close
1.

電子ブック

EB
Colin Walls
出版情報: Elsevier ScienceDirect Books , Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
What Makes an Embedded Application Tick? / 1:
Memory in Embedded Systems / 2:
Memory Architectures / 3:
How Software Influences Hardware Design / 4:
Migrating your Software to a New Processor Architecture / 5:
Embedded Software for Transportation Applications / 6:
How to Choose a CPU for Your SoC Design / 7:
An Introduction to USB Software / 8:
Towards USB 3.0 / 9:
What Makes an Embedded Application Tick? / 1:
Memory in Embedded Systems / 2:
Memory Architectures / 3:
2.

電子ブック

EB
Magnus Olsson, Catherine Mulligan, Magnus Olsson
出版情報: Elsevier ScienceDirect Books , Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
List of Abbreviations
Introduction - Background and Vision of EPC / Part I:
Mobile Broadband and the Core Network Evolution / Chapter 1:
A Global Standard / 1.1:
Origins of the Evolved Packet Core / 1.2:
3GPP Radio Access Technologies / 1.2.1:
3GPP2 Radio Access Technologies / 1.2.2:
SAE - Building Bridges Between Different Networks / 1.2.3:
A Shifting Value Chain / 1.3:
Terminology Used in This Book / 1.4:
Overview of EPS / Part II:
Architecture Overview / Chapter 2:
EPS Architecture / 2.1:
Basic LP Connectivity Over LTE Access / 2.1.1:
Adding More Advanced Functionality for LTE Access / 2.1.2:
Interworking Between LTE and GSM/GPRS or WCDMA/HSPA / 2.1.3:
Support for 3GPP Voice Services / 2.1.4:
Interworking Between LTE and CDMA Networks / 2.1.5:
Interworking Between 3GPP Access Technologies and Non-3GPP Access Technologies / 2.1.6:
Support for Broadcasting in Cellular Networks / 2.1.7:
Positioning Services / 2.1.8:
Optimizations for Small Cells and Local Access / 2.1.9:
Miscellaneous Features / 2.1.10:
Summary of the Architecture Overview / 2.1.11:
Mobile Network Radio Technologies / 2.2:
Overview of Radio Networks for Mobile Services / 2.2.1:
Radio Network Functionality / 2.2.2:
GSM / 2.2.3:
WCDMA / 2.2.4:
LTE / 2.2.5:
EPS Deployment Scenarios and Operator Cases / Chapter 3:
Scenario 1: Existing GSM/GPRS and/or WCDMA/HSPA Operators Deploying LTE/EPC / 3.1:
First Phase - Initial EPC Deployment / 3.1.1:
Second Phase - Integration with Existing Packet Core / 3.1.2:
Third Phase - Further Optimizations Towards the Common Core / 3.1.3:
Scenario 2: Existing CDMA Operators Deploying LTE/EPC / 3.2:
Scenario 3: New Operators Deploying LTE/EPC / 3.3:
Data Services in EPS / Chapter 4:
Messaging Services / 4.1:
Machine Type Communication / 4.2:
Industrial and Corporate Uses / 4.2.1:
Societal - M2M and Sustainable Development / 4.2.2:
Voice Services in EPS / Chapter 5:
Realization of Voice Over LTE / 5.1:
Voice Services Using IMS Technology / 5.2:
Single-Radio Voice Call Continuity (SRVCC) / 5.3:
Circuit-Switched Fallback / 5.4:
Comparing MMTel/SRVCC and CSFB / 5.5:
IMS Emergency Calls and Priority Services / 5.6:
Key Concepts and Services / Part III:
Session Management and Mobility / Chapter 6:
IP Connectivity and Session Management / 6.1:
The LP Connection / 6.1.1:
Session Management, Bearers, and QoS Aspects / 6.2:
General / 6.2.1:
The EPS Bearer for E-UTRAN Access / 6.2.2:
Session Management for EPS and GERAN/UTRAN Accesses / 6.2.3:
Session Management for Other Accesses / 6.2.4:
Subscriber Identifiers and Corresponding Legacy Identities / 6.3:
Permanent Subscriber Identifiers / 6.3.1:
Temporary Subscriber Identifiers / 6.3.2:
Relation to Subscription Identifiers in 2G/3G / 6.3.3:
Mobility Principles / 6.4:
Mobility within 3GPP Family of Accesses / 6.4.1:
Idle-Mode Signaling Reduction (ISR) / 6.4.3:
Closed Subscriber Group / 6.4.4:
Mobility Between E-UTRAN and HRPD / 6.4.5:
Generic Mobility Between 3GPP and Non-3GPP Accesses / 6.4.6:
Access Network Discovery and Selection / 6.4.7:
Interworking with Managed WLAN Networks / 6.5:
Pooling, Overload Protection, and Congestion Control / 6.6:
Security / Chapter 7:
Introduction / 7.1:
Security Services / 7.2:
Security Domains / 7.2.1:
Network Access Security / 7.3:
Access Security in E-UTRAN / 7.3.1:
Interworking with GERAN/UTRAN / 7.3.2:
Special Consideration for IMS Emergency Calls / 7.3.3:
Trusted and Untrusted Non-3GPP Accesses / 7.3.4:
Access Security in Trusted Non-3GPP Accesses / 7.3.5:
Access Security in Untrusted Non-3GPP Access / 7.3.6:
Special Considerations for Host-Based Mobility DSMIPv6 / 7.3.7:
Network Domain Security / 7.4:
User Domain Security / 7.5:
Security Aspects of Home eNBs and Home NBs / 7.6:
H(e)NB Security Architecture / 7.6.1:
Closed Subscriber Groups / 7.6.2:
Device Authentication / 7.6.3:
Hosting Party Authentication / 7.6.4:
Backhaul Link Security / 7.6.5:
Location Verification / 7.6.6:
Lawful Intercept / 7.7:
Quality of Service, Charging, and Policy Control / Chapter 8:
Quality of Service / 8.1:
QoS in E-UTRAN / 8.1.1:
QoS Aspects When Interworking with Other Accesses / 8.1.2:
Policy and Charging Control / 8.2:
The PCC Architecture / 8.2.1:
Basic PCC Concepts / 8.2.2:
Network vs. Terminal-Initiated QoS Control / 8.2.3:
PCC and Roaming / 8.2.4:
Additional PCC Features Developed Since Release 8 / 8.2.5:
PCC Support for Fixed Broadband Access / 8.2.6:
Charging / 8.3:
Selection Functions / Chapter 9:
Architecture Overview for Selection Functions / 9.1:
Selection of MME, SGSN, Serving GW, and PDN GW / 9.2:
Selection Procedure at a Glance / 9.2.1:
Use of DNS Infrastructure / 9.2.2:
MME Selection / 9.2.3:
SGSN Selection Function for EPS / 9.2.4:
GW Selection Overview / 9.2.5:
PDN GW Selection Function / 9.2.6:
Serving GW Selection Function / 9.2.7:
Handover (Non-3GPP Access) and PDN GW Selection / 9.2.8:
PCRF Selection / 9.3:
Subscriber Data Management. / Chapter 10:
Home Subscriber Server (HSS) / 10.1:
Subscriber Profile Repository (SPR) / 10.2:
User Data Convergence (UDC) / 10.3:
UDC Overall Description / 10.3.1:
Front-Ends and User Data Repository / 10.3.2:
Voice and Emergency Services / Chapter 11:
Voice Services Based on Circuit-Switched Technology / 11.1:
Voice Services with IMS Technology / 11.2:
MMTel / 11.3:
MMTel Architecture / 11.3.1:
VoLTE / 11.4:
T-ADS / 11.5:
Ensuring Service Coverage / 11.5.1:
Single Radio Voice Call Continuity (SRVCC) / 11.6:
Entities with Additional Functions to Support SRVCC / 11.6.1:
IMS Centralized Services (ICS) / 11.7:
Service Centralization and Continuity Application Server (SCC-AS) / 11.7.1:
SRVCC from E-UTRAN to GERAN or UTRAN / 11.7.2:
SRVCC from E-UTRAN to CDMA 1×RTT / 11.8:
Migration Paths and Coexistence of Circuit-Switched and VoLTE / 11.9:
EPS Emergency Bearer Service for IMS Emergency / 11.11:
Multimedia Priority Service (MPS) / 11.12:
LTE Broadcasting / Chapter 12:
Background and Main Concepts / 12.1:
MBMS Solution Overview / 12.2:
MBMS User Services / 12.3:
Associated Delivery Procedures / 12.3.1:
Mobile Network Architecture for MBMS / 12.4:
Interfaces / 12.4.1:
