close
1.

図書

図書
edited with translation and explanatory notes by S.D. Joshi and J.A.F. Roodbergen
出版情報: Poona : University of Poona, 1973  xxiv, 52, 269 p. ; 25 cm
シリーズ名: Publications of the Centre of Advanced Study in Sanskrit ; class C ; no. 7
所蔵情報: loading…
2.

図書

図書
Thomas Barkowsky
出版情報: Berlin ; Tokyo : Springer, c2002  x, 174 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2541 . Lecture notes in artificial intelligence
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Mental Processing of Geographic Knowledge / 1.1:
Cognitive Maps / 1.1.1:
Mental Construction of Spatial Knowledge: An Example / 1.1.2:
Theses and Assumptions / 1.2:
Knowledge Construction and Human Memory / 1.2.1:
Characteristics of Geographic Knowledge / 1.2.2:
Spatial Knowledge Organization in Long-Term Memory / 1.2.3:
Visual Mental Images and Diagrammatic Reasoning / 1.2.4:
Research Questions and Goals / 1.3:
Research Questions / 1.3.1:
Goals / 1.3.2:
Approach: Experimental Computational Modeling / 1.4:
Computational Cognition / 1.4.1:
Building Computational Models / 1.4.2:
Modeling as Experimental Approach / 1.4.3:
Organization of this Thesis / 1.5:
State of the Art / 2:
Spatial Knowledge Conceptions: Cognitive Maps and Other Metaphors / 2.1:
Rubber Sheet Maps, Cognitive Atlases, Collages, and Geographic Information Systems / 2.1.1:
Spatial Mental Models / 2.1.3:
Other Conceptions / 2.1.4:
Human Memory / 2.2:
Working Memory / 2.2.1:
Long-Term Memory / 2.2.2:
Interacting Memory Systems in Mental Imagery / 2.2.3:
Mental Imagery / 2.3:
The Imagery Debate / 2.3.1:
Psychological and Neuroscientific Foundations / 2.3.2:
The Kosslyn Models / 2.3.3:
The 1980 Model / 2.3.3.1:
The 1994 Model / 2.3.3.2:
Spatial Reasoning / 2.4:
Topology / 2.4.1:
Orientation / 2.4.2:
Distance / 2.4.3:
Shape / 2.4.4:
Computational Geometry / 2.4.5:
Diagrammatic Reasoning / 2.5:
Propositional vs. Analogical Knowledge Representation / 2.5.1:
Types of Diagrammatic Reasoning Systems / 2.5.2:
Examples for Diagrammatic Reasoning Architectures / 2.5.3:
DEPIC-2D / 2.5.3.1:
WHISPER / 2.5.3.2:
Computational Imagery / 2.5.3.3:
Summary / 2.6:
MIRAGE - Developing the Model / 3:
Characteristics of the Model / 3.1:
Evaluating the Working Memory Representation / 3.1.1:
MIRAGE - Outline of the Model / 3.2:
Types of Entities and Spatial Relations in MIRAGE / 3.3:
Entities / 3.3.1:
Relations / 3.3.2:
Subsystems, Structures, and Processes / 3.4:
Long-Term Memory Activation / 3.4.1:
Spatial Knowledge Fragments / 3.4.1.1:
The Hierarchical Long-Term Memory Representation / 3.4.1.2:
The Access Process / 3.4.1.3:
The Activated Long-Term Memory Representation / 3.4.1.4:
The Construction Process / 3.4.1.5:
Visual Mental Image Construction / 3.4.2:
The Enriched Representation / 3.4.2.1:
The Conversion Process / 3.4.2.2:
The Visual Buffer / 3.4.2.3:
The Visualization Process / 3.4.2.4:
Image Inspection / 3.4.3:
The Inspection Result / 3.4.3.1:
The Inspection Process / 3.4.3.2:
Visual Mental Image Construction in Detail / 4:
A More Demanding Scenario / 4.1:
Diagrammatic Representations of Lean Knowledge / 4.2:
Consequences for Image Construction / 4.3:
Relaxation of Spatial Constraints / 4.3.1:
Completion of Qualitative Spatial Relations / 4.3.2:
Interpretation of Qualitative Spatial Relations / 4.3.3:
Image Revision Strategies in MIRAGE / 4.4:
Unstable Images / 4.4.1:
Omission of Facts / 4.4.2:
Revision of Relational Completion / 4.4.3:
Variation of Relational Completion / 4.4.3.1:
Relaxation of Relational Completion / 4.4.3.2:
Revision of Image Specification / 4.4.4:
Depicting Qualitative Spatial Relations / 4.4.4.1:
Depicting Unspecified Spatial Relations / 4.4.4.2:
MIRAGE Implementation / 4.5:
Computational Tools for Modeling: SIMSIS / 5.1:
The Idea of SIMSIS / 5.1.1:
The Aspect Map Model / 5.1.1.1:
Modeling Aspect Maps in SIMSIS / 5.1.1.2:
Depictions, Scenarios, and Interpretations / 5.1.2:
SIMSIS Pictures / 5.1.2.1:
SIMSIS Facts and Scenarios / 5.1.2.2:
SIMSIS Interpretations and Meaning Systems / 5.1.2.3:
Realization of the Model / 5.2:
MIRAGE Structures / 5.2.1:
Entities, Relations, and Spatial Knowledge Fragments / 5.2.1.1:
The Long-Term Memory Representations / 5.2.1.2:
MIRAGE Processes / 5.2.1.3:
The Long-Term Memory Activation Processes / 5.2.2.1:
The Image Construction Processes / 5.2.2.2:
Operation and Behavior of MIRAGE / 5.2.2.3:
Conclusion and Outlook / 6:
Results and Discussion / 6.1:
Reflecting the Theses / 6.2.1:
Spatial Knowledge Construction / 6.2.1.1:
Underdeterminacy in Long-Term Memory / 6.2.1.2:
Fragmentation and Hierarchical Organization / 6.2.1.3:
Visual Mental Imagery / 6.2.1.4:
The Parameters of the Model / 6.2.2:
Explicit Parameters / 6.2.2.1:
Implicit Parameters / 6.2.2.2:
Conclusions / 6.2.3:
Future Work / 6.3:
Extending MIRAGE / 6.3.1:
Geographic Entities and Spatial Relations / 6.3.1.1:
Partially Aggregated Knowledge Structures / 6.3.1.2:
Mental Imagery Functionality / 6.3.1.3:
Parameters of MIRAGE / 6.3.1.4:
Empirical Investigations / 6.3.2:
Use of Default Knowledge / 6.3.2.1:
Control of Image Construction / 6.3.2.2:
Processing Capacity for Mental Images / 6.3.2.3:
Use of Chunking Facilities / 6.3.2.4:
Combination of Propositional and Image-Based Reasoning / 6.3.2.5:
Application Perspectives / 6.3.3:
Adequate Presentation of Visual Information / 6.3.3.1:
External Support of Reasoning in Mental Images / 6.3.3.2:
Bibliography
Index
Introduction / 1:
Mental Processing of Geographic Knowledge / 1.1:
Cognitive Maps / 1.1.1:
3.

