisation / 5.1.2:
Localized Re-parameterisation / 5.1.3:
Kernel-Based Representation of Re-parameterisation / 5.1.4:
Cauchy Kernels / 5.1.4.1:
Polynomial Re-parameterisation / 5.1.4.2:
Differentiable Re-parameterisations for Closed Curves / 5.2:
Wrapped Kernel Re-parameterisation for Closed Curves / 5.2.1:
Use in Optimisation / 5.3:
Parameterisation and Re-parameterisation of Surfaces / 6:
Surface Parameterisation / 6.1:
Initial Parameterisation for Open Surfaces / 6.1.1:
Initial Parameterisation for Closed Surfaces / 6.1.2:
Defining a Continuous Parameterisation / 6.1.3:
Removing Area Distortion / 6.1.4:
Consistent Parameterisation / 6.1.5:
Re-parameterisation of Surfaces / 6.2:
Re-parameterisation of Open Surfaces / 6.2.1:
Recursive Piecewise Linear Re-parameterisation / 6.2.1.1:
Re-parameterisation of Closed Surfaces / 6.2.1.2:
Recursive Piecewise-Linear Reparameterisation / 6.2.2.1:
Cauchy Kernel Re-parameterisation / 6.2.2.2:
Symmetric Theta Transformation / 6.2.2.4:
Asymmetric Theta Transformations / 6.2.2.5:
Shear Transformations / 6.2.2.6:
Re-parameterisation of Other Topologies / 6.2.3:
A Tractable Optimisation Approach / 6.3:
Optimising One Example at a Time / 7.1.1:
Stochastic Selection of Values for Auxiliary Parameters / 7.1.2:
Gradient Descent Optimisation / 7.1.3:
Optimising Pose / 7.1.4:
Tailoring Optimisation / 7.2:
Closed Curves and Surfaces / 7.2.1:
Open Surfaces / 7.2.2:
Multi-part Objects / 7.2.3:
Implementation Issues / 7.3:
Calculating the Covariance Matrix by Numerical Integration / 7.3.1:
Numerical Estimation of the Gradient / 7.3.2:
Sampling the Set of Shapes / 7.3.3:
Detecting Singularities in the Re-parameterisations / 7.3.4:
Example Optimisation Routines / 7.4:
Example 1: Open Curves / 7.4.1:
Example 2: Open Surfaces / 7.4.2:
Non-parametric Regularization / 8:
Regularization / 8.1:
Fluid Regularization / 8.1.1:
The Shape Manifold / 8.3:
The Induced Metric / 8.3.1:
Tangent Space / 8.3.2:
Covariant Derivatives / 8.3.3:
Shape Images / 8.4:
Iterative Updating of Shape Images / 8.5:
Dealing with Shapes with Spherical Topology / 8.5.2:
Avoiding Singularities by Re-gridding / 8.5.3:
Example Implementation of Non-parametric Regularization / 8.6:
Example Optimisation Routines Using Iterative Updating of Shape Images / 8.7:
Example 3: Open Surfaces Using Shape Images / 8.7.1:
Example 4: Optimisation of Closed Surfaces Using Shape Images / 8.7.2:
Evaluation of Statistical Models / 9:
Evaluation Using Ground Truth / 9.1:
Evaluation in the Absence of Ground Truth / 9.2:
Specificity and Generalization: Quantitative Measures / 9.2.1:
Specificity and Generalization as Graph-Based Estimators / 9.3:
Evaluating the Coefficients [beta subscript n, gamma] / 9.3.1:
Generalized Specificity / 9.3.2:
Specificity and Generalization in Practice / 9.4:
Discussion / 9.5:
Thin-Plate and Clamped-Plate Splines / Appendix A:
Curvature and Bending Energy / A.1:
Variational Formulation / A.2:
Green's Functions / A.3:
Green's Functions for the Thin-Plate Spline / A.3.1:
Green's Functions for the Clamped-Plate Spline / A.3.2:
Differentiating the Objective Function / Appendix B:
Finite-Dimensional Shape Representations / B.1:
The Pseudo-Inverse / B.1.1:
Varying the Shape / B.1.2:
From PCA to Singular Value Decomposition / B.1.3:
Infinite Dimensional Shape Representations / B.2:
Glossary
References
Index
Introduction / 1:
Example Applications of Statistical Models / 1.1:
Detecting Osteoporosis Using Dental Radiographs / 1.1.1:
6.