MBMS Bearer Services / 12.5:
Session Start / 12.5.1:
Session Stop / 12.5.2:
Session Update / 12.5.3:
Positioning / Chapter 13:
Positioning Solutions / 13.1:
Positioning Architecture and Protocols / 13.2:
Positioning Methods / 13.3:
Position-Reporting Formats / 13.4:
EPS Positioning Entities and Interfaces / 13.5:
GMLC / 13.5.1:
E-SMLC / 13.5.2:
SLP / 13.5.3:
Le Interface / 13.5.4:
SLg Interface / 13.5.5:
SLs Interface / 13.5.6:
LTE Positioning Protocol (LPP) / 13.5.7:
LTE Positioning Protocol Annex (LPPa) / 13.5.8:
Positioning Procedure / 13.6:
Offload Functions and Simultaneous Multi-Access / Chapter 14:
Offloading the 3GPP RAN - Simultaneous Multi-Access / 14.1:
Multi-Access PDN Connectivity (MAPCON) / 14.2.1:
LP Flow Mobility (LFOM) / 14.2.2:
Non-Seamless WLAN Offloading (NSWO) / 14.2.3:
Offloading the Core and Transport Network - Selected IP Traffic Offload (SLPTO) / 14.3:
Access to Local Networks - Local LP Access (LLPA) / 14.4:
The Nuts and Bolts of EPC / Part IV:
EPS Network Entities and Interfaces / Chapter 15:
Network Entities / 15.1:
eNodeB / 15.1.1:
Mobility Management Entity / 15.1.2:
Serving GW / 15.1.3:
PDN GW / 15.1.4:
Policy and Charging Rules Function / 15.1.5:
Home eNodeB Subsystem and Related Entities / 15.1.6:
Control Plane Between UE, eNodeB, and MME / 15.2:
S1-MME / 15.2.1:
GTP-Based Interfaces / 15.3:
Control Plane / 15.3.1:
MME↔MME(SIO) / 15.3.2:
MME↔Serving GW(S 11) / 15.3.3:
Serving GW↔PDN GW (S5/S8) / 15.3.4:
SGSN↔MME (S3) / 15.3.5:
SGSN↔Serving GW (S4) / 15.3.6:
SGSN↔SGSN (S16) / 15.3.7:
Trusted WLAN Access Network ↔ PDN GW (S2a) / 15.3.8:
ePDG PDN GW (S2b) / 15.3.9:
User Plane / 15.3.10:
eNodeB Serving GW (S1-U) / 15.3.11:
UE ↔ eNodeB Serving GW PDN GW (GTP-TJ) / 15.3.12:
UE ↔ BSS ↔ SGSN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.13:
UE ↔ UTRAN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.14:
UE ↔ UTRAN ↔ SGSN Serving GW ↔ PDN GW (GTP-U) / 15.3.15:
UE ↔ Trusted WLAN Access Network ↔ PDN GW (GTP-U) / 15.3.16:
UE ↔ ePDG ↔ PDN GW (GTP-U) / 15.3.17:
PMLP-Based Interfaces / 15.4:
Serving GW-PDN GW (S5/S8) / 15.4.1:
Trusted Non-3GPP IP Access-PDN GW (S2a) / 15.4.2:
ePDG-PDN GW (S2b) / 15.4.3:
DSMLPv6-Based Interfaces / 15.5:
UE-PDN GW (S2c) / 15.5.1:
HSS-Related Interfaces and Protocols / 15.6:
MME-HSS (S6a) and SGSN-HSS (S6d) / 15.6.1:
AAA-Related Interfaces / 15.7:
AAA Server-HSS (SWx) / 15.7.1:
Trusted Non-3GPP Access-3GPP AAA Server/Proxy (STa) / 15.7.3:
Untrusted Non-3GPP BP Access-3GPP AAA Server/Proxy (SWa) / 15.7.4:
ePDG-3GPP AAA Server/Proxy (SWm) / 15.7.5:
PDN GW-3GPP AAA Server/Proxy (S6b) / 15.7.6:
3GPP AAA Proxy-3GPP AAA Server/Proxy (SWd) / 15.7.7:
PCC-Related Interfaces / 15.8:
PCEF-PCRF (Gx) / 15.8.1:
BBERF-PCRF (Gxa/Gxc) / 15.8.3:
PCRF-AE (Rx) / 15.8.4:
TDF-PCRF (Sd) / 15.8.5:
OCS-PCRF (Sy) / 15.8.6:
PCRF-PCRF (S9) / 15.8.7:
BPCF-PCRF (S9a) / 15.8.8:
SPR-PCRF(Sp) / 15.8.9:
EIR-Related Interfaces / 15.9:
MME-EIR and SGSN-EIR Interfaces (S13 and S13') / 15.9.1:
I-WLAN-Related Interfaces / 15.10:
UE-ePDG (SWu) / 15.10.1:
ANDSF-Related Interfaces / 15.11:
ISMP Policy Node / 15.11.1:
Discovery Information Node / 15.11.2:
UE Location Node / 15.11.3:
ISRP Node / 15.11.4:
Ext Node / 15.11.5:
HRPD IW-Related Interfaces / 15.12:
Optimized Handover and Related Interfaces (S101 and S103) / 15.12.1:
MME ↔ eHRPD Access Network (S101) / 15.12.2:
Serving GW ↔ HSGW (S103) / 15.12.3:
Interface to External Networks / 15.13:
Functions / 15.13.1:
CSS Interface / 15.14:
MME-CSS Interface (S7a) / 15.14.1:
Protocols / Chapter 16:
GPRS Tunneling Protocol Overview / 16.1:
Protocol Structure / 16.2.1:
Control Plane (GTPv2-C) / 16.2.2:
User Plane (GTPv1-U) / 16.2.3:
Protocol Format / 16.2.4:
Mobile IP / 16.3:
Host-Based and Network-Based Mobility Mechanisms / 16.3.1:
Basic Principles of Mobile IP / 16.3.3:
Mobile IPv6 Security / 16.3.4:
Packet Format / 16.3.5:
Dual-Stack Operation / 16.3.6:
Additional MLPv6 Features - Route Optimization / 16.3.7:
Proxy Mobile IPv6 / 16.4:
Basic Principles / 16.4.1:
PMLPv6 Security / 16.4.3:
PMLPv6 Packet Format / 16.4.4:
Diameter / 16.4.5:
Background / 16.5.1:
Diameter Nodes / 16.5.2:
Diameter Sessions, Connections, and Transport / 16.5.4:
Diameter Request Routing / 16.5.5:
Peer Discovery / 16.5.6:
Diameter Message Format / 16.5.7:
Generic Routing Encapsulation / 16.6:
Basic Protocol Aspects / 16.6.1:
GRE Packet Format / 16.6.3:
S1-AP / 16.7:
Non-Access Stratum (NAS) / 16.8:
EPS Mobility Management / 16.8.1:
EPS Session Management / 16.8.2:
Message Structure / 16.8.3:
Security-Protected NAS Messages / 16.8.4:
Message Transport / 16.8.5:
Future Extensions and Backward Compatibility / 16.8.6:
IP Security / 16.9:
Encapsulated Security Payload and Authentication Header / 16.9.1:
Internet Key Exchange / 16.9.3:
IKEv2 Mobility and Multi-Homing / 16.9.4:
Extensible Authentication Protocol / 16.10:
Overview / 16.10.1:
Protocol / 16.10.2:
Stream Control Transmission Protocol / 16.11:
Basic Protocol Features / 16.11.1:
Multi-Steaming / 16.11.3:
Multi-Homing / 16.11.4:
Packet Structure / 16.11.5:
Procedures / Chapter 17:
Attachment and Detachment for E-UTRAN / 17.1:
Attachment Procedure for E-UTRAN / 17.1.1:
Detachment Procedure for E-UTRAN / 17.1.2:
Tracking Area Update for E-UTRAN / 17.2:
Tracking Area Update Procedure / 17.2.1:
TA Update with MME Change / 17.2.2:
Service Request for E-UTRAN / 17.3:
UE Triggered Service Request / 17.3.1:
Network Triggered Service Request / 17.3.2:
Intra- and Inter-3GPP Access Handover / 17.4:
Phases of the Handover Procedures / 17.4.1:
Handover Cases in EPS for 3GPP Accesses / 17.4.2:
Handover within E-UTRAN Access / 17.4.3:
Handover between E-UTRAN and Other 3GPP Accesses (GERAN, UTRAN) with S4-SGSN / 17.4.4:
Handover for Gn/Gp-Based SGSN / 17.4.5:
Handover between GERAN and UTRAN Access Using S4 SGSN and GTP/PMTP Protocol / 17.4.6:
Bearer and QoS-Related Procedures / 17.5:
Bearer Procedures for E-UTRAN / 17.5.1:
Bearer Procedures for GERAN/UTRAN / 17.5.2:
Attachment and Detachment for Non-3GPP Accesses / 17.6:
Attachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.1:
Detachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.2:
Attachment Procedure in Untrusted Non-3GPP Access Using PMJPv6 (S2b) / 17.6.3:
Detachment Procedure in Untrusted Non-3GPP Access Using PMIPv6 (S2b) / 17.6.4:
Attachment Procedure in Trusted Non-3GPP Access Using DSMTPv6 (S2c) / 17.6.5:
Detachment Procedure in Trusted Non-3GPP Access Using DSMJPv6 (S2c) / 17.6.6:
Intersystem Handover Between 3GPP and Non-3GPP Accesses / 17.7:
Details of Handover in EPS with Non-3GPP Accesses / 17.7.1:
QoS-Related Procedures in Non-3GPP Accesses / 17.8:
Conclusion and Future of EPS / Part V:
Conclusions and Looking Ahead / Chapter 18:
Standards Bodies Associated with EPS / Appendix A:
References
Index
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
3.