図書

図書
[редакция ... В.Г. Озерова ... и др.]
出版情報: Москва : "Книга", 1927-  v. ; 27 cm
所蔵情報: loading…
4.

図書

図書
Joseph Wang
出版情報: New York, N.Y. : VCH, c1994  xi, 198 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Abbreviations and Symbols
Fundamental Concepts / 1:
Why Electroanalysis? / 1.1:
Faradaic Processes / 1.2:
Mass-Transport-Controlled Reactions / 1.2.1:
Potential-Step Experiment / 1.2.1.1:
Potential-Sweep Experiments / 1.2.1.2:
Reactions Controlled by the Rate of Electron Transfer / 1.2.2:
Activated Complex Theory / 1.2.2.1:
Electrical Double Layer / 1.3:
Electrocapillary Effect / 1.4:
Supplementary Reading / 1.5:
Problems
References
Study of Electrode Reactions and Interfacial Properties / 2:
Cyclic Voltammetry / 2.1:
Data Interpretation / 2.1.1:
Reversible Systems / 2.1.1.1:
Irreversible and Quasi-reversible Systems / 2.1.1.2:
Study of Reaction Mechanisms / 2.1.2:
Study of Adsorption Processes / 2.1.3:
Quantitative Applications / 2.1.4:
Spectroelectrochemistry / 2.2:
Experimental Arrangement / 2.2.1:
Principles and Applications / 2.2.2:
Electrochemiluminescence / 2.2.3:
Optical Probing of Electrode-Solution Interfaces / 2.2.4:
Scanning Probe Microscopy / 2.3:
Scanning Tunneling Microscopy / 2.3.1:
Atomic Force Microscopy / 2.3.2:
Scanning Electrochemical Microscopy / 2.3.3:
Electrochemical Quartz Crystal Microbalance / 2.4:
Impedance Spectroscopy / 2.5:
Examples
Controlled-Potential Techniques / 3:
Chronoamperometry / 3.1:
Polarography / 3.2:
Pulse Voltammetry / 3.3:
Normal-Pulse Voltammetry / 3.3.1:
Differential-Pulse Voltammetry / 3.3.2:
Square-Wave Voltammetry / 3.3.3:
Staircase Voltammetry / 3.3.4:
AC Voltammetry / 3.4:
Stripping Analysis / 3.5:
Anodic Stripping Voltammetry / 3.5.1:
Potentiometric Stripping Analysis / 3.5.2:
Adsorptive Stripping Voltammetry and Potentiometry / 3.5.3:
Cathodic Stripping Voltammetry / 3.5.4:
Abrasive Stripping Voltammetry / 3.5.5:
Applications / 3.5.6:
Flow Analysis / 3.6:
Principles / 3.6.1:
Cell Design / 3.6.2:
Mass Transport and Current Response / 3.6.3:
Detection Modes / 3.6.4:
Practical Considerations / 4:
Electrochemical Cells / 4.1:
Solvents and Supporting Electrolytes / 4.2:
Oxygen Removal / 4.3:
Instrumentation / 4.4:
Working Electrodes / 4.5:
Mercury Electrodes / 4.5.1:
Solid Electrodes / 4.5.2:
Rotating Disk and Rotating Ring Disk Electrodes / 4.5.2.1:
Carbon Electrodes / 4.5.2.2:
Glassy Carbon Electrodes / 4.5.2.2.1:
Carbon Paste Electrodes / 4.5.2.2.2:
Carbon Fiber Electrodes / 4.5.2.2.3:
Diamond Electrodes / 4.5.2.2.4:
Metal Electrodes / 4.5.2.3:
Chemically Modified Electrodes / 4.5.3:
Self-Assembled Monolayers / 4.5.3.1:
Carbon-Nanotube-Modified Electrodes / 4.5.3.2:
Sol-gel Encapsulation of Reactive Species / 4.5.3.3:
Electrocatalytically Modified Electrodes / 4.5.3.4:
Preconcentrating Electrodes / 4.5.3.5:
Permselective Coatings / 4.5.3.6:
Conducting Polymers / 4.5.3.7:
Microelectrodes / 4.5.4:
Diffusion at Microelectrodes / 4.5.4.1:
Microelectrode Configurations / 4.5.4.2:
Composite Electrodes / 4.5.4.3:
Potentiometry / 5:
Principles of Potentiometric Measurements / 5.1:
Ion-Selective Electrodes / 5.2:
Glass Electrodes / 5.2.1:
pH Electrodes / 5.2.1.1:
Glass Electrodes for Other Cations / 5.2.1.2:
Liquid Membrane Electrodes / 5.2.2:
Ion Exchanger Electrodes / 5.2.2.1:
Neutral Carrier Electrodes / 5.2.2.2:
Solid-State Electrodes / 5.2.3:
Coated-Wire Electrodes and Solid-State Electrodes Without an Internal Filling Solution / 5.2.4:
On-line, On-site, and In Vivo Potentiometric Measurements / 5.3:
Electrochemical Sensors / 6:
Electrochemical Biosensors / 6.1:
Enzyme-Based Electrodes / 6.1.1:
Practical and Theoretical Considerations / 6.1.1.1:
Enzyme Electrodes of Analytical Significance / 6.1.1.2:
Glucose Sensors / 6.1.1.2.1:
Preface
Abbreviations and Symbols
Fundamental Concepts / 1:
5.