電子ブック

EB
Sushil Jajodia, Hirosh Joseph, Abhishek Singh, Baibhav Singh
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
Analysis of WEP flaws / 1.2.1:
Key Stream Reuse / 1.2.2:
Message Modification / 1.2.3:
Message Injection / 1.2.4:
Authentication Spoofing / 1.2.5:
IP Redirection / 1.2.6:
Wireless Frame Generation / 1.2.7:
AirJack / 1.2.7.1:
Wavesec / 1.2.7.2:
Libwlan / 1.2.7.3:
FakeAP / 1.2.7.4:
Wnet / 1.2.7.5:
Scapy / 1.2.7.7:
Encryption Cracking Tools / 1.2.8:
Wepcrack / 1.2.8.1:
Dweputils / 1.2.8.2:
Wep tools / 1.2.8.3:
Wep Attack / 1.2.8.4:
Retrieving the WEP keys from Client Host / 1.2.9:
Traffic Inection Tools / 1.2.10:
802.1x Cracking Tools / 1.2.11:
Asleap-imp and Leap / 1.2.11.1:
Wireless DoS Attacks / 1.2.12:
Physical Layer Attack or Jamming / 1.2.12.1:
Signal Strength / 1.2.12.1.1:
Carrier Sensing Time / 1.2.12.1.2:
Packet Delivery Ratio / 1.2.12.1.3:
Signal Strength Consistency check / 1.2.12.1.4:
Spoofed Dessociation and Deauthentication Frames / 1.2.12.2:
Spoofed Malformed Authentication Frames / 1.2.12.3:
Flooding the Access Point Association and Authentication Buffer / 1.2.12.4:
Frame Deletion Attack / 1.2.12.5:
DoS attack dependent upon specific Wireless Setting / 1.2.12.6:
Attack against the 802.11i implementations / 1.2.13:
Authentication Mechanism Attacks / 1.2.13.1:
Prevention and Modifications / 1.3:
TKIP: temporal Key Integrity Protocol / 1.3.1:
TKIP Implementation / 1.3.1.1:
Message Integrity / 1.3.1.1.1:
Initialization Vector / 1.3.1.1.2:
Prevention against the FMS Attack / 1.3.1.1.3:
Per Packet key Mixing / 1.3.1.1.4:
Implementation Details of TKIP / 1.3.1.1.5:
Details of Per Packet Key mixing / 1.3.1.1.6:
Attack on TKIP / 1.3.1.2:
AES - CCMP / 1.3.2:
CCMP Header / 1.3.2.1:
Implementation / 1.3.2.2:
Encryption Process in MPDU / 1.3.2.2.1:
Decrypting MPDU / 1.3.2.2.2:
Prevention Method using Detection Devices / 1.4:
Conclusion / 1.5:
Vulnerability Analysis for Mail Protocols / 2.0:
Format String Specifiers / 2.1:
Format String Vulnerability / 2.2.1:
Format String Denial of Service Attack / 2.2.1.1:
Format String Vulnerability Reading Attack / 2.2.1.2:
Format String Vulnerability Writing Attack / 2.2.1.3:
Preventive Measures for Format String vulnerability / 2.2.1.4:
Buffer Overflow Attack / 2.3:
Buffer Overflow Prevention / 2.3.1:
Directory Traversal Attacks / 2.4:
Remote Detection / 2.4.1:
False Positive in Remote Detection for Mail Traffic / 2.5:
False Positive in case of SMTP Traffic / 2.5.1:
False Positive in case of IMAP Traffic / 2.5.2:
Vulnerability Analysis for FTP and TFTP / 2.6:
Buffer Overflow in FTP / 3.1:
Directory Traversal Attack in FTP / 3.1.2:
TFTP Vulnerability Analysis / 3.2:
Vulnerability Analysis / 3.2.1:
Vulnerability Analysis for HTTP / 3.3:
XSS Attack / 4.1:
Prevention against Cross Site Scripting Attacks / 4.2.1:
Vulnerability Protection / 4.2.1.1:
SQL Injection Attacks / 4.3:
SQL Injection Case Study / 4.3.1:
Preventive Measures / 4.3.2:
SQL injection in Oracle Data base / 4.3.2.1:
Stored Procedures / 4.3.2.2.1:
Remote Detection for Oracle Database / 4.3.2.2.2:
Other Preventive Measures / 4.3.3:
Preventive Measures by developers / 4.3.3.1:
MS DoS Device Name Vulnerability / 4.4:
Prevention from DoS Device Name Vulnerability / 4.4.1:
False Positive in HTTP / 4.5:
Evasion of HTTP Signatures / 4.6:
Vulnerability Analysis for DNS and DHCP / 4.7:
Introduction of DNS Protocol / 5.1:
Vulnerabilities in a DNS Protocol / 5.1.1:
DNS Cache Poisoning / 5.1.1.1:
Redirection Attack / 5.1.1.2:
Buffer Overflow Vulnerability / 5.1.1.3:
DNS Man in the Middle Attack or DNS Hijacking / 5.1.1.4:
DNS Amplification Attack / 5.1.1.5:
False Positives in a DNS Protocol / 5.1.2:
Introduction of DHCP / 5.2:
Vulnerabilities in DHCP / 5.2.1:
Client Masquerading / 5.2.1.1:
Flooding / 5.2.1.2:
Client Misconfiguration / 5.2.1.3:
Theft of Service / 5.2.1.4:
Packet Altercation / 5.2.1.5:
Key Exposure / 5.2.1.6:
Key Distribution / 5.2.1.7:
Protocol Agreement Issues / 5.2.1.8:
False Positive in DHCP / 5.2.2:
Vulnerability Analysis for LDAP and SNMP / 5.3:
ASN and BER Encoding / 6.1:
BER implementation for LDAP / 6.3:
Threat Analysis for Directory Services / 6.3.1:
SNMP / 6.4:
Vulnerability Analysis for SNMP / 6.4.1:
Vulnerability Analysis for RPC / 6.5:
RPC Message Protocol / 7.1:
NDR Format / 7.3:
Port Mapper / 7.4:
False Positive for SMB RPC Protocol / 7.5:
Evasion in RPC / 7.6:
Multiple Binding UUID / 7.6.1:
Fragment Data across many Requests / 7.6.2:
Bind to one UUID then alter Context / 7.6.3:
Prepend an ObjectID / 7.6.4:
Bind with an authentication field / 7.6.5:
One packet UDP function call / 7.6.6:
Endianess Selection / 7.6.7:
Chaining SMB commands / 7.6.8:
Out of order chaining / 7.6.9:
Chaining with random data in between commands / 7.6.10:
Unicode and non-Unicode evasion / 7.6.11:
SMB CreateAndX Path Names / 7.6.12:
Malware / 7.7:
Malware Naming Convention / 8.1:
Worms / 8.2.1:
Trojans / 8.2.2:
Spyware & Adware / 8.2.3:
Malware Threat Analysis / 8.3:
Creating controlled Environment / 8.3.1:
Confinement with the Hard Virtual Machines / 8.3.1.1:
Confinement with the Soft Virtual Machines / 8.3.1.2:
Confinement with Jails and Chroot / 8.3.1.3:
Confinement with System call Sensors / 8.3.1.4:
Confinement with System call Spoofing / 8.3.1.5:
Behavioral Analysis / 8.3.2:
Code Analysis / 8.3.3:
Root Kits / 8.4:
User and Kernel Mode Communication / 8.4.1:
I/O Request Packets (IRP) / 8.4.2:
Interrupt Descriptor Table / 8.4.3:
Service Descriptor Table / 8.4.4:
Direct Kernel Object Manipulation / 8.4.5:
Detection of Rootkits / 8.4.6:
Spyware / 8.5:
Methods of Spyware installation and propagation / 8.5.1:
Drive- By- Downloads / 8.5.1.1:
Bundling / 8.5.1.2:
From Other Spyware / 8.5.1.3:
Security Holes / 8.5.1.4:
Iframe Exploit / 8.5.2:
IE .chm File processing Vulnerability / 8.5.2.2:
Internet Code Download Link / 8.5.2.3:
Anti Spyware Signature Development / 8.5.3:
Vulnerability Signature / 8.5.3.1:
CLSID Data base / 8.5.3.2:
Spyware Specific Signature / 8.5.3.3:
Information Stealing / 8.5.3.4:
Preventing Information from being sent as emails / 8.5.3.5:
Reverse Engineering / 8.6:
Anti Reversing Technique / 9.1:
Anti Disassembly / 9.2.1:
Linear Sweep Disassembler / 9.2.1.1:
Recursive Traversal Disassembler / 9.2.1.2:
Evasion Technique for Disasembler / 9.2.1.3:
Self-Modifying Code / 9.2.2:
Virtual Machine Obfuscation / 9.2.3:
Anti Debugging Technique / 9.3:
Break Points / 9.3.1:
Software break point / 9.3.1.1:
Hardware break point / 9.3.1.2:
Detection of Breakpoint / 9.3.1.3:
Virtual Machine Detection / 9.4:
Checking finger print / 9.4.1:
Checking system tables / 9.4.2:
Checking processor instruction set / 9.4.3:
Unpacking / 9.5:
Manual unpacking of malware / 9.5.1:
Finding an original entry point of an executable / 9.5.1.1:
Taking memory Dump / 9.5.1.2:
Import Table Reconstruction / 9.5.1.3:
Import redirection and code emulation / 9.5.1.4:
Index / 9.6:
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
7.

電子ブック

EB
Sushil Jajodia, Hirosh Joseph, Abhishek Singh, Baibhav Singh, H. Joseph, B. Singh
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
Analysis of WEP flaws / 1.2.1:
Key Stream Reuse / 1.2.2:
Message Modification / 1.2.3:
Message Injection / 1.2.4:
Authentication Spoofing / 1.2.5:
IP Redirection / 1.2.6:
Wireless Frame Generation / 1.2.7:
AirJack / 1.2.7.1:
Wavesec / 1.2.7.2:
Libwlan / 1.2.7.3:
FakeAP / 1.2.7.4:
Wnet / 1.2.7.5:
Scapy / 1.2.7.7:
Encryption Cracking Tools / 1.2.8:
Wepcrack / 1.2.8.1:
Dweputils / 1.2.8.2:
Wep tools / 1.2.8.3:
Wep Attack / 1.2.8.4:
Retrieving the WEP keys from Client Host / 1.2.9:
Traffic Inection Tools / 1.2.10:
802.1x Cracking Tools / 1.2.11:
Asleap-imp and Leap / 1.2.11.1:
Wireless DoS Attacks / 1.2.12:
Physical Layer Attack or Jamming / 1.2.12.1:
Signal Strength / 1.2.12.1.1:
Carrier Sensing Time / 1.2.12.1.2:
Packet Delivery Ratio / 1.2.12.1.3:
Signal Strength Consistency check / 1.2.12.1.4:
Spoofed Dessociation and Deauthentication Frames / 1.2.12.2:
Spoofed Malformed Authentication Frames / 1.2.12.3:
Flooding the Access Point Association and Authentication Buffer / 1.2.12.4:
Frame Deletion Attack / 1.2.12.5:
DoS attack dependent upon specific Wireless Setting / 1.2.12.6:
Attack against the 802.11i implementations / 1.2.13:
Authentication Mechanism Attacks / 1.2.13.1:
Prevention and Modifications / 1.3:
TKIP: temporal Key Integrity Protocol / 1.3.1:
TKIP Implementation / 1.3.1.1:
Message Integrity / 1.3.1.1.1:
Initialization Vector / 1.3.1.1.2:
Prevention against the FMS Attack / 1.3.1.1.3:
Per Packet key Mixing / 1.3.1.1.4:
Implementation Details of TKIP / 1.3.1.1.5:
Details of Per Packet Key mixing / 1.3.1.1.6:
Attack on TKIP / 1.3.1.2:
AES - CCMP / 1.3.2:
CCMP Header / 1.3.2.1:
Implementation / 1.3.2.2:
Encryption Process in MPDU / 1.3.2.2.1:
Decrypting MPDU / 1.3.2.2.2:
Prevention Method using Detection Devices / 1.4:
Conclusion / 1.5:
Vulnerability Analysis for Mail Protocols / 2.0:
Format String Specifiers / 2.1:
Format String Vulnerability / 2.2.1:
Format String Denial of Service Attack / 2.2.1.1:
Format String Vulnerability Reading Attack / 2.2.1.2:
Format String Vulnerability Writing Attack / 2.2.1.3:
Preventive Measures for Format String vulnerability / 2.2.1.4:
Buffer Overflow Attack / 2.3:
Buffer Overflow Prevention / 2.3.1:
Directory Traversal Attacks / 2.4:
Remote Detection / 2.4.1:
False Positive in Remote Detection for Mail Traffic / 2.5:
False Positive in case of SMTP Traffic / 2.5.1:
False Positive in case of IMAP Traffic / 2.5.2:
Vulnerability Analysis for FTP and TFTP / 2.6:
Buffer Overflow in FTP / 3.1:
Directory Traversal Attack in FTP / 3.1.2:
TFTP Vulnerability Analysis / 3.2:
Vulnerability Analysis / 3.2.1:
Vulnerability Analysis for HTTP / 3.3:
XSS Attack / 4.1:
Prevention against Cross Site Scripting Attacks / 4.2.1:
Vulnerability Protection / 4.2.1.1:
SQL Injection Attacks / 4.3:
SQL Injection Case Study / 4.3.1:
Preventive Measures / 4.3.2:
SQL injection in Oracle Data base / 4.3.2.1:
Stored Procedures / 4.3.2.2.1:
Remote Detection for Oracle Database / 4.3.2.2.2:
Other Preventive Measures / 4.3.3:
Preventive Measures by developers / 4.3.3.1:
MS DoS Device Name Vulnerability / 4.4:
Prevention from DoS Device Name Vulnerability / 4.4.1:
False Positive in HTTP / 4.5:
Evasion of HTTP Signatures / 4.6:
Vulnerability Analysis for DNS and DHCP / 4.7:
Introduction of DNS Protocol / 5.1:
Vulnerabilities in a DNS Protocol / 5.1.1:
DNS Cache Poisoning / 5.1.1.1:
Redirection Attack / 5.1.1.2:
Buffer Overflow Vulnerability / 5.1.1.3:
DNS Man in the Middle Attack or DNS Hijacking / 5.1.1.4:
DNS Amplification Attack / 5.1.1.5:
False Positives in a DNS Protocol / 5.1.2:
Introduction of DHCP / 5.2:
Vulnerabilities in DHCP / 5.2.1:
Client Masquerading / 5.2.1.1:
Flooding / 5.2.1.2:
Client Misconfiguration / 5.2.1.3:
Theft of Service / 5.2.1.4:
Packet Altercation / 5.2.1.5:
Key Exposure / 5.2.1.6:
Key Distribution / 5.2.1.7:
Protocol Agreement Issues / 5.2.1.8:
False Positive in DHCP / 5.2.2:
Vulnerability Analysis for LDAP and SNMP / 5.3:
ASN and BER Encoding / 6.1:
BER implementation for LDAP / 6.3:
Threat Analysis for Directory Services / 6.3.1:
SNMP / 6.4:
Vulnerability Analysis for SNMP / 6.4.1:
Vulnerability Analysis for RPC / 6.5:
RPC Message Protocol / 7.1:
NDR Format / 7.3:
Port Mapper / 7.4:
False Positive for SMB RPC Protocol / 7.5:
Evasion in RPC / 7.6:
Multiple Binding UUID / 7.6.1:
Fragment Data across many Requests / 7.6.2:
Bind to one UUID then alter Context / 7.6.3:
Prepend an ObjectID / 7.6.4:
Bind with an authentication field / 7.6.5:
One packet UDP function call / 7.6.6:
Endianess Selection / 7.6.7:
Chaining SMB commands / 7.6.8:
Out of order chaining / 7.6.9:
Chaining with random data in between commands / 7.6.10:
Unicode and non-Unicode evasion / 7.6.11:
SMB CreateAndX Path Names / 7.6.12:
Malware / 7.7:
Malware Naming Convention / 8.1:
Worms / 8.2.1:
Trojans / 8.2.2:
Spyware & Adware / 8.2.3:
Malware Threat Analysis / 8.3:
Creating controlled Environment / 8.3.1:
Confinement with the Hard Virtual Machines / 8.3.1.1:
Confinement with the Soft Virtual Machines / 8.3.1.2:
Confinement with Jails and Chroot / 8.3.1.3:
Confinement with System call Sensors / 8.3.1.4:
Confinement with System call Spoofing / 8.3.1.5:
Behavioral Analysis / 8.3.2:
Code Analysis / 8.3.3:
Root Kits / 8.4:
User and Kernel Mode Communication / 8.4.1:
I/O Request Packets (IRP) / 8.4.2:
Interrupt Descriptor Table / 8.4.3:
Service Descriptor Table / 8.4.4:
Direct Kernel Object Manipulation / 8.4.5:
Detection of Rootkits / 8.4.6:
Spyware / 8.5:
Methods of Spyware installation and propagation / 8.5.1:
Drive- By- Downloads / 8.5.1.1:
Bundling / 8.5.1.2:
From Other Spyware / 8.5.1.3:
Security Holes / 8.5.1.4:
Iframe Exploit / 8.5.2:
IE .chm File processing Vulnerability / 8.5.2.2:
Internet Code Download Link / 8.5.2.3:
Anti Spyware Signature Development / 8.5.3:
Vulnerability Signature / 8.5.3.1:
CLSID Data base / 8.5.3.2:
Spyware Specific Signature / 8.5.3.3:
Information Stealing / 8.5.3.4:
Preventing Information from being sent as emails / 8.5.3.5:
Reverse Engineering / 8.6:
Anti Reversing Technique / 9.1:
Anti Disassembly / 9.2.1:
Linear Sweep Disassembler / 9.2.1.1:
Recursive Traversal Disassembler / 9.2.1.2:
Evasion Technique for Disasembler / 9.2.1.3:
Self-Modifying Code / 9.2.2:
Virtual Machine Obfuscation / 9.2.3:
Anti Debugging Technique / 9.3:
Break Points / 9.3.1:
Software break point / 9.3.1.1:
Hardware break point / 9.3.1.2:
Detection of Breakpoint / 9.3.1.3:
Virtual Machine Detection / 9.4:
Checking finger print / 9.4.1:
Checking system tables / 9.4.2:
Checking processor instruction set / 9.4.3:
Unpacking / 9.5:
Manual unpacking of malware / 9.5.1:
Finding an original entry point of an executable / 9.5.1.1:
Taking memory Dump / 9.5.1.2:
Import Table Reconstruction / 9.5.1.3:
Import redirection and code emulation / 9.5.1.4:
Index / 9.6:
Wireless Security / 1.0:
Introduction / 1.1:
Wired Equivalent Privacy protocol / 1.2:
8.