電子ブック

EB
David Kleidermacher, Mike Kleidermacher
出版情報: Elsevier ScienceDirect Books , Burlington : Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgements
Introduction to Embedded Systems Security / Chapter 1:
What is Security? / 1.1:
What is an Embedded System? / 1.2:
Embedded Security Trends / 1.3:
Embedded Systems Complexity / 1.3.1:
Network Connectivity / 1.3.2:
Reliance on Embedded Systems for Critical Infrastructure / 1.3.3:
Sophisticated Attackers / 1.3.4:
Processor Consolidation / 1.3.5:
Security Policies / 1.4:
Perfect Security / 1.4.1:
Confidentiality, Integrity, and Availability / 1.4.2:
Isolation / 1.4.3:
Information Flow Control / 1.4.4:
Physical Security Policies / 1.4.5:
Apphcation-Specific Policies / 1.4.6:
Security Threats / 1.5:
Case Study: VxWorks Debug Port Vulnerability / 1.5.1:
Wrap-up / 1.6:
Key Points / 1.7:
Bibliography and Notes / 1.8:
Systems Software Considerations / Chapter 2:
The Role of the Operating System / 2.1:
Multiple Independent Levels of Security / 2.2:
Information Flow / 2.2.1:
Data Isolation / 2.2.2:
Damage Limitation / 2.2.3:
Periods Processing / 2.2.4:
Always Invoked / 2.2.5:
Tamper Proof / 2.2.6:
Evaluable / 2.2.7:
Microkernel versus Monolith / 2.3:
Case Study: The Duqu Virus / 2.3.1:
Core Embedded Operating System Security Requirements / 2.4:
Memory Protection / 2.4.1:
Virtual Memory / 2.4.2:
Fault Recovery / 2.4.3:
Guaranteed Resources / 2.4.4:
Virtual Device Drivers / 2.4.5:
Impact of Determinism / 2.4.6:
Secure Scheduling / 2.4.7:
Access Control and Capabilities / 2.5:
Case Study: Secure Web Browser / 2.5.1:
Granularity versus Simplicity of Access Controls / 2.5.2:
Whitelists versus Blacklists / 2.5.3:
Confused Deputy Problem / 2.5.4:
Capabilities versus Access Control Lists / 2.5.5:
Capability Confinement and Revocation / 2.5.6:
Secure Design Using Capabilities / 2.5.7:
Hypervisors and System Virtualization / 2.6:
Introduction to System Virtualization / 2.6.1:
Applications of System Virtualization / 2.6.2:
Environment Sandboxing / 2.6.3:
Virtual Security Appliances / 2.6.4:
Hypervisor Architectures / 2.6.5:
Paravirtualization / 2.6.6:
Leveraging Hardware Assists for Virtualization / 2.6.7:
Hypervisor Security / 2.6.8:
I/O Virtualization / 2.7:
The Need for Shared I/O / 2.7.1:
Emulation / 2.7.2:
Pass-through / 2.7.3:
Shared IOMMU / 2.7.4:
IOMMUs and Virtual Device Drivers / 2.7.5:
Secure I/O Virtualization within Microkernels / 2.7.6:
Remote Management / 2.8:
Security Implications / 2.8.1:
Assuring Integrity of the TCB / 2.9:
Trusted Hardware and Supply Chain / 2.9.1:
Secure Boot / 2.9.2:
Static versus Dynamic Root of Trust / 2.9.3:
Remote Attestation / 2.9.4:
Secure Embedded Software Development / 2.10:
Introduction to PHASE-Principles of High-Assurance Software Engineering / 3.1:
Minimal Implementation / 3.2:
Component Architecture / 3.3:
Runtime Componentization / 3.3.1:
A Note on Processes versus Threads / 3.3.2:
Least Privilege / 3.4:
Secure Development Process / 3.5:
Change Management / 3.5.1:
Peer Reviews / 3.5.2:
Development Tool Security / 3.5.3:
Secure Coding / 3.5.4:
Software Testing and Verification / 3.5.5:
Development Process Efficiency / 3.5.6:
Independent Expert Validation / 3.6:
Common Criteria / 3.6.1:
Case Study: Operating System Protection Profiles / 3.6.2:
Case Study: HAWS-High-Assurance Web Server / 3.7:
Model-Driven Design / 3.7.1:
Introduction to MDD / 3.8.1:
Executable Models / 3.8.2:
Modeling Languages / 3.8.3:
Types of MDD Platforms / 3.8.4:
Case Study: A Digital Pathology Scanner / 3.8.5:
Selecting an MDD Platform / 3.8.6:
Using MDD in Safety-and Security-Critical Systems / 3.8.7:
Embedded Cryptography / 3.9:
Introduction / 4.1:
U.S. Government Cryptographic Guidance / 4.2:
NSA Suite B / 4.2.1:
The One-Time Pad / 4.3:
Cryptographic Synchronization / 4.3.1:
Cryptographic Modes / 4.4:
Output Feedback / 4.4.1:
Cipher Feedback / 4.4.2:
OFB with CFB Protection / 4.4.3:
Traffic Flow Security / 4.4.4:
Counter Mode / 4.4.5:
Block Ciphers / 4.5:
Additional Cryptographic Block Cipher Modes / 4.5.1:
Authenticated Encryption / 4.6:
CCM / 4.6.1:
Galois Counter Mode / 4.6.2:
Public Key Cryptography / 4.7:
RSA / 4.7.1:
Equivalent Key Strength / 4.7.2:
Trapdoor Construction / 4.7.3:
Key Agreement / 4.8:
Man-in-the-Middle Attack on Diffie-Hellman / 4.8.1:
Public Key Authentication / 4.9:
Certificate Types / 4.9.1:
Elliptic Curve Cryptography / 4.10:
Elliptic Curve Digital Signatures / 4.10.1:
Elliptic Curve Anonymous Key Agreement / 4.10.2:
Cryptographic Hashes / 4.11:
Secure Hash Algorithm / 4.11.1:
MMO / 4.11.2:
Message Authentication Codes / 4.12:
Random Number Generation / 4.13:
True Random Number Generation / 4.13.1:
Pseudo-Random Number Generation / 4.13.2:
Key Management for Embedded Systems / 4.14:
Case Study: The Walker Spy Case / 4.14.1:
Key Management-Generalized Model / 4.14.2:
Key Management Case Studies / 4.14.3:
Cryptographic Certifications / 4.15:
FIPS 140-2 Certification / 4.15.1:
NSA Certification / 4.15.2:
Data Protection Protocols for Embedded Systems / 4.16:
Data-in-Motion Protocols / 5.1:
Generalized Model / 5.2.1:
Choosing the Network Layer for Security / 5.2.2:
Ethernet Security Protocols / 5.2.3:
BPsec versus SSL / 5.2.4:
IPsec / 5.2.5:
SSL/TLS / 5.2.6:
Embedded VPN Clients / 5.2.7:
DTLS / 5.2.8:
SSH / 5.2.9:
Custom Network Security Protocols / 5.2.10:
Application of Cryptography within Network Security Protocols / 5 2.11:
Secure Multimedia Protocols / 5.2.12:
Broadcast Security / 5.2.13:
Data-at-Rest Protocols / 5.3:
Choosing the Storage Layer for Security / 5.3.1:
Symmetric Encryption Algorithm Selection / 5.3.2:
Managing the Storage Encryption Key / 5 3 3:
Advanced Threats to Data Encryption Solutions / 5.3.4:
Emerging Applications / 5.4:
Embedded Network Transactions / 6.1:
Anatomy of a Network Transaction / 6.1.1:
State of Insecurity / 6.1.2:
Network-based Transaction Threats / 6 1 3:
Modern Attempts to Improve Network Transaction Security / 6.1.4:
Trustworthy Embedded Transaction Architecture / 6.1.5:
Automotive Security / 6.2:
Vehicular Security Threats and Mitigations / 6.2.1:
Secure Android / 6.3:
Android Security Retrospective / 6.3.1:
Android Device Rooting / 6.3.2:
Mobile Phone Data Protection: A Case Study of Defense-in-Depth / 6.3.3:
Android Sandboxing Approaches / 6.3.4:
Next-Generation Software-Defined Radio / 6.4:
Red-Black Separation / 6.4.1:
Software-Defined Radio Architecture / 6.4.2:
Enter Linux / 6.4.3:
Multi-Domain Radio / 6.4.4:
Index / 6.5:
Foreword
Preface
Acknowledgements
4.