図書

図書
text, translation and notes by J.A.F. Roodbergen ; edited by S.D. Joshi
出版情報: Poona : University of Poona, 1974  lxix, 72, 252 p. ; 25 cm
シリーズ名: Publications of the Centre of Advanced Study in Sanskrit ; class C ; no. 9
所蔵情報: loading…
6.

図書

図書
Michael Beetz
出版情報: Berlin : Springer, 2000  xvi, 213 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1772 . Lecture notes in artificial intelligence
所蔵情報: loading…
目次情報: 続きを見る
Abstract
Acknowledgements
List of Figures
Introduction / 1:
The Approach / 1.1:
Technical Challenges / 1.2:
Introductory Example / 1.3:
Motivation / 1.4:
Relevance for Autonomous Robot Control / 1.4.1:
Relevance for AI Planning / 1.4.2:
The Computational Problem and Its Solution / 1.5:
The Computational Problem / 1.5.1:
The Computational Model / 1.5.2:
Contributions / 1.6:
Outline of the Book / 1.7:
Reactivity / 2:
The DeliveryWorld / 2.1:
The World / 2.1.1:
Commands and Jobs / 2.1.2:
The Robot / 2.1.3:
Justification of the DeliveryWorld / 2.1.4:
The Implementation of Routine Activities / 2.2:
Plan Steps vs. Concurrent Control Processes / 2.2.1:
Interfacing Continuous Control Processes / 2.2.2:
Coordinating Control Processes / 2.2.3:
Synchronization of Concurrent Control Threads / 2.2.4:
Failure Recovery / 2.2.5:
Perception / 2.2.6:
State, Memory, and World Models / 2.2.7:
The Structure of Routine Activities / 2.2.8:
The Structured Reactive Controller / 2.3:
Behavior and Planning Modules / 2.3.1:
The Body of the Structured Reactive Controller / 2.3.2:
Global Fluents, Variables, and the Plan Library / 2.3.3:
The RPL Runtime System / 2.3.4:
Summary and Discussion / 2.4:
Planning / 3:
The Structured Reactive Plan / 3.1:
Plans as Syntactic Objects / 3.1.1:
RPL as a Plan Language / 3.1.2:
The Computational Structure / 3.2:
The "Criticize-Revise" Cycle / 3.2.1:
The "Criticize" Step / 3.2.2:
The "Revise" Step / 3.2.3:
The XFRM Planning Framework / 3.3:
Anticipation and Forestalling of Behavior Flaws / 3.4:
The Detection of Behavior Flaws / 3.4.1:
Behavior Flaws and Plan Revisions / 3.4.2:
The Diagnosis of Behavior Flaws / 3.4.3:
Transparent Reactive Plans / 3.5:
Declarative Statements / 4.1:
RPL Construct Descriptions / 4.1.1:
Achievement Goals / 4.1.2:
Perceptions / 4.1.3:
Beliefs / 4.1.4:
Other Declarative Statements / 4.1.5:
Using Declarative Statements / 4.1.6:
Routine Plans / 4.2:
The Plan Library / 4.3:
Behavior Modules / 4.3.1:
Low-level Plans / 4.3.2:
High-level Plans / 4.3.3:
Discussion / 4.4:
Representing Plan Revisions / 5:
Conceptualization / 5.1:
Making Inferences / 5.2:
Some Examples / 5.2.1:
Accessing Code Trees / 5.2.2:
Predicates on Plan Interpretations / 5.2.3:
Predicates on Timelines / 5.2.4:
Timelines and Plan Interpretation / 5.2.5:
Expressing Plan Revisions / 5.3:
XFRML - The Implementation / 5.4:
Forestalling Behavior Flaws / 5.5:
FAUST / 6.1:
The Behavior Critic / 6.1.1:
Detecting Behavior Flaws: Implementation / 6.1.2:
Diagnosing the Causes of Behavior Flaws: Implementation / 6.1.3:
The Bug Class "Behavior-Specification Violation" / 6.1.4:
The Elimination of Behavior Flaws / 6.1.5:
The Plan Revisions for the Example / 6.2:
Some Behavior Flaws and Their Revisions / 6.3:
Perceptual Confusion / 6.3.1:
Missed Deadlines / 6.3.2:
Planning Ongoing Activities / 6.4:
Extending RPL / 7.1:
The RUNTIME-PLAN Statement / 7.1.1:
Plan Swapping / 7.1.2:
Making Planning Assumptions / 7.1.3:
Deliberative Controllers / 7.2:
Improving Iterative Plans by Local Planning / 7.2.1:
Plan Execution a la Shakey / 7.2.2:
Execution Monitoring and Replanning / 7.2.3:
Recovering from Execution Failures / 7.2.4:
Some Robot Control Architectures / 7.2.5:
The Controller in the Experiment / 7.3:
Evaluation / 7.4:
Analysis of the Problem / 8.1:
Assessment of the Method / 8.2:
Description of the Method / 8.2.1:
Evaluation of the Method / 8.2.2:
Demonstration / 8.3:
Evaluating SRCs in Standard Situations / 8.3.1:
Comparing SRCs with the Appropriate Fixed Controller179 / 8.3.2:
Problems that Require SRCs / 8.3.3:
Related Work / 8.4:
Control Architectures for Competent Physical Agents / 8.4.1:
Control Languages for Reactive Control / 8.4.2:
Robot Planning / 8.4.3:
Conclusion / 9:
What Do Structured Reactive Controllers Do? / 9.1:
Why Do Structured Reactive Controllers Work? / 9.2:
Do Structured Reactive Controllers Work for Real Robots? / 9.3:
References
Abstract
Acknowledgements
List of Figures
7.