電子ブック

EB
Zoya Ignatova, Israel Mart?nez-P?rez
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
References
Theoretical Computer Science / 2:
Graphs / 2.1:
Basic Notions / 2.1.1:
Paths and Cycles / 2.1.2:
Closures and Paths / 2.1.3:
Trees / 2.1.4:
Bipartite Graphs / 2.1.5:
Finite State Automata / 2.2:
Strings and Languages / 2.2.1:
Deterministic Finite State Automata / 2.2.2:
Non-Deterministic Finite State Automata / 2.2.3:
Regular Expressions / 2.2.4:
Stochastic Finite State Automata / 2.2.5:
Computability / 2.3:
Turing Machines / 2.3.1:
Universal Turing Machines / 2.3.2:
Church's Thesis / 2.3.3:
Register Machines / 2.3.4:
Cellular Automata / 2.3.5:
Formal Grammars / 2.4:
Grammars and Languages / 2.4.1:
Chomsky's Hierarchy / 2.4.2:
Grammars and Machines / 2.4.3:
Undecidability / 2.4.4:
Combinatorial Logic / 2.5:
Boolean Circuits / 2.5.1:
Compound Circuits / 2.5.2:
Minterms and Maxterms / 2.5.3:
Canonical Circuits / 2.5.4:
Adder Circuits / 2.5.5:
Computational Complexity / 2.6:
Time Complexity / 2.6.1:
Infinite Asymptotics / 2.6.2:
Decision Problems / 2.6.3:
Optimization Problems / 2.6.4:
Molecular Biology / 3:
DNA / 3.1:
Molecular Structure / 3.1.1:
Manipulation of DNA / 3.1.2:
Physical Chemistry / 3.2:
Thermodynamics / 3.2.1:
Chemical Kinetics / 3.2.2:
DNA Annealing Kinetics / 3.2.3:
Strand Displacement Kinetics / 3.2.4:
Stochastic Chemical Kinetics / 3.2.5:
Genes / 3.3:
Structure and Biosynthesis / 3.3.1:
DNA Recombination / 3.3.2:
Genomes / 3.3.3:
Gene Expression / 3.4:
Protein Biosynthesis / 3.4.1:
Proteins - Molecular Structure / 3.4.2:
Enzymes / 3.4.3:
Cells and Organisms / 3.5:
Eukaryotes and Prokaryotes / 3.5.1:
Viruses / 3.6:
General Structure and Classification / 3.6.1:
Applications / 3.6.2:
Word Design for DNA Computing / 4:
Constraints / 4.1:
Free Energy and Melting Temperature / 4.1.1:
Distance / 4.1.2:
Similarity / 4.1.3:
DNA Languages / 4.2:
Bond-Free Languages / 4.2.1:
Hybridization Properties / 4.2.2:
Small DNA Languages / 4.2.3:
DNA Code Constructions and Bounds / 4.3:
Reverse and Reverse-Complement Codes / 4.3.1:
Constant GC-Content Codes / 4.3.2:
Similarity-Based Codes / 4.3.3:
In Vitro Random Selection / 4.4:
General Selection Model / 4.4.1:
Selective Word Design / 4.4.2:
Concluding Remarks
Non-Autonomous DNA Models / 5:
Seminal Work / 5.1:
Adleman's First Experiment / 5.1.1:
Lipton's First Paper / 5.1.2:
Filtering Models / 5.2:
Memory-Less Filtering / 5.2.1:
Memory-Based Filtering / 5.2.2:
Mark-and-Destroy Filtering / 5.2.3:
Split-and-Merge Filtering / 5.2.4:
Filtering by Blocking / 5.2.5:
Surface-Based Filtering / 5.2.6:
Sticker Systems / 5.3:
Sticker Machines / 5.3.1:
Combinatorial Libraries / 5.3.2:
Useful Subroutines / 5.3.3:
NP-Complete Problems / 5.3.4:
Splicing Systems / 5.4:
Basic Splicing Systems / 5.4.1:
Recursively Enumerable Splicing Systems / 5.4.2:
Universal Splicing Systems / 5.4.3:
Recombinant Systems / 5.4.4:
Autonomous DNA Models / 6:
Algorithmic Self-Assembly / 6.1:
Self-Assembly / 6.1.1:
DNA Graphs / 6.1.2:
Linear Self-Assembly / 6.1.3:
Tile Assembly / 6.1.4:
Finite State Automaton Models / 6.2:
Two-State Two-Symbol Automata / 6.2.1:
Length-Encoding Automata / 6.2.2:
Sticker Automata / 6.2.3:
Stochastic Automata / 6.2.4:
DNA Hairpin Model / 6.3:
Whiplash PCR / 6.3.1:
Satisfiability / 6.3.2:
Hamiltonian Paths / 6.3.3:
Maximum Cliques / 6.3.4:
Hairpin Structures / 6.3.5:
Computational Models / 6.4:
Neural Networks / 6.4.1:
Tic-Tac-Toe Networks / 6.4.2:
Logic Circuits / 6.4.3:
Cellular DNA Computing / 6.4.4:
Ciliate Computing / 7.1:
Ciliates / 7.1.1:
Models of Gene Assembly / 7.1.2:
Intramolecular String Model / 7.1.3:
Intramolecular Graph Model / 7.1.4:
Intermolecular String Model / 7.1.5:
Biomolecular Computing / 7.2:
Gene Therapy / 7.2.1:
Anti-Sense Technology / 7.2.2:
Cell-Based Finite State Automata / 7.3:
Anti-Sense Finite State Automata / 7.4:
Basic Model / 7.4.1:
Diagnostic Rules / 7.4.2:
Diagnosis and Therapy / 7.4.3:
Computational Genes / 7.5:
Index / 7.5.1:
Introduction / 1:
References
Theoretical Computer Science / 2:
9.