電子ブック

EB
Wenji Mao, Fei-Yue Wang, FeiYue Wang
出版情報: Elsevier ScienceDirect Books , Burlington : Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
Research Methodology and Frameworks for ISI / 1.1:
The ACP Approach / 1.2:
Modeling with Artificial Societies / 1.2.1:
Analysis with Computational Experiments / 1.2.2:
Control Through Parallel Execution / 1.2.3:
Foundations in Philosophy and Physics / 1.2.4:
Outline of Chapters / 1.3:
Agent Modeling of Terrorist Organization Behavior / Chapter 2:
Modeling Organizational Behavior / 2.1:
Action Extraction from the Web / 2.2:
Action Data Collection / 2.2.1:
Raw Action Extraction / 2.2.2:
Action Elimination / 2.2.3:
Action Refinement / 2.2.4:
Extracting Causal Knowledge from the Web / 2.3:
Construction of Action Hierarchy / 2.4:
Designing, Causal Scenarios / 2.5:
Case Study on Terrorist Organization / 2.6:
Conclusion / 2.7:
Security Story Generation for Computational Experiments / Chapter 3:
Story Generation Systems / 3.1:
System Workflow and Narrative Structure / 3.2:
Story Extraction Approach / 3.3:
Text Processing with Domain Knowledge / 3.3.1:
Event Detection and Event Element Extraction / 3.3.2:
Design and Organization of Patterns / 3.3.3:
Event Element Standardization / 3.3.4:
Evaluation of Event Relations / 3.3.5:
Experiment / 3.4:
Forecasting Croup Behavior via Probabilistic Plan Inference / 3.5:
Review of Plan-Based Inference / 4.1:
Probabilistic Plan Representation / 4.2:
Probabilistic Reasoning Approach / 4.3:
Notation / 4.3.1:
Computation / 4.3.2:
Case Study in Security Informatics / 4.4:
Construction of Plan Library / 4.4.1:
The Test Set / 4.4.2:
Experimental Results / 4.4.3:
Forecasting Complex Croup Behavior via Multiple Plan Recognition / 4.5:
Multiple Plan Recognition for Behavior Prediction / 5.1:
The MPR Problem Definition / 5.2:
The Proposed MPR Approach / 5.3:
Constructing the Explanation Graph / 5.3.1:
Computing Probability of an Explanation / 5.3.2:
Finding the Best Explanation / 5.3.3:
Algorithm and Complexity Analysis / 5.3.4:
Discussion / 5.3.5:
Experimental Design / 5.4:
Results / 5.4.2:
Social Computing in ISI: A Synthetic View / 5.5:
Social Computing / 6.1:
Theoretical and Infrastructure Underpinnings / 6.1.1:
Major Application Areas / 6.1.2:
A Social Computing-Based ISI Research Framework / 6.2:
Control and Management Through Parallel Execution / 6.2.1:
Main Issues in the ACP-Based ISI Research Framework / 6.3:
Modeling Cyber-Physical Societies / 6.3.1:
Scenario-Based Computational Experiment and Evaluation / 6.3.2:
Interactive Co-Evolution of Artificial and Actual Systems / 6.3.3:
Social Media Information Processing and Standardization / 6.3.4:
ISI Research Platform / 6.3.5:
Summary / 6.4:
Cyber-Enabled Social Movement Organizations / Chapter 7:
Studies on Social Movement Organizations: A Review / 7.1:
A New Research Framework for CeSMOs / 7.2:
CeSMO Research Questions / 7.2.1:
A Social Computing-Based CeSMO Research Framework / 7.2.2:
Case Study: Wenchuan Earthquake / 7.3:
Discussions on CeSMO Research Issues / 7.4:
CeSMO Behavior Modeling / 7.4.1:
CeSMO Network Analysis / 7.4.2:
CeSMO Social and Cultural Information Modeling and Analysis / 7.4.3:
CeSMO Behavior Prediction / 7.4.4:
Cultural Modeling for Behavior Analysis and Prediction / 7.5:
Modeling Cultural Data in Security Informatics / 8.1:
Major Machine Learning Methods / 8.2:
Naive Bayesian (NB) / 8.2.1:
Support Vector Machines (SVMs) / 8.2.2:
Artificial Neural Networks / 8.2.3:
k-Nearest Neighbor (kNN) / 8.2.4:
Decision Trees / 8.2.5:
Random Forest (RF) / 8.2.6:
Associative Classification (AC) / 8.2.7:
Experiment and Analysis / 8.3:
Datasets / 8.3.1:
Evaluation Measures / 8.3.2:
Observations and Analysis / 8.3.3:
Discussions on Cultural Modeling Research Issues / 8.4:
Cultural Datasets Construction / 8.4.1:
Attribute Selection / 8.4.2:
Best Performance of Classifiers / 8.4.3:
Handling the Class Imbalance Problem / 8.4.4:
Model Interpretability / 8.4.5:
Incorporation of Domain Knowledge / 8.4.6:
Cultural and Social Dynamics of Behavioral Patterns / 8.4.7:
Index / 8.5:
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
5.

電子ブック

EB
Tammy Noergaard
出版情報: Elsevier ScienceDirect Books , Newnes, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Acknowledgments
About the Author
Introduction to Embedded Systems / Section I:
A Systems Engineering Approach to Embedded Systems Design / Chapter 1:
Know Your Standards / Chapter 2:
Embedded Hardware / Section II:
Embedded Hardware Building Blocks and the Embedded Board / Chapter 3:
Embedded Processors / Chapter 4:
Board Memory / Chapter 5:
Board I/O (Input/Output) / Chapter 6:
Board Buses / Chapter 7:
Embedded Software Introduction / Section III:
Device Drivers / Chapter 8:
Embedded Operating Systems / Chapter 9:
Middleware and Application Software / Chapter 10:
Putting It All Together: Design and Development / Section IV:
Defining the System-Creating the Architecture and Documenting the Design / Chapter 11:
The Final Phases of Embedded Design: Implementation and Testing / Chapter 12:
Projects and Exercises / Appendix A:
Schematic Symbols / Appendix B:
Acronyms and Abbreviations / Appendix C:
Glossary / Appendix D:
Index
What's on the CD-ROM
Foreword
Acknowledgments
About the Author
6.