図書

図書
Bernhard Westfechtel
出版情報: Berlin ; Tokyo : Springer, c1999  xiv, 418 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1646
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Part I:
Development Processes / 1:
Management / 1.2:
Definition / 1.2.1:
Managerial and Technical Level / 1.2.2:
Products, Activities, and Resources / 1.2.3:
Tools for Managing Development Processes / 1.3:
Management, System: Structure and Functionality / 1.3.1:
Scope of the Management System / 1.3.2:
Models for Managing Development Processes / 1.4:
Process Models / 1.4.1:
Models as Tool Specifications / 1.4.2:
Dynamics of Development Processes / 1.5:
Comparison to Other Business Domains / 1.5.1:
Dynamics at the Instance Level / 1.5.2:
Dynamics at the Definition Level / 1.5.3:
Approach and Contributions / 1.6:
Overall Approach / 1.6.1:
Context of Research / 1.6.2:
Models / 1.6.3:
Formal Specification / 1.6.4:
Tools / 1.6.5:
Related Work / 1.7:
Overview / 1.7.1:
Management of Development Processes: State of the Art / Part II:
Process Management / 2:
Product Management / 2.1:
Documents and Configurations / 2.1.1:
Version Control / 2.1.2:
Workspace Management / 2.1.3:
Activity Management / 2.2:
Modeling of Activities / 2.2.1:
Functions of Activity Management / 2.2.3:
Tools for Activity Management / 2.2.4:
Resource Management / 2.3:
Human Resources / 2.3.1:
Computer Resources / 2.3.2:
Conclusion / 2.4:
Functions of Product Management / 3:
Models for Product Management / 3.2:
Product Space / 3.2.1:
Version Space / 3.2.2:
Interplay of Product Space and Version Space / 3.2.3:
Construction of Versions / 3.2.4:
Workspaces / 3.2.5:
Tools for Product Management / 3.3:
System Descriptions / 3.3.1:
Universe of Discourse / 3.4:
Functions and Objectives of Process Management. / 4.1.1:
Characterization of Development Processes / 4.1.2:
Models for Activity Management / 4.2:
Conceptual Framework / 4.2.1:
Process Meta Models / 4.2.2:
Product Development / 4.2.3:
Management of Human Resources / 4.3:
Models for Human Resource Management / 5.1.1:
Tools for Human Resource Management / 5.1.2:
Management of Computer Resources / 5.2:
Tool Integration / 5.3:
Tool Integration: Classification and Overview / 6.1:
Tool Integration Technologies / 6.2:
A Management System for Mechanical Engineering / 6.3:
The SUKITS Project / 7:
Overview of the SUKITS Project / 7.1:
Motivation / 7.1.1:
Goals / 7.1.2:
Application Domain / 7.1.3:
Project Structure and Results / 7.1.4:
The SUKITS Approach to Process Management / 7.2:
Contributions / 7.2.1:
Management Models / 7.2.2:
Management Tools / 7.2.3:
Management Model: Informal Description / 7.3:
Product Management Model / 8.1:
Documents, Dependencies, and Configurations / 8.1.1:
Versions and Versioned Objects / 8.1.2:
Version and Configuration Graphs / 8.1.3:
Consistency Control and Data Integration / 8.1.4:
Activity Management Model / 8.2:
Product-Centered Activity Management / 8.2.1:
Process Dynamics / 8.2.2:
Resource Management Model / 8.3:
Integration of Formal and Informal Cooperation / 8.4:
Management Model: Formal Specification / 8.5:
PROGRES at a First Glance / 9.1:
Graph Schema / 9.2:
Graph Transformations / 9.2.2:
Model Adaptation / 9.3:
Adaptation in SUKITS / 9.5.1:
PROGRES Specification of Model Adaptation / 9.5.2:
Discussion / 9.6:
Specification-in-the-Small / 9.6.1:
Specification-in-the-Large / 9.6.2:
Management System / 9.7:
Tools: Functionality and User Interface / 10.1:
Management Environment / 10.1.1:
Modeling Environment / 10.1.2:
Work Environment / 10.1.3:
Realization / 10.2:
Communication and Distribution / 10.2.1:
Applications, Experiences, and Evaluation / 10.3:
SUKITS Prototypes / 11.1:
Demonstration: Development of a Drill / 11.2:
Demo Steps / 11.2.1:
Evaluation / 11.3:
ManagementModel / 11.3.1:
Applications / 11.3.2:
Toward an Adaptable Environment for Modeling and Managing Development Processes / 11.4:
Dimensions of Management / 12:
Model Architecture / 12.1.2:
Limitations of the SUKITS Approach / 12.1.3:
Modeling of Management Configurations / 12.2:
Architectural Issues / 12.2.1:
Models for Managing Products, Activities, and Resources / 12.2.2:
PROGRES Environment / 12.3:
Process Support Environment / 12.3.4:
Dynamic Task Nets / 12.4:
Informal Description / 13.1:
Structure of Task Nets / 13.1.1:
Levels of Modeling / 13.1.2:
Behavior of Task Nets / 13.1.3:
Examples / 13.1.4:
Base Model / 13.2:
Standard Behavior / 13.2.2:
Structural Adaptation / 13.2.3:
Behavioral Adaptation / 13.2.4:
Net-based approaches / 13.2.5:
Rule-based approaches / 13.3.2:
State-based approaches / 13.3.3:
Procedural approaches / 13.3.4:
Unified Multi-Project Resource Management / 13.4:
Features of RESMOD / 14.1:
Resources / 14.1.2:
Resource Configurations / 14.1.3:
Plan and Actual Resources / 14.1.4:
Base and Project Resources / 14.1.5:
Task Assignments / 14.1.6:
Layer 1: Resource Hierarchies / 14.2:
Layer 2: Actual and Required Resources / 14.2.2:
Layer 3: Base and Project Resources / 14.2.3:
Object-Oriented Process Modeling / 14.2.4:
Meta Process / 15.1:
Process Analysis / 15.3:
Process Specification / 15.4:
Structural Modeling / 15.4.1:
Model Structuring / 15.4.2:
Behavioral Modeling / 15.4.3:
Environment Generation / 15.5:
Lessons Learned / 15.6:
Current Status and Future Work / 15.7:
Management Model / 16.1:
Modeling Languages / 16.2:
Glossary / 16.3:
References
Index
Introduction / Part I:
Development Processes / 1:
Management / 1.2:
8.