電子ブック

EB
Zoya Ignatova, Israel Martínez-Pérez, Karl-Heinz Zimmermann
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
References
Theoretical Computer Science / 2:
Graphs / 2.1:
Basic Notions / 2.1.1:
Paths and Cycles / 2.1.2:
Closures and Paths / 2.1.3:
Trees / 2.1.4:
Bipartite Graphs / 2.1.5:
Finite State Automata / 2.2:
Strings and Languages / 2.2.1:
Deterministic Finite State Automata / 2.2.2:
Non-Deterministic Finite State Automata / 2.2.3:
Regular Expressions / 2.2.4:
Stochastic Finite State Automata / 2.2.5:
Computability / 2.3:
Turing Machines / 2.3.1:
Universal Turing Machines / 2.3.2:
Church's Thesis / 2.3.3:
Register Machines / 2.3.4:
Cellular Automata / 2.3.5:
Formal Grammars / 2.4:
Grammars and Languages / 2.4.1:
Chomsky's Hierarchy / 2.4.2:
Grammars and Machines / 2.4.3:
Undecidability / 2.4.4:
Combinatorial Logic / 2.5:
Boolean Circuits / 2.5.1:
Compound Circuits / 2.5.2:
Minterms and Maxterms / 2.5.3:
Canonical Circuits / 2.5.4:
Adder Circuits / 2.5.5:
Computational Complexity / 2.6:
Time Complexity / 2.6.1:
Infinite Asymptotics / 2.6.2:
Decision Problems / 2.6.3:
Optimization Problems / 2.6.4:
Molecular Biology / 3:
DNA / 3.1:
Molecular Structure / 3.1.1:
Manipulation of DNA / 3.1.2:
Physical Chemistry / 3.2:
Thermodynamics / 3.2.1:
Chemical Kinetics / 3.2.2:
DNA Annealing Kinetics / 3.2.3:
Strand Displacement Kinetics / 3.2.4:
Stochastic Chemical Kinetics / 3.2.5:
Genes / 3.3:
Structure and Biosynthesis / 3.3.1:
DNA Recombination / 3.3.2:
Genomes / 3.3.3:
Gene Expression / 3.4:
Protein Biosynthesis / 3.4.1:
Proteins - Molecular Structure / 3.4.2:
Enzymes / 3.4.3:
Cells and Organisms / 3.5:
Eukaryotes and Prokaryotes / 3.5.1:
Viruses / 3.6:
General Structure and Classification / 3.6.1:
Applications / 3.6.2:
Word Design for DNA Computing / 4:
Constraints / 4.1:
Free Energy and Melting Temperature / 4.1.1:
Distance / 4.1.2:
Similarity / 4.1.3:
DNA Languages / 4.2:
Bond-Free Languages / 4.2.1:
Hybridization Properties / 4.2.2:
Small DNA Languages / 4.2.3:
DNA Code Constructions and Bounds / 4.3:
Reverse and Reverse-Complement Codes / 4.3.1:
Constant GC-Content Codes / 4.3.2:
Similarity-Based Codes / 4.3.3:
In Vitro Random Selection / 4.4:
General Selection Model / 4.4.1:
Selective Word Design / 4.4.2:
Concluding Remarks
Non-Autonomous DNA Models / 5:
Seminal Work / 5.1:
Adleman's First Experiment / 5.1.1:
Lipton's First Paper / 5.1.2:
Filtering Models / 5.2:
Memory-Less Filtering / 5.2.1:
Memory-Based Filtering / 5.2.2:
Mark-and-Destroy Filtering / 5.2.3:
Split-and-Merge Filtering / 5.2.4:
Filtering by Blocking / 5.2.5:
Surface-Based Filtering / 5.2.6:
Sticker Systems / 5.3:
Sticker Machines / 5.3.1:
Combinatorial Libraries / 5.3.2:
Useful Subroutines / 5.3.3:
NP-Complete Problems / 5.3.4:
Splicing Systems / 5.4:
Basic Splicing Systems / 5.4.1:
Recursively Enumerable Splicing Systems / 5.4.2:
Universal Splicing Systems / 5.4.3:
Recombinant Systems / 5.4.4:
Autonomous DNA Models / 6:
Algorithmic Self-Assembly / 6.1:
Self-Assembly / 6.1.1:
DNA Graphs / 6.1.2:
Linear Self-Assembly / 6.1.3:
Tile Assembly / 6.1.4:
Finite State Automaton Models / 6.2:
Two-State Two-Symbol Automata / 6.2.1:
Length-Encoding Automata / 6.2.2:
Sticker Automata / 6.2.3:
Stochastic Automata / 6.2.4:
DNA Hairpin Model / 6.3:
Whiplash PCR / 6.3.1:
Satisfiability / 6.3.2:
Hamiltonian Paths / 6.3.3:
Maximum Cliques / 6.3.4:
Hairpin Structures / 6.3.5:
Computational Models / 6.4:
Neural Networks / 6.4.1:
Tic-Tac-Toe Networks / 6.4.2:
Logic Circuits / 6.4.3:
Cellular DNA Computing / 6.4.4:
Ciliate Computing / 7.1:
Ciliates / 7.1.1:
Models of Gene Assembly / 7.1.2:
Intramolecular String Model / 7.1.3:
Intramolecular Graph Model / 7.1.4:
Intermolecular String Model / 7.1.5:
Biomolecular Computing / 7.2:
Gene Therapy / 7.2.1:
Anti-Sense Technology / 7.2.2:
Cell-Based Finite State Automata / 7.3:
Anti-Sense Finite State Automata / 7.4:
Basic Model / 7.4.1:
Diagnostic Rules / 7.4.2:
Diagnosis and Therapy / 7.4.3:
Computational Genes / 7.5:
Index / 7.5.1:
Introduction / 1:
References
Theoretical Computer Science / 2:
10.