電子ブック

EB
Magnus Olsson, Catherine Mulligan, Magnus Olsson
出版情報: Elsevier ScienceDirect Books , Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
List of Abbreviations
Introduction - Background and Vision of EPC / Part I:
Mobile Broadband and the Core Network Evolution / Chapter 1:
A Global Standard / 1.1:
Origins of the Evolved Packet Core / 1.2:
3GPP Radio Access Technologies / 1.2.1:
3GPP2 Radio Access Technologies / 1.2.2:
SAE - Building Bridges Between Different Networks / 1.2.3:
A Shifting Value Chain / 1.3:
Terminology Used in This Book / 1.4:
Overview of EPS / Part II:
Architecture Overview / Chapter 2:
EPS Architecture / 2.1:
Basic LP Connectivity Over LTE Access / 2.1.1:
Adding More Advanced Functionality for LTE Access / 2.1.2:
Interworking Between LTE and GSM/GPRS or WCDMA/HSPA / 2.1.3:
Support for 3GPP Voice Services / 2.1.4:
Interworking Between LTE and CDMA Networks / 2.1.5:
Interworking Between 3GPP Access Technologies and Non-3GPP Access Technologies / 2.1.6:
Support for Broadcasting in Cellular Networks / 2.1.7:
Positioning Services / 2.1.8:
Optimizations for Small Cells and Local Access / 2.1.9:
Miscellaneous Features / 2.1.10:
Summary of the Architecture Overview / 2.1.11:
Mobile Network Radio Technologies / 2.2:
Overview of Radio Networks for Mobile Services / 2.2.1:
Radio Network Functionality / 2.2.2:
GSM / 2.2.3:
WCDMA / 2.2.4:
LTE / 2.2.5:
EPS Deployment Scenarios and Operator Cases / Chapter 3:
Scenario 1: Existing GSM/GPRS and/or WCDMA/HSPA Operators Deploying LTE/EPC / 3.1:
First Phase - Initial EPC Deployment / 3.1.1:
Second Phase - Integration with Existing Packet Core / 3.1.2:
Third Phase - Further Optimizations Towards the Common Core / 3.1.3:
Scenario 2: Existing CDMA Operators Deploying LTE/EPC / 3.2:
Scenario 3: New Operators Deploying LTE/EPC / 3.3:
Data Services in EPS / Chapter 4:
Messaging Services / 4.1:
Machine Type Communication / 4.2:
Industrial and Corporate Uses / 4.2.1:
Societal - M2M and Sustainable Development / 4.2.2:
Voice Services in EPS / Chapter 5:
Realization of Voice Over LTE / 5.1:
Voice Services Using IMS Technology / 5.2:
Single-Radio Voice Call Continuity (SRVCC) / 5.3:
Circuit-Switched Fallback / 5.4:
Comparing MMTel/SRVCC and CSFB / 5.5:
IMS Emergency Calls and Priority Services / 5.6:
Key Concepts and Services / Part III:
Session Management and Mobility / Chapter 6:
IP Connectivity and Session Management / 6.1:
The LP Connection / 6.1.1:
Session Management, Bearers, and QoS Aspects / 6.2:
General / 6.2.1:
The EPS Bearer for E-UTRAN Access / 6.2.2:
Session Management for EPS and GERAN/UTRAN Accesses / 6.2.3:
Session Management for Other Accesses / 6.2.4:
Subscriber Identifiers and Corresponding Legacy Identities / 6.3:
Permanent Subscriber Identifiers / 6.3.1:
Temporary Subscriber Identifiers / 6.3.2:
Relation to Subscription Identifiers in 2G/3G / 6.3.3:
Mobility Principles / 6.4:
Mobility within 3GPP Family of Accesses / 6.4.1:
Idle-Mode Signaling Reduction (ISR) / 6.4.3:
Closed Subscriber Group / 6.4.4:
Mobility Between E-UTRAN and HRPD / 6.4.5:
Generic Mobility Between 3GPP and Non-3GPP Accesses / 6.4.6:
Access Network Discovery and Selection / 6.4.7:
Interworking with Managed WLAN Networks / 6.5:
Pooling, Overload Protection, and Congestion Control / 6.6:
Security / Chapter 7:
Introduction / 7.1:
Security Services / 7.2:
Security Domains / 7.2.1:
Network Access Security / 7.3:
Access Security in E-UTRAN / 7.3.1:
Interworking with GERAN/UTRAN / 7.3.2:
Special Consideration for IMS Emergency Calls / 7.3.3:
Trusted and Untrusted Non-3GPP Accesses / 7.3.4:
Access Security in Trusted Non-3GPP Accesses / 7.3.5:
Access Security in Untrusted Non-3GPP Access / 7.3.6:
Special Considerations for Host-Based Mobility DSMIPv6 / 7.3.7:
Network Domain Security / 7.4:
User Domain Security / 7.5:
Security Aspects of Home eNBs and Home NBs / 7.6:
H(e)NB Security Architecture / 7.6.1:
Closed Subscriber Groups / 7.6.2:
Device Authentication / 7.6.3:
Hosting Party Authentication / 7.6.4:
Backhaul Link Security / 7.6.5:
Location Verification / 7.6.6:
Lawful Intercept / 7.7:
Quality of Service, Charging, and Policy Control / Chapter 8:
Quality of Service / 8.1:
QoS in E-UTRAN / 8.1.1:
QoS Aspects When Interworking with Other Accesses / 8.1.2:
Policy and Charging Control / 8.2:
The PCC Architecture / 8.2.1:
Basic PCC Concepts / 8.2.2:
Network vs. Terminal-Initiated QoS Control / 8.2.3:
PCC and Roaming / 8.2.4:
Additional PCC Features Developed Since Release 8 / 8.2.5:
PCC Support for Fixed Broadband Access / 8.2.6:
Charging / 8.3:
Selection Functions / Chapter 9:
Architecture Overview for Selection Functions / 9.1:
Selection of MME, SGSN, Serving GW, and PDN GW / 9.2:
Selection Procedure at a Glance / 9.2.1:
Use of DNS Infrastructure / 9.2.2:
MME Selection / 9.2.3:
SGSN Selection Function for EPS / 9.2.4:
GW Selection Overview / 9.2.5:
PDN GW Selection Function / 9.2.6:
Serving GW Selection Function / 9.2.7:
Handover (Non-3GPP Access) and PDN GW Selection / 9.2.8:
PCRF Selection / 9.3:
Subscriber Data Management. / Chapter 10:
Home Subscriber Server (HSS) / 10.1:
Subscriber Profile Repository (SPR) / 10.2:
User Data Convergence (UDC) / 10.3:
UDC Overall Description / 10.3.1:
Front-Ends and User Data Repository / 10.3.2:
Voice and Emergency Services / Chapter 11:
Voice Services Based on Circuit-Switched Technology / 11.1:
Voice Services with IMS Technology / 11.2:
MMTel / 11.3:
MMTel Architecture / 11.3.1:
VoLTE / 11.4:
T-ADS / 11.5:
Ensuring Service Coverage / 11.5.1:
Single Radio Voice Call Continuity (SRVCC) / 11.6:
Entities with Additional Functions to Support SRVCC / 11.6.1:
IMS Centralized Services (ICS) / 11.7:
Service Centralization and Continuity Application Server (SCC-AS) / 11.7.1:
SRVCC from E-UTRAN to GERAN or UTRAN / 11.7.2:
SRVCC from E-UTRAN to CDMA 1×RTT / 11.8:
Migration Paths and Coexistence of Circuit-Switched and VoLTE / 11.9:
EPS Emergency Bearer Service for IMS Emergency / 11.11:
Multimedia Priority Service (MPS) / 11.12:
LTE Broadcasting / Chapter 12:
Background and Main Concepts / 12.1:
MBMS Solution Overview / 12.2:
MBMS User Services / 12.3:
Associated Delivery Procedures / 12.3.1:
Mobile Network Architecture for MBMS / 12.4:
Interfaces / 12.4.1:
MBMS Bearer Services / 12.5:
Session Start / 12.5.1:
Session Stop / 12.5.2:
Session Update / 12.5.3:
Positioning / Chapter 13:
Positioning Solutions / 13.1:
Positioning Architecture and Protocols / 13.2:
Positioning Methods / 13.3:
Position-Reporting Formats / 13.4:
EPS Positioning Entities and Interfaces / 13.5:
GMLC / 13.5.1:
E-SMLC / 13.5.2:
SLP / 13.5.3:
Le Interface / 13.5.4:
SLg Interface / 13.5.5:
SLs Interface / 13.5.6:
LTE Positioning Protocol (LPP) / 13.5.7:
LTE Positioning Protocol Annex (LPPa) / 13.5.8:
Positioning Procedure / 13.6:
Offload Functions and Simultaneous Multi-Access / Chapter 14:
Offloading the 3GPP RAN - Simultaneous Multi-Access / 14.1:
Multi-Access PDN Connectivity (MAPCON) / 14.2.1:
LP Flow Mobility (LFOM) / 14.2.2:
Non-Seamless WLAN Offloading (NSWO) / 14.2.3:
Offloading the Core and Transport Network - Selected IP Traffic Offload (SLPTO) / 14.3:
Access to Local Networks - Local LP Access (LLPA) / 14.4:
The Nuts and Bolts of EPC / Part IV:
EPS Network Entities and Interfaces / Chapter 15:
Network Entities / 15.1:
eNodeB / 15.1.1:
Mobility Management Entity / 15.1.2:
Serving GW / 15.1.3:
PDN GW / 15.1.4:
Policy and Charging Rules Function / 15.1.5:
Home eNodeB Subsystem and Related Entities / 15.1.6:
Control Plane Between UE, eNodeB, and MME / 15.2:
S1-MME / 15.2.1:
GTP-Based Interfaces / 15.3:
Control Plane / 15.3.1:
MME↔MME(SIO) / 15.3.2:
MME↔Serving GW(S 11) / 15.3.3:
Serving GW↔PDN GW (S5/S8) / 15.3.4:
SGSN↔MME (S3) / 15.3.5:
SGSN↔Serving GW (S4) / 15.3.6:
SGSN↔SGSN (S16) / 15.3.7:
Trusted WLAN Access Network ↔ PDN GW (S2a) / 15.3.8:
ePDG PDN GW (S2b) / 15.3.9:
User Plane / 15.3.10:
eNodeB Serving GW (S1-U) / 15.3.11:
UE ↔ eNodeB Serving GW PDN GW (GTP-TJ) / 15.3.12:
UE ↔ BSS ↔ SGSN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.13:
UE ↔ UTRAN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.14:
UE ↔ UTRAN ↔ SGSN Serving GW ↔ PDN GW (GTP-U) / 15.3.15:
UE ↔ Trusted WLAN Access Network ↔ PDN GW (GTP-U) / 15.3.16:
UE ↔ ePDG ↔ PDN GW (GTP-U) / 15.3.17:
PMLP-Based Interfaces / 15.4:
Serving GW-PDN GW (S5/S8) / 15.4.1:
Trusted Non-3GPP IP Access-PDN GW (S2a) / 15.4.2:
ePDG-PDN GW (S2b) / 15.4.3:
DSMLPv6-Based Interfaces / 15.5:
UE-PDN GW (S2c) / 15.5.1:
HSS-Related Interfaces and Protocols / 15.6:
MME-HSS (S6a) and SGSN-HSS (S6d) / 15.6.1:
AAA-Related Interfaces / 15.7:
AAA Server-HSS (SWx) / 15.7.1:
Trusted Non-3GPP Access-3GPP AAA Server/Proxy (STa) / 15.7.3:
Untrusted Non-3GPP BP Access-3GPP AAA Server/Proxy (SWa) / 15.7.4:
ePDG-3GPP AAA Server/Proxy (SWm) / 15.7.5:
PDN GW-3GPP AAA Server/Proxy (S6b) / 15.7.6:
3GPP AAA Proxy-3GPP AAA Server/Proxy (SWd) / 15.7.7:
PCC-Related Interfaces / 15.8:
PCEF-PCRF (Gx) / 15.8.1:
BBERF-PCRF (Gxa/Gxc) / 15.8.3:
PCRF-AE (Rx) / 15.8.4:
TDF-PCRF (Sd) / 15.8.5:
OCS-PCRF (Sy) / 15.8.6:
PCRF-PCRF (S9) / 15.8.7:
BPCF-PCRF (S9a) / 15.8.8:
SPR-PCRF(Sp) / 15.8.9:
EIR-Related Interfaces / 15.9:
MME-EIR and SGSN-EIR Interfaces (S13 and S13') / 15.9.1:
I-WLAN-Related Interfaces / 15.10:
UE-ePDG (SWu) / 15.10.1:
ANDSF-Related Interfaces / 15.11:
ISMP Policy Node / 15.11.1:
Discovery Information Node / 15.11.2:
UE Location Node / 15.11.3:
ISRP Node / 15.11.4:
Ext Node / 15.11.5:
HRPD IW-Related Interfaces / 15.12:
Optimized Handover and Related Interfaces (S101 and S103) / 15.12.1:
MME ↔ eHRPD Access Network (S101) / 15.12.2:
Serving GW ↔ HSGW (S103) / 15.12.3:
Interface to External Networks / 15.13:
Functions / 15.13.1:
CSS Interface / 15.14:
MME-CSS Interface (S7a) / 15.14.1:
Protocols / Chapter 16:
GPRS Tunneling Protocol Overview / 16.1:
Protocol Structure / 16.2.1:
Control Plane (GTPv2-C) / 16.2.2:
User Plane (GTPv1-U) / 16.2.3:
Protocol Format / 16.2.4:
Mobile IP / 16.3:
Host-Based and Network-Based Mobility Mechanisms / 16.3.1:
Basic Principles of Mobile IP / 16.3.3:
Mobile IPv6 Security / 16.3.4:
Packet Format / 16.3.5:
Dual-Stack Operation / 16.3.6:
Additional MLPv6 Features - Route Optimization / 16.3.7:
Proxy Mobile IPv6 / 16.4:
Basic Principles / 16.4.1:
PMLPv6 Security / 16.4.3:
PMLPv6 Packet Format / 16.4.4:
Diameter / 16.4.5:
Background / 16.5.1:
Diameter Nodes / 16.5.2:
Diameter Sessions, Connections, and Transport / 16.5.4:
Diameter Request Routing / 16.5.5:
Peer Discovery / 16.5.6:
Diameter Message Format / 16.5.7:
Generic Routing Encapsulation / 16.6:
Basic Protocol Aspects / 16.6.1:
GRE Packet Format / 16.6.3:
S1-AP / 16.7:
Non-Access Stratum (NAS) / 16.8:
EPS Mobility Management / 16.8.1:
EPS Session Management / 16.8.2:
Message Structure / 16.8.3:
Security-Protected NAS Messages / 16.8.4:
Message Transport / 16.8.5:
Future Extensions and Backward Compatibility / 16.8.6:
IP Security / 16.9:
Encapsulated Security Payload and Authentication Header / 16.9.1:
Internet Key Exchange / 16.9.3:
IKEv2 Mobility and Multi-Homing / 16.9.4:
Extensible Authentication Protocol / 16.10:
Overview / 16.10.1:
Protocol / 16.10.2:
Stream Control Transmission Protocol / 16.11:
Basic Protocol Features / 16.11.1:
Multi-Steaming / 16.11.3:
Multi-Homing / 16.11.4:
Packet Structure / 16.11.5:
Procedures / Chapter 17:
Attachment and Detachment for E-UTRAN / 17.1:
Attachment Procedure for E-UTRAN / 17.1.1:
Detachment Procedure for E-UTRAN / 17.1.2:
Tracking Area Update for E-UTRAN / 17.2:
Tracking Area Update Procedure / 17.2.1:
TA Update with MME Change / 17.2.2:
Service Request for E-UTRAN / 17.3:
UE Triggered Service Request / 17.3.1:
Network Triggered Service Request / 17.3.2:
Intra- and Inter-3GPP Access Handover / 17.4:
Phases of the Handover Procedures / 17.4.1:
Handover Cases in EPS for 3GPP Accesses / 17.4.2:
Handover within E-UTRAN Access / 17.4.3:
Handover between E-UTRAN and Other 3GPP Accesses (GERAN, UTRAN) with S4-SGSN / 17.4.4:
Handover for Gn/Gp-Based SGSN / 17.4.5:
Handover between GERAN and UTRAN Access Using S4 SGSN and GTP/PMTP Protocol / 17.4.6:
Bearer and QoS-Related Procedures / 17.5:
Bearer Procedures for E-UTRAN / 17.5.1:
Bearer Procedures for GERAN/UTRAN / 17.5.2:
Attachment and Detachment for Non-3GPP Accesses / 17.6:
Attachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.1:
Detachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.2:
Attachment Procedure in Untrusted Non-3GPP Access Using PMJPv6 (S2b) / 17.6.3:
Detachment Procedure in Untrusted Non-3GPP Access Using PMIPv6 (S2b) / 17.6.4:
Attachment Procedure in Trusted Non-3GPP Access Using DSMTPv6 (S2c) / 17.6.5:
Detachment Procedure in Trusted Non-3GPP Access Using DSMJPv6 (S2c) / 17.6.6:
Intersystem Handover Between 3GPP and Non-3GPP Accesses / 17.7:
Details of Handover in EPS with Non-3GPP Accesses / 17.7.1:
QoS-Related Procedures in Non-3GPP Accesses / 17.8:
Conclusion and Future of EPS / Part V:
Conclusions and Looking Ahead / Chapter 18:
Standards Bodies Associated with EPS / Appendix A:
References
Index
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
7.