図書

図書
Sung Joon Ahn
出版情報: Berlin : Springer, c2004  xx, 125 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3151
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Curves and Surfaces in Space / 1.1:
Mathematical Description / 1.1.1:
Rigid Body Motion of Model Features in Space / 1.1.2:
Model Hierarchy / 1.1.3:
Curve and Surface Fitting / 1.2:
Applications of Curve and Surface Fitting / 1.2.1:
Algebraic Fitting Vs. Geometric Fitting / 1.2.2:
State-of-the-Art Orthogonal Distance Fitting / 1.2.3:
ISO 10360-6 and Requirements of CMM Software Tools / 1.2.4:
Least-Squares Orthogonal Distance Fitting / 2:
Moment Method for Line and Plane Fitting / 2.1:
Line Fitting / 2.1.1:
Plane Fitting / 2.1.2:
Relationship Between Line and Plane Fitting / 2.1.3:
Generalized Orthogonal Distance Fitting / 2.2:
Problem Definition / 2.2.1:
Point-to-Point Matching / 2.2.2:
Template Matching / 2.2.3:
Orthogonal Distance Fitting Algorithms / 2.3:
Distance-Based Algorithm / 2.3.1:
Coordinate-Based Algorithm / 2.3.2:
Model Fitting with Parameter Constraints / 2.3.3:
Parameter Test / 2.3.4:
Application to Circle and Sphere Fitting / 2.3.5:
Orthogonal Distance Fitting of Implicit Curves and Surfaces / 3:
Minimum Distance Point / 3.1:
Generalized Newton Method / 3.1.1:
Method of Lagrangian Multipliers / 3.1.2:
Verification of the Minimum Distance Point / 3.1.3:
Acceleration of Finding the Minimum Distance Point / 3.1.4:
Orthogonal Distance Fitting / 3.2:
Comparison of the Two Algorithms / 3.2.1:
Fitting Examples / 3.3:
Superellipse Fitting / 3.3.1:
Cone Fitting / 3.3.2:
Torus Fitting / 3.3.3:
Superellipsoid Fitting / 3.3.4:
Orthogonal Distance Fitting of Parametric Curves and Surfaces / 4:
Newton Method / 4.1:
Levenberg-MarquardtAlgorithm / 4.1.2:
Initial Values / 4.1.3:
Algorithm I (ETH) / 4.1.4:
Algorithm II (NPL, FhG) / 4.2.2:
Algorithm III (FhG) / 4.2.3:
Comparison of the Three Algorithms / 4.2.4:
Helix Fitting / 4.3:
Ellipsoid Fitting / 4.3.2:
Object Reconstruction from Unordered Point Cloud / 5:
Applications of Object Reconstruction / 5.1:
Semi-automatic Object Recognition / 5.2:
Segmentation, Outlier Elimination, and Model Fitting / 5.2.1:
Domain Volume for Measurement Points / 5.2.2:
Experimental Results with Real 3-D Measurement Points / 5.3:
3-D Point Cloud from Stripe Projection Method / 5.3.1:
3-D Point Cloud from Laser Radar / 5.3.2:
Conclusions / 6:
Summary / 6.1:
Future Work / 6.2:
References
Index
Implementation Examples / A:
Implicit 2-D Ellipse (Chap.3) / A.1:
Parametric 3-D Ellipse (Chap.4) / A.2:
CMM Software Tools Fulfilling ISO 10360-6 / B:
Curves and Surfaces Defined in ISO 10360-6 / B.1:
Competent Parameterization / B.1.1:
Role of the Mass Center / B.1.2:
Rotation Matrix / B.1.3:
Parameter Range / B.1.4:
Minimum Distance Point and FHG/XHG Matrix / B.2:
2-D Line / B.2.1:
3-D Line / B.2.2:
Plane / B.2.3:
2-D Circle / B.2.4:
3-D Circle / B.2.5:
Sphere / B.2.6:
Cylinder / B.2.7:
Cone / B.2.8:
Torus / B.2.9:
FHG Matrix of Superellipse and Superellipsoid / C:
Superellipse / C.1:
Superellipsoid / C.2:
Introduction / 1:
Curves and Surfaces in Space / 1.1:
Mathematical Description / 1.1.1:
9.