図書

図書
Oded Goldreich
出版情報: Cambridge : Cambridge University Press, 2008  xxiv, 606 p. ; 27 cm
所蔵情報: loading…
目次情報: 続きを見る
List of Figures
Preface
Organization and Chapter Summaries
Acknowledgments
Introduction and Preliminaries / 1:
Introduction / 1.1:
A Brief Overview of Complexity Theory / 1.1.1:
Characteristics of Complexity Theory / 1.1.2:
Contents of This Book / 1.1.3:
Approach and Style of This Book / 1.1.4:
Standard Notations and Other Conventions / 1.1.5:
Computational Tasks and Models / 1.2:
Representation / 1.2.1:
Computational Tasks / 1.2.2:
Uniform Models (Algorithms) / 1.2.3:
Non-uniform Models (Circuits and Advice) / 1.2.4:
Complexity Classes / 1.2.5:
Chapter Notes
P, NP, and NP-Completeness / 2:
The P Versus NP Question / 2.1:
The Search Version: Finding Versus Checking / 2.1.1:
The Decision Version: Proving Versus Verifying / 2.1.2:
Equivalence of the Two Formulations / 2.1.3:
Two Technical Comments Regarding NP / 2.1.4:
The Traditional Definition of NP / 2.1.5:
In Support of P Different from NP / 2.1.6:
Philosophical Meditations / 2.1.7:
Polynomial-Time Reductions / 2.2:
The General Notion of a Reduction / 2.2.1:
Reducing Optimization Problems to Search Problems / 2.2.2:
Self-Reducibility of Search Problems / 2.2.3:
Digest and General Perspective / 2.2.4:
NP-Completeness / 2.3:
Definitions / 2.3.1:
The Existence of NP-Complete Problems / 2.3.2:
Some Natural NP-Complete Problems / 2.3.3:
NP Sets That Are Neither in P nor NP-Complete / 2.3.4:
Reflections on Complete Problems / 2.3.5:
Three Relatively Advanced Topics / 2.4:
Promise Problems / 2.4.1:
Optimal Search Algorithms for NP / 2.4.2:
The Class coNP and Its Intersection with NP / 2.4.3:
Exercises
Variations on P and NP / 3:
Non-uniform Polynomial Time (P/poly) / 3.1:
Boolean Circuits / 3.1.1:
Machines That Take Advice / 3.1.2:
The Polynomial-Time Hierarchy (PH) / 3.2:
Alternation of Quantifiers / 3.2.1:
Non-deterministic Oracle Machines / 3.2.2:
The P/poly Versus NP Question and PH / 3.2.3:
More Resources, More Power? / 4:
Non-uniform Complexity Hierarchies / 4.1:
Time Hierarchies and Gaps / 4.2:
Time Hierarchies / 4.2.1:
Time Gaps and Speedup / 4.2.2:
Space Hierarchies and Gaps / 4.3:
Space Complexity / 5:
General Preliminaries and Issues / 5.1:
Important Conventions / 5.1.1:
On the Minimal Amount of Useful Computation Space / 5.1.2:
Time Versus Space / 5.1.3:
Circuit Evaluation / 5.1.4:
Logarithmic Space / 5.2:
The Class L / 5.2.1:
Log-Space Reductions / 5.2.2:
Log-Space Uniformity and Stronger Notions / 5.2.3:
Undirected Connectivity / 5.2.4:
Non-deterministic Space Complexity / 5.3:
Two Models / 5.3.1:
NL and Directed Connectivity / 5.3.2:
A Retrospective Discussion / 5.3.3:
PSPACE and Games / 5.4:
Randomness and Counting / 6:
Probabilistic Polynomial Time / 6.1:
Basic Modeling Issues / 6.1.1:
Two-Sided Error: The Complexity Class BPP / 6.1.2:
One-Sided Error: The Complexity Classes RP and coRP / 6.1.3:
Zero-Sided Error: The Complexity Class ZPP / 6.1.4:
Randomized Log-Space / 6.1.5:
Counting / 6.2:
Exact Counting / 6.2.1:
Approximate Counting / 6.2.2:
Searching for Unique Solutions / 6.2.3:
Uniform Generation of Solutions / 6.2.4:
The Bright Side of Hardness / 7:
One-Way Functions / 7.1:
Generating Hard Instances and One-Way Functions / 7.1.1:
Amplification of Weak One-Way Functions / 7.1.2:
Hard-Core Preicates / 7.1.3:
Reflections on Hardness Amplification / 7.1.4:
Hard Problems in E / 7.2:
Amplification with Respect to Polynomial-Size Circuits / 7.2.1:
Amplification with Respect to Exponential-Size Circuits / 7.2.2:
Pseudorandom Generators / 8:
The General Paradigm / 8.1:
General-Purpose Pseudorandom Generators / 8.2:
The Basic Definition / 8.2.1:
The Archetypical Application / 8.2.2:
Computational Indistinguishability / 8.2.3:
Amplifying the Stretch Function / 8.2.4:
Constructions / 8.2.5:
Non-uniformly Strong Pseudorandom Generators / 8.2.6:
Stronger Notions and Conceptual Reflections / 8.2.7:
Derandomization of Time-Complexity Classes / 8.3:
Defining Canonical Derandomizers / 8.3.1:
Constructing Canonical Derandomizers / 8.3.2:
Technical Variations and Conceptual Reflections / 8.3.3:
Space-Bounded Distinguishers / 8.4:
Definitional Issues / 8.4.1:
Two Constructions / 8.4.2:
Special-Purpose Generators / 8.5:
Pairwise Independence Generators / 8.5.1:
Small-Bias Generators / 8.5.2:
Random Walks on Expanders / 8.5.3:
Probabilistic Proof Systems / 9:
Interactive Proof Systems / 9.1:
Motivation and Perspective / 9.1.1:
Definition / 9.1.2:
The Power of Interactive Proofs / 9.1.3:
Variants and Finer Structure: An Overview / 9.1.4:
On Computationally Bounded Provers: An Overview / 9.1.5:
Zero-Knowledge Proof Systems / 9.2:
The Power of Zero-Knowledge / 9.2.1:
Proofs of Knowledge - A Parenthetical Subsection / 9.2.3:
Probabilistically Checkable Proof Systems / 9.3:
The Power of Probabilistically Checkable Proofs / 9.3.1:
PCP and Approximation / 9.3.3:
More on PCP Itself: An Overview / 9.3.4:
Relaxing the Requirements / 10:
Approximation / 10.1:
Search or Optimization / 10.1.1:
Decision or Property Testing / 10.1.2:
Average-Case Complexity / 10.2:
The Basic Theory / 10.2.1:
Ramifications / 10.2.2:
Epilogue
Glossary of Complexity Classes / Appendix A:
Preliminaries / A.1:
Algorithm-Based Classes / A.2:
Time Complexity Classes / A.2.1:
Space Complexity Classes / A.2.2:
Circuit-Based Classes / A.3:
On the Quest for Lower Bounds / Appendix B:
Boolean Circuit Complexity / B.1:
Basic Results and Questions / B.2.1:
Monotone Circuits / B.2.2:
Bounded-Depth Circuits / B.2.3:
Formula Size / B.2.4:
Arithmetic Circuits / B.3:
Univariate Polynomials / B.3.1:
Multivariate Polynomials / B.3.2:
Proof Complexity / B.4:
Logical Proof Systems / B.4.1:
Algebraic Proof Systems / B.4.2:
Geometric Proof Systems / B.4.3:
On the Foundations of Modern Cryptography / Appendix C:
The Underlying Principles / C.1:
The Computational Model / C.1.2:
Organization and Beyond / C.1.3:
Computational Difficulty / C.2:
Hard-Core Predicates / C.2.1:
Pseudorandomness / C.3:
Pseudorandom Functions / C.3.1:
Zero-Knowledge / C.4:
The Simulation Paradigm / C.4.1:
The Actual Definition / C.4.2:
A General Result and a Generic Application / C.4.3:
Definitional Variations and Related Notions / C.4.4:
Encryption Schemes / C.5:
Beyond Eavesdropping Security / C.5.1:
Signatures and Message Authentication / C.6:
General Cryptographic Protocols / C.6.1:
The Definitional Approach and Some Models / C.7.1:
Some Known Results / C.7.2:
Construction Paradigms and Two Simple Protocols / C.7.3:
Concluding Remarks / C.7.4:
Probabilistic Preliminaries and Advanced Topics in Randomization / Appendix D:
Probabilistic Preliminaries / D.1:
Notational Conventions / D.1.1:
Three Inequalities / D.1.2:
Hashing / D.2:
The Leftover Hash Lemma / D.2.1:
Sampling / D.3:
Formal Setting / D.3.1:
Known Results / D.3.2:
Hitters / D.3.3:
Randomnes Extractors / D.4:
Definitions and Various Perspectives / D.4.1:
Explicit Constructions / D.4.2:
Error-Correcting Codes / E.1:
Basic Notions / E.1.1:
A Few Popular Codes / E.1.2:
Two Additional Computational Problems / E.1.3:
A List-Decoding Bound / E.1.4:
Expander Graphs / E.2:
Definitions and Properties / E.2.1:
Some Omitted Proofs / E.2.2:
Proving That PH Reduces to #P / F.1:
Proving That IP(f) [characters not reproducible] AM(O(f)) [characters not reproducible] AM(f) / F.2:
Emulating General Interactive Proofs by AM-Games / F.2.1:
Linear Speedup for AM / F.2.2:
Some Computational Problems / Appendix G:
Graphs / G.1:
Boolean Formulae / G.2:
Finite Fields, Polynomials, and Vector Spaces / G.3:
The Determinant and the Permanent / G.4:
Primes and Composite Numbers / G.5:
Bibliography
Index
List of Figures
Preface
Organization and Chapter Summaries
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