電子ブック

EB
Rob Huddleston
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2010
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgments
Introduction
Quick Start: Dive Into Flash Catalyst CS5
Rich Internet Applications and the Flash Platform / Part I:
Understanding Rich Internet Applications / Chapter 1:
Introducing Flash Catalyst / Chapter 2:
Working with Other Applications / Chapter 3:
Designing the Application / Part II:
Wireframing an Application in Flash Catalyst / Chapter 4:
Creating an Application Comp in Illustrator / Chapter 5:
Creating Assets in Photoshop / Chapter 6:
Using Fireworks with Flash Catalyst / Chapter 7:
Creating the Application in Catalyst / Part III:
Converting Illustrator and Photoshop Artwork into Catalyst Projects / Chapter 8:
Converting Artwork to Components / Chapter 9:
Creating View States / Chapter 10:
Adding Animation / Chapter 11:
Working with Design-time Data / Chapter 12:
Adding Multimedia / Chapter 13:
Exporting Projects into Flash Builder 4 / Part IV:
Flash Builder 4 and the Flex Framework / Chapter 14:
Export a Flash Catalyst Project to Flash Builder / Chapter 15:
Returning a Project to Flash Catalyst / Chapter 16:
Exporting Catalyst Projects Directly to Flash Player / Chapter 17:
Creating a Project for AIR / Chapter 18:
Build a Complete Project / Part V:
Creating a Design Comp in Illustrator / Chapter 19:
Importing the Design into Catalyst / Chapter 20:
Importing Additional Artwork from Illustrator and Photoshop / Chapter 21:
Converting Artwork to Components in Your Project / Chapter 22:
Creating View States in Your Project / Chapter 23:
Adding Data Lists / Chapter 24:
Importing Your Project into Flash Builder / Chapter 25:
Connecting Your Project to Live Data / Chapter 26:
Appendixes / Part VI:
Keyboard Shortcuts / Appendix A:
Best Practices / Appendix B:
What's on the Book's Web Site / Appendix C:
Index
Foreword
Preface
Acknowledgments
8.