図書

図書
Larry L. Peterson & Bruce S. Davie
出版情報: San Francisco, Calif. : Morgan Kaufmann Publishers, c2000  xxvi, 748 p. ; 25 cm
シリーズ名: The Morgan Kaufmann series in networking
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Foreword to the First Edition
Preface / Chapter 1:
Foundation
Direct Link Networks / 1:
Problem: Building a Network / Chapter 3:
Packet Switching
Internetworking / 1.1:
Applications
End-to-End Protocols / Chapter 5:
Requirements / Chapter 6:
Congestion Control & Resource Allocation
End-to-end Data / 1.2.1:
Connectivity
Security / Chapter 8:
Cost-Effective Resource Sharing / Chapter 9:
Support for Common Services / 1.2.3:
Network Architecture / 1.3:
Layering and Protocols / 1.3.1:
OSI Architecture / 1.3.2:
Internet Architecture / 1.3.3:
Implementing Network Software / 1.4:
Application Programming Interface (Sockets) / 1.4.1:
Example Application / 1.4.2:
Protocol Implementation Issues / 1.4.3:
Performance / 1.5:
Bandwidth and Latency / 1.5.1:
Delay x Bandwidth Product / 1.5.2:
High-Speed Networks / 1.5.3:
Application Performance Needs / 1.5.4:
Summary / 1.6:
Open Issue: Ubiquitous Networking
Further Reading
Exercises
Problem: Physically Connecting Hosts / 2:
Hardware Building Blocks / 2.1:
Nodes / 2.1.1:
Links / 2.1.2:
Encoding (NRZ, NRZI, Manchester, 4B/5B) / 2.2:
Framing / 2.3:
Byte-Oriented Protocols (BISYNC, PPP, DDCMP) / 2.3.1:
Bit-Oriented Protocols (HDLC) / 2.3.2:
Clock-Based Framing (SONET) / 2.3.3:
Error Detection / 2.4:
Two-Dimensional Parity / 2.4.1:
Internet Checksum Algorithm / 2.4.2:
Cyclic Redundancy Check / 2.4.3:
Reliable Transmission / 2.5:
Stop-and-Wait / 2.5.1:
Sliding Window / 2.5.2:
Concurrent Logical Channels / 2.5.3:
Ethernet (802.3) / 2.6:
Physical Properties / 2.6.1:
Access Protocol / 2.6.2:
Experience with Ethernet / 2.6.3:
Token Rings (802.5, FDDI) / 2.7:
Token Ring Media Access Control / 2.7.1:
Token Ring Maintenance / 2.7.3:
Frame Format / 2.7.4:
FDDI / 2.7.5:
Wireless (802.11) / 2.8:
Collision Avoidance / 2.8.1:
Distribution System / 2.8.3:
Network Adaptors / 2.8.4:
Components / 2.9.1:
View from the Host / 2.9.2:
Memory Bottleneck / 2.9.3:
Open Issue: Does It Belong in Hardware? / 2.10:
Problem: Not All Networks Are Directly Connected / 3:
Switching and Forwarding / 3.1:
Datagrams / 3.1.1:
Virtual Circuit Switching / 3.1.2:
Source Routing / 3.1.3:
Bridges and LAN Switches / 3.2:
Learning Bridges / 3.2.1:
Spanning Tree Algorithm / 3.2.2:
Broadcast and Multicast / 3.2.3:
Limitations of Bridges / 3.2.4:
Cell Switching (ATM) / 3.3:
Cells / 3.3.1:
Segmentation and Reassembly / 3.3.2:
Virtual Paths / 3.3.3:
Physical Layers for ATM / 3.3.4:
ATM in the LAN / 3.3.5:
Implementation and Performance / 3.4:
Ports / 3.4.1:
Fabrics / 3.4.2:
Open Issue: The Future of ATM / 3.5:
Problem: There Is More Than One Network / 4:
Simple Internetworking (IP) / 4.1:
What Is an Internetwork? / 4.1.1:
Service Model / 4.1.2:
Global Addresses / 4.1.3:
Datagram Forwarding in IP / 4.1.4:
Address Translation (ARP) / 4.1.5:
Host Configuration (DHCP) / 4.1.6:
Error Reporting (ICMP) / 4.1.7:
Virtual Networks and Tunnels / 4.1.8:
Routing / 4.2:
Network as a Graph / 4.2.1:
Distance Vector (RIP) / 4.2.2:
Link State (OSPF) / 4.2.3:
Metrics / 4.2.4:
Routing for Mobile Hosts / 4.2.5:
Global Internet / 4.3:
Subnetting / 4.3.1:
Classless Routing (CIDR) / 4.3.2:
Interdomain Routing (BGP) / 4.3.3:
Routing Areas / 4.3.4:
IP Version 6 (IPv6) / 4.3.5:
Multicast / 4.4:
Link-State Multicast / 4.4.1:
Distance-Vector Multicast / 4.4.2:
Protocol Independent Multicast (PIM) / 4.4.3:
Multiprotocol Label Switching (MPLS) / 4.5:
Destination-Based Forwarding / 4.5.1:
Explicit Routing / 4.5.2:
Virtual Private Networks and Tunnels / 4.5.3:
Open Issue: Deployment of IPV6 / 4.6:
Problem: Getting Processess to Communicate / 5:
Simple Demultiplexer (UDP) / 5.1:
Reliable Byte Stream (TCP) / 5.2:
End-to-End Issues / 5.2.1:
Segment Format / 5.2.2:
Connection Establishment and Termination / 5.2.3:
Sliding Window Revisited / 5.2.4:
Triggering Transmission / 5.2.5:
Adaptive Retransmission / 5.2.6:
Record Boundaries / 5.2.7:
TCP Extensions / 5.2.8:
Alternative Design Choices / 5.2.9:
Remote Procedure Call / 5.3:
Bulk Transfer (BLAST) / 5.3.1:
Request/Reply (CHAN) / 5.3.2:
Dispatcher (SELECT) / 5.3.3:
Putting It All Together (SunRPC, DCE) / 5.3.4:
Open Issue: Application-Specific Protocols / 5.4:
Congestion Control and Resource Allocation / 6:
Problem: Allocating Resources
Issues in Resource Allocation / 6.1:
Network Model / 6.1.1:
Taxonomy / 6.1.2:
Evaluation Criteria / 6.1.3:
Queuing Disciplines / 6.2:
FIFO / 6.2.1:
Fair Queuing / 6.2.2:
TCP Congestion Control / 6.3:
Additive Increase/Multiplicative Decrease / 6.3.1:
Slow Start / 6.3.2:
Fast Retransmit and Fast Recovery / 6.3.3:
Congestion-Avoidance Mechanisms / 6.4:
DECbit / 6.4.1:
Random Early Detection (RED) / 6.4.2:
Source-Based Congestion Avoidance / 6.4.3:
Quality of Service / 6.5:
Application Requirements / 6.5.1:
Integrated Services (RSVP) / 6.5.2:
Differentiated Services (EF, AF) / 6.5.3:
ATM Quality of Service / 6.5.4:
Equation-Based Congestion Control / 6.5.5:
Open Issue: Inside versus Outside the Network / 6.6:
End-to-End Data / 7:
Problem: What Do We Do with the Data?
Presentation Formatting / 7.1:
Examples (XDR, ASN. 1, NDR) / 7.1.1:
Markup Languages (XML) / 7.1.3:
Data Compression / 7.2:
Lossless Compression Algorithms / 7.2.1:
Image Compression (JPEG) / 7.2.2:
Video Compression (MPEG) / 7.2.3:
Transmitting MPEG over a Network / 7.2.4:
Audio Compression (MP3) / 7.2.5:
Open Issue: Computer Networks Meet Consumer Electronics / 7.3:
Network Security / 8:
Problem: Securing the Data
Cryptographic Algorithms / 8.1:
Secret Key Encryption (DES) / 8.1.1:
Public Key Encryption (RSA) / 8.1.3:
Message Digest Algorithms (MD5) / 8.1.4:
Security Mechanisms / 8.1.5:
Authentication Protocols / 8.2.1:
Message Integrity Protocols / 8.2.2:
Public Key Distribution (X.509) / 8.2.3:
Example Systems / 8.3:
Pretty Good Privacy (PGP) / 8.3.1:
Secure Shell (SSH) / 8.3.2:
Transport Layer Security (TLS, SSL, HTTPS) / 8.3.3:
IP Security (IPSEC) / 8.3.4:
Firewalls / 8.4:
Filter-Based Firewalls / 8.4.1:
Proxy-Based Firewalls / 8.4.2:
Limitations / 8.4.3:
Open Issue: Denial-of-Service Attacks / 8.5:
Problem: Applications Need Their Own Protocols / 9:
Name Service (DNS) / 9.1:
Domain Hierarchy / 9.1.1:
Name Servers / 9.1.2:
Name Resolution / 9.1.3:
Traditional Applications / 9.2:
Electronic Mail (SMTP, MIME, IMAP) / 9.2.1:
World Wide Web (HTTP) / 9.2.2:
Network Management (SNMP) / 9.2.3:
Multimedia Applications / 9.3:
Real-time Transport Protocol (RTP) / 9.3.1:
Session Control and Call Control (SDP, SIP, H.323) / 9.3.2:
Overlay Networks / 9.4:
Routing Overlays / 9.4.1:
Peer-to-Peer Networks / 9.4.2:
Content Distribution Networks / 9.4.3:
Open Issue: New Network Artichitecture / 9.5:
Glossary
Bibliography
Solutions to Selected Exercises
Index
About the Authors
Foreword
Foreword to the First Edition
Preface / Chapter 1:
10.