電子ブック

EB
Rose Qingyang Hu, Rose Qingyang Hu, Yi Qian, Haijian Sun
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2013
所蔵情報: loading…
9.

電子ブック

EB
Thierry; Ran, Moshe Lestable, Thierry Lestable, Moshe Ran
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2011
所蔵情報: loading…
目次情報: 続きを見る
About the Editors
Contributors
Preface
Acknowledgments
Abbreviations
Coding / Gerhard Bauch ; Claude Berrou ; David Declercq ; Alexandre Graell I Amat ; Youssouf Ould-Cheikh-Mouhamedou ; Yannick Saouter ; Jossy Sayir ; Marcos B.S. Tavares1:
General Code Types / 1.1:
Designing Codes Based on Graphs / 1.2:
Pseudorandom Designs / 1.3:
Pseudorandom Designs for Turbo Codes / 1.3.1:
Structured Designs / 1.3.2:
Code Optimization / 1.3.3:
Repeat Accumulate Codes / 1.4:
Binary versus Nonbinary / 1.5:
Performance Results of Nonbinary LDPC Codes / 1.6:
Small Codeword Lengths / 1.6.1:
High-Order Modulations / 1.6.2:
Brief Presentation of NB-LDPC Decoders / 1.6.3:
Three-Dimensional (3D) Turbo Codes / 1.7:
The Encoding Structure / 1.7.1:
Simulation Results / 1.7.2:
Conclusions / 1.8:
References
Decoding / Moshe Ran ; Carlos De Segovia ; Omer Ran2:
Algebraic Soft-Decision (ASD) and Reliability-Based Decoders / 2.1:
Reliability-Based Soft-Decision Decoding / 2.1.1:
Adaptive Iterative Soft-Decision Decoders for Short Packet Lengths / 2.1.2:
Algebraic Soft-Decision and Reed-Solomon Codes / 2.1.3:
Graph versus Trellis Decoding Algorithms / 2.2:
BP-Based Algorithms / 2.2.1:
BCJR-Based Algorithms / 2.2.2:
Incremental Redundancy for Coding / Stefania Sesia ; Charly Poulliat3:
Introduction / 3.1:
Retransmission Protocols (ARQ) / 3.2:
Stop-and-Wait ARQ Protocol / 3.2.1:
Go-Back-N ARQ Protocol / 3.2.2:
Selective Repeat (SR) ARQ Protocol / 3.2.3:
Summary, and Challenges / 3.2.4:
HARQ Schemes / 3.3:
Type I HARQ / 3.3.1:
Type II HARQ / 3.3.2:
Comparison in Terms of Buffer Requirements / 3.3.3:
Design of Hybrid ARQ Type II / 3.4:
Mathematical System Model / 3.4.1:
Throughput Analysis / 3.4.2:
Code Design / 3 5:
Rate-Compatible Punctured (RCP) Convolutional Codes / 3.5.1:
Rate-Compatible Punctured Turbo Codes / 3.5.2:
Fountain and Raptor Codes / 3.5.3:
Low-Density Parity-Check Codes / 3 5.4:
Generalization of the Mutual Information Evolution for Incremental Redundancy Protocols / 3.6:
Complexity for Iterative Decoding Schemes in the Context of Incremental Redundancy Protocols / 3.6.1:
ARQ/HARQ in the Standards / 3.7:
Retransmission Protocols in 3GPP Standard / 3.7.7:
Retransmission Protocols in Non-3GPP Standard / 3.7.2:
Architecture and Hardware Requirements / Frank Kienle3.8:
Turbo Decoder Implementation / 4.1:
Interleaver and Deinterleaver / 4.1.1:
Serial Turbo Decoding / 4.1.2:
Parallel and Shuffled Turbo Decoding / 4.1.3:
Turbo Decoding with Parallel Component Decoder / 4.1.4:
MAP Decoder / 4.1.5:
Branch Metric Calculation / 4.1.6:
State and Path Metrics / 4.1.7:
Duobinary Codes / 4.1.8:
Quantization / 4.1.9:
Normalization / 4.1.10:
Implementation Results / 4.1.11:
LDPC Decoder Architectures / 4.2:
Generic Architecture Template / 4.2.1:
Two-Phase Architecture / 4.2.2:
Two-Phase Architecture with PN Branch / 4.2.3:
Single-Phase Architecture / 4.2.4:
Layered Architecture / 4.2.5:
Other Architecture Concepts / 4.2.6:
Considering Throughput and Latency / 4.2.7:
Considering VLSI Complexity / 4.2.8:
Considering Communications Performance / 4.2.9:
The LDPC Code Decoder Design Space / 4.2.10:
Architecture Parallelism / 4.2.11:
Traveling the Design Space / 4.2.12:
Implementation Issues / 4.2.13:
FPGA Implementation / 4.2.14:
ASIC Implementation / 4.2.15:
Power and Energy Issues / 4.2.16:
Design Studies / 4.2.17:
Turbo-Principle Extensions / Isabelle Siaud ; Ming Jiang ; Anne-Marie Ulmer-Moll ; Maryline Hélard ; Thierry Lestable5:
From Turbo Code to Advanced Iterative Receivers / 5.1:
From Turbo Code to Turbo Equalization / 5.2.1:
Turbo-Equalization Principle / 5.2.2:
Turbo Equalization Applied to Iterative Receiver / 5.2.3:
Turbo-Based Interleaving Techniques / 5.3:
General Principles of the Algorithm / 5.3.1:
Mathematical Description / 5.3.2:
Performance as Inner Interleaving to Turbo-FEC Structure / 5.3.3:
Performance as Outer Binary Interleaving / 5.3.4:
Performance as Dynamic Subcarrier Mapping Allocation / 5.5.5:
Turbo-MIMO Techniques / 5.4:
System Overview / 5.4.7:
Genetically Inspired Optimization / 5.4.3:
Turbo MIMO-OFDM Receiver using GA-Aided Iterative Channel Estimation / 5.4.4:
Standardization / Marie-Hélene Hamon ; Isabelle Siaud)5.4.5:
3GPP Systems: UMTS and LTE / 6.1:
IEEE 802.16/WiMAX / 6.2:
IEEE802.11n / 6.3:
Satellite (DVB-RCS, DVB-S2) / 6.4:
Wireless Rural Area Network: The IEEE802.22 standard [IEEE802_22] / 6.5:
FEC Coding / 6.5.1:
Outing Interleaving / 6.5.2:
Others / 6.6:
Index
About the Editors
Contributors
Preface
10.

電子ブック

EB
John Walkenbach, Walkenbach
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2010
所蔵情報: loading…
目次情報: 続きを見る
Introduction
Some Essential Background / Part I:
Excel 2010: Where It Came From / Chapter 1:
Excel in a Nutshell / Chapter 2:
Formula Tricks and Techniques / Chapter 3:
Understanding Excel Files / Chapter 4:
Excel Application Development / Part II:
What Is a Spreadsheet Application? / Chapter 5:
Essentials of Spreadsheet Application Development / Chapter 6:
Understanding Visual Basic for Applications / Part III:
Introducing Visual Basic for Applications / Chapter 7:
VBA Programming Fundamentals / Chapter 8:
Working with VBA Sub Procedures / Chapter 9:
Creating Function Procedures / Chapter 10:
VBA Programming Examples and Techniques / Chapter 11:
Working with UserForms / Part IV:
Custom Dialog Box Alternatives / Chapter 12:
Introducing UserForms / Chapter 13:
UserForm Examples / Chapter 14:
Advanced UserForm Techniques / Chapter 15:
Advanced Programming Techniques / Part V:
Developing Excel Utilities with VBA / Chapter 16:
Working with Pivot Tables / Chapter 17:
Working with Charts / Chapter 18:
Understanding Excel's Events / Chapter 19:
Interacting with Other Applications / Chapter 20:
Creating and Using Add-Ins / Chapter 21:
Developing Applications / Part VI:
Working with the Ribbon / Chapter 22:
Working with Shortcut Menus / Chapter 23:
Providing Help for Your Applications / Chapter 24:
Developing User-Oriented Applications / Chapter 25:
Other Topics / Part VII:
Compatibility Issues / Chapter 26:
Manipulating Files with VBA / Chapter 27:
Manipulating Visual Basic Components / Chapter 28:
Understanding Class Modules / Chapter 29:
Working with Colors / Chapter 30:
Frequently Asked Questions about Excel Programming / Chapter 31:
Appendixes / Part VIII:
Excel Resources Online / Appendix A:
VBA Statements and Functions Reference / Appendix B:
VBA Error Codes / Appendix C:
What's on the CD-ROM / Appendix D:
Index
End-User License Agreement
Introduction
Some Essential Background / Part I:
Excel 2010: Where It Came From / Chapter 1:
11.