図書

図書
Larry L. Peterson & Bruce S. Davie
出版情報: San Francisco, Calif. : Morgan Kaufmann Publishers, c1996  xxiii, 552 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Foreword to the First Edition
Preface / Chapter 1:
Foundation
Direct Link Networks / 1:
Problem: Building a Network / Chapter 3:
Packet Switching
Internetworking / 1.1:
Applications
End-to-End Protocols / Chapter 5:
Requirements / Chapter 6:
Congestion Control & Resource Allocation
End-to-end Data / 1.2.1:
Connectivity
Security / Chapter 8:
Cost-Effective Resource Sharing / Chapter 9:
Support for Common Services / 1.2.3:
Network Architecture / 1.3:
Layering and Protocols / 1.3.1:
OSI Architecture / 1.3.2:
Internet Architecture / 1.3.3:
Implementing Network Software / 1.4:
Application Programming Interface (Sockets) / 1.4.1:
Example Application / 1.4.2:
Protocol Implementation Issues / 1.4.3:
Performance / 1.5:
Bandwidth and Latency / 1.5.1:
Delay x Bandwidth Product / 1.5.2:
High-Speed Networks / 1.5.3:
Application Performance Needs / 1.5.4:
Summary / 1.6:
Open Issue: Ubiquitous Networking
Further Reading
Exercises
Problem: Physically Connecting Hosts / 2:
Hardware Building Blocks / 2.1:
Nodes / 2.1.1:
Links / 2.1.2:
Encoding (NRZ, NRZI, Manchester, 4B/5B) / 2.2:
Framing / 2.3:
Byte-Oriented Protocols (BISYNC, PPP, DDCMP) / 2.3.1:
Bit-Oriented Protocols (HDLC) / 2.3.2:
Clock-Based Framing (SONET) / 2.3.3:
Error Detection / 2.4:
Two-Dimensional Parity / 2.4.1:
Internet Checksum Algorithm / 2.4.2:
Cyclic Redundancy Check / 2.4.3:
Reliable Transmission / 2.5:
Stop-and-Wait / 2.5.1:
Sliding Window / 2.5.2:
Concurrent Logical Channels / 2.5.3:
Ethernet (802.3) / 2.6:
Physical Properties / 2.6.1:
Access Protocol / 2.6.2:
Experience with Ethernet / 2.6.3:
Token Rings (802.5, FDDI) / 2.7:
Token Ring Media Access Control / 2.7.1:
Token Ring Maintenance / 2.7.3:
Frame Format / 2.7.4:
FDDI / 2.7.5:
Wireless (802.11) / 2.8:
Collision Avoidance / 2.8.1:
Distribution System / 2.8.3:
Network Adaptors / 2.8.4:
Components / 2.9.1:
View from the Host / 2.9.2:
Memory Bottleneck / 2.9.3:
Open Issue: Does It Belong in Hardware? / 2.10:
Problem: Not All Networks Are Directly Connected / 3:
Switching and Forwarding / 3.1:
Datagrams / 3.1.1:
Virtual Circuit Switching / 3.1.2:
Source Routing / 3.1.3:
Bridges and LAN Switches / 3.2:
Learning Bridges / 3.2.1:
Spanning Tree Algorithm / 3.2.2:
Broadcast and Multicast / 3.2.3:
Limitations of Bridges / 3.2.4:
Cell Switching (ATM) / 3.3:
Cells / 3.3.1:
Segmentation and Reassembly / 3.3.2:
Virtual Paths / 3.3.3:
Physical Layers for ATM / 3.3.4:
ATM in the LAN / 3.3.5:
Implementation and Performance / 3.4:
Ports / 3.4.1:
Fabrics / 3.4.2:
Open Issue: The Future of ATM / 3.5:
Problem: There Is More Than One Network / 4:
Simple Internetworking (IP) / 4.1:
What Is an Internetwork? / 4.1.1:
Service Model / 4.1.2:
Global Addresses / 4.1.3:
Datagram Forwarding in IP / 4.1.4:
Address Translation (ARP) / 4.1.5:
Host Configuration (DHCP) / 4.1.6:
Error Reporting (ICMP) / 4.1.7:
Virtual Networks and Tunnels / 4.1.8:
Routing / 4.2:
Network as a Graph / 4.2.1:
Distance Vector (RIP) / 4.2.2:
Link State (OSPF) / 4.2.3:
Metrics / 4.2.4:
Routing for Mobile Hosts / 4.2.5:
Global Internet / 4.3:
Subnetting / 4.3.1:
Classless Routing (CIDR) / 4.3.2:
Interdomain Routing (BGP) / 4.3.3:
Routing Areas / 4.3.4:
IP Version 6 (IPv6) / 4.3.5:
Multicast / 4.4:
Link-State Multicast / 4.4.1:
Distance-Vector Multicast / 4.4.2:
Protocol Independent Multicast (PIM) / 4.4.3:
Multiprotocol Label Switching (MPLS) / 4.5:
Destination-Based Forwarding / 4.5.1:
Explicit Routing / 4.5.2:
Virtual Private Networks and Tunnels / 4.5.3:
Open Issue: Deployment of IPV6 / 4.6:
Problem: Getting Processess to Communicate / 5:
Simple Demultiplexer (UDP) / 5.1:
Reliable Byte Stream (TCP) / 5.2:
End-to-End Issues / 5.2.1:
Segment Format / 5.2.2:
Connection Establishment and Termination / 5.2.3:
Sliding Window Revisited / 5.2.4:
Triggering Transmission / 5.2.5:
Adaptive Retransmission / 5.2.6:
Record Boundaries / 5.2.7:
TCP Extensions / 5.2.8:
Alternative Design Choices / 5.2.9:
Remote Procedure Call / 5.3:
Bulk Transfer (BLAST) / 5.3.1:
Request/Reply (CHAN) / 5.3.2:
Dispatcher (SELECT) / 5.3.3:
Putting It All Together (SunRPC, DCE) / 5.3.4:
Open Issue: Application-Specific Protocols / 5.4:
Congestion Control and Resource Allocation / 6:
Problem: Allocating Resources
Issues in Resource Allocation / 6.1:
Network Model / 6.1.1:
Taxonomy / 6.1.2:
Evaluation Criteria / 6.1.3:
Queuing Disciplines / 6.2:
FIFO / 6.2.1:
Fair Queuing / 6.2.2:
TCP Congestion Control / 6.3:
Additive Increase/Multiplicative Decrease / 6.3.1:
Slow Start / 6.3.2:
Fast Retransmit and Fast Recovery / 6.3.3:
Congestion-Avoidance Mechanisms / 6.4:
DECbit / 6.4.1:
Random Early Detection (RED) / 6.4.2:
Source-Based Congestion Avoidance / 6.4.3:
Quality of Service / 6.5:
Application Requirements / 6.5.1:
Integrated Services (RSVP) / 6.5.2:
Differentiated Services (EF, AF) / 6.5.3:
ATM Quality of Service / 6.5.4:
Equation-Based Congestion Control / 6.5.5:
Open Issue: Inside versus Outside the Network / 6.6:
End-to-End Data / 7:
Problem: What Do We Do with the Data?
Presentation Formatting / 7.1:
Examples (XDR, ASN. 1, NDR) / 7.1.1:
Markup Languages (XML) / 7.1.3:
Data Compression / 7.2:
Lossless Compression Algorithms / 7.2.1:
Image Compression (JPEG) / 7.2.2:
Video Compression (MPEG) / 7.2.3:
Transmitting MPEG over a Network / 7.2.4:
Audio Compression (MP3) / 7.2.5:
Open Issue: Computer Networks Meet Consumer Electronics / 7.3:
Network Security / 8:
Problem: Securing the Data
Cryptographic Algorithms / 8.1:
Secret Key Encryption (DES) / 8.1.1:
Public Key Encryption (RSA) / 8.1.3:
Message Digest Algorithms (MD5) / 8.1.4:
Security Mechanisms / 8.1.5:
Authentication Protocols / 8.2.1:
Message Integrity Protocols / 8.2.2:
Public Key Distribution (X.509) / 8.2.3:
Example Systems / 8.3:
Pretty Good Privacy (PGP) / 8.3.1:
Secure Shell (SSH) / 8.3.2:
Transport Layer Security (TLS, SSL, HTTPS) / 8.3.3:
IP Security (IPSEC) / 8.3.4:
Firewalls / 8.4:
Filter-Based Firewalls / 8.4.1:
Proxy-Based Firewalls / 8.4.2:
Limitations / 8.4.3:
Open Issue: Denial-of-Service Attacks / 8.5:
Problem: Applications Need Their Own Protocols / 9:
Name Service (DNS) / 9.1:
Domain Hierarchy / 9.1.1:
Name Servers / 9.1.2:
Name Resolution / 9.1.3:
Traditional Applications / 9.2:
Electronic Mail (SMTP, MIME, IMAP) / 9.2.1:
World Wide Web (HTTP) / 9.2.2:
Network Management (SNMP) / 9.2.3:
Multimedia Applications / 9.3:
Real-time Transport Protocol (RTP) / 9.3.1:
Session Control and Call Control (SDP, SIP, H.323) / 9.3.2:
Overlay Networks / 9.4:
Routing Overlays / 9.4.1:
Peer-to-Peer Networks / 9.4.2:
Content Distribution Networks / 9.4.3:
Open Issue: New Network Artichitecture / 9.5:
Glossary
Bibliography
Solutions to Selected Exercises
Index
About the Authors
Foreword
Foreword to the First Edition
Preface / Chapter 1:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