電子ブック

EB
Andrew Curioso, Ronald Bradford, Alan Collison, Patrick Galbraith, Andrew ; Bradford, Ronald; Galbraith, Patrick Curioso
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Inc., 2010
所蔵情報: loading…
12.

電子ブック

EB
Leonid G. Kazovsky, L. G. Kazovsky
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2011
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgments
Broadband Access Technologies: An Overview / 1:
Communication Networks / 1.1:
Access Technologies / 1.2:
Last-Mile Bottleneck / 1.2.1:
Access Technologies Compared / 1.2.2:
Digital Subscriber Line / 1.3:
DSL Standards / 1.3.1:
Modulation Methods / 1.3.2:
Voice over DSL / 1.3.3:
Hybrid Fiber Coax / 1.4:
Cable Modem / 1.4.1:
DOCSIS / 1.4.2:
Optical Access Networks / 1.5:
Passive Optical Networks / 1.5.1:
PON Standard Development / 1.5.2:
WDM PONs / 1.5.3:
Other Types of Optical Access Networks / 1.5.4:
Broadband over Power Lines / 1.6:
Power-Line Communications / 1.6.1:
BPL Modem / 1.6.2:
Challenges in BPL / 1.6.3:
Wireless Access Technologies / 1.7:
Wi-Fi Mesh Networks / 1.7.1:
WiMAX Access Networks / 1.7.2:
Cellular Networks / 1.7.3:
Satellite Systems / 1.7.4:
LMDS and MMDS Systems / 1.7.5:
Broadband Services and Emerging Technologies / 1.8:
Broadband Access Services / 1.8.1:
Emerging Technologies / 1.8.2:
Summary / 1.9:
References
Optical Communications: Components and Systems / 2:
Optical Fibers / 2.1:
Fiber Structure / 2.1.1:
Fiber Mode / 2.1.2:
Fiber Loss / 2.1.3:
Fiber Dispersion / 2.1.4:
Nonlinear Effects / 2.1.5:
Light-Wave Propagation in Optical Fibers / 2.1.6:
Optical Transmitters / 2.2:
Semiconductor Lasers / 2.2.1:
Optical Modulators / 2.2.2:
Transmitter Design / 2.2.3:
Optical Receivers / 2.3:
Photodetectors / 2.3.1:
Optical Receiver Design / 2.3.2:
Optical Amplifiers / 2.4:
Rare-Earth-Doped Fiber Amplifiers / 2.4.1:
Semiconductor Optical Amplifiers / 2.4.2:
Raman Amplifiers / 2.4.3:
Passive Optical Components / 2.5:
Directional Couplers / 2.5.1:
Optical Filters / 2.5.2:
System Design and Analysis / 2.6:
Receiver Sensitivity / 2.6.1:
Power Budget / 2.6.2:
Dispersion Limit / 2.6.3:
Optical Transceiver Design for TDM PONs / 2.7:
Burst-Mode Optical Transmission / 2.7.1:
Colorless ONUs / 2.7.2:
Passive Optical Networks: Architectures and Protocols / 2.8:
PON Architectures / 3.1:
Network Dimensioning and Bandwidth / 3.1.1:
Burst-Mode Operation / 3.1.2:
PON Packet Format and Encapsulation / 3.1.4:
Dynamic Bandwidth Allocation, Ranging, and Discovery / 3.1.5:
Reliability and Security Concerns / 3.1.6:
PON Standards History and Deployment / 3.2:
Brief Developmental History / 3.2.1:
FTTx Deployments / 3.2.2:
Broadband PON / 3.3:
BPON Architecture / 3.3.1:
BPON Protocol and Service / 3.3.2:
BPON Transmission Convergence Layer / 3.3.3:
BPON Dynamic Bandwidth Allocation / 3.3.4:
Other ITU-T G.983.x Recommendations / 3.3.5:
Gigabit-Capable PON / 3.4:
GPON Physical Medium-Dependent Layer / 3.4.1:
GPON Transmission Convergence Layer / 3.4.2:
Recent G.984 Series Standards, Revisions, and Amendments / 3.4.3:
Ethernet PON / 3.5:
EPON Architecture / 3.5.1:
EPON Point-to-Multipoint MAC Control / 3.5.2:
Open Implementations in EPON / 3.5.3:
Unresolved Security Weaknesses / 3.5.4:
IEEE 802.av-2009 10GEPON Standard / 3.6:
10GEPON PMD Architecture / 3.6.1:
10GEPON MAC Modifications / 3.6.2:
10GEPON Coexistence Options / 3.6.3:
Next-Generation Optical Access System Development in the Standards / 3.7:
FSAN NGA Road Map / 3.7.1:
Energy Efficiency / 3.7.2:
Other Worldwide Development / 3.7.3:
Next-Generation Broadband Optical Access Networks / 3.8:
TDM-PON Evolution / 4.1:
EPON Bandwidth Enhancements / 4.1.1:
GPON Bandwidth Enhancements / 4.1.2:
Line Rate Enhancements Research / 4.1.3:
WDM-PON Components and Network Architectures / 4.2:
Tunable Lasers and Receivers / 4.2.1:
Spectrum-Sliced Broadband Light Sources / 4.2.3:
Injection-Locked FP Lasers / 4.2.4:
Centralized Light Sources with RSOAs / 4.2.5:
Multimode Fiber / 4.2.6:
Hybrid TDM/WDM-PON / 4.3:
TDM-PON to WDM-PON Evolution / 4.3.1:
Hybrid Tree Topology Evolution / 4.3.2:
Tree to Ring Topology Evolution / 4.3.3:
WDM-PON Protocols and Scheduling Algorithms / 4.4:
MAC Protocols / 4.4.1:
Scheduling Algorithms / 4.4.2:
Hybrid Optical Wireless Access Networks / 4.5:
IEEE 802.16 WiMAX / 5.1:
Wireless Mesh Networks / 5.1.2:
Hybrid Optical-Wireless Access Network Architecture / 5.2:
Leveraging TDM-PON for Smooth Upgrade of Hierarchical Wireless Access Networks / 5.2.1:
Upgrading Path / 5.2.2:
Reconfigurable Optical Backhaul Architecture / 5.2.3:
Integrated Routing Algorithm for Hybrid Access Networks / 5.3:
Simulation Results and Performance Analysis / 5.3.1:
Index / 5.4:
Foreword
Preface
Acknowledgments
13.

電子ブック

EB
J. Nutaro, James Nutaro
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2010
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction / 1:
Elements of a Software Architecture / 1.1:
Systems Concepts as an Architectural Foundation / 1.2:
Summary / 1.3:
Organization of the Book / 1.4:
First Example: Simulating a Robotic Tank / 2:
Functional Modeling / 2.1:
A Robotic Tank / 2.2:
Equations of Motion / 2.2.1:
Motors, Gearbox, and Tracks / 2.2.2:
Complete Model of the Tank's Continuous Dynamics / 2.2.3:
The Computer / 2.2.4:
Complete Model of the Tank / 2.2.5:
Design of the Tank Simulator / 2.3:
Experiments / 2.4:
Discrete-Time Systems / 2.5:
Atomic Models / 3.1:
Trajectories / 3.1.1:
The State Transition and Output Function / 3.1.2:
Two Examples of Atomic, Discrete-Time Models / 3.1.3:
Systems with Bags for Input and Output / 3.1.4:
A Simulator for Atomic Models / 3.1.5:
Network Models / 3.2:
The Parts of a Network Model / 3.2.1:
The Resultant of a Network Model / 3.2.2:
An Example of a Network Model and Its Resultant / 3.2.3:
Simulating the Resultant / 3.2.4:
A Simulator for Discrete-Time Systems / 3.3:
Mealy/Moore-Type Systems / 3.4:
Cellular Automata / 3.5:
Discrete-Event Systems / 3.6:
Time and Trajectories / 4.1:
The State Transition Function / 4.1.2:
The Output Function / 4.1.3:
Legitimate Systems / 4.1.4:
An Example of an Atomic Model / 4.1.5:
The Interrupt Handler in the Robotic Tank / 4.1.6:
Simulating the Interrupt Handler / 4.1.7:
A Simulator for Discrete-Event Systems / 4.2:
The Event Schedule / 4.3.1:
The Bag / 4.3.2:
The Simulation Engine / 4.3.3:
The Computer in the Tank / 4.4:
Cellular Automata Revisited / 4.5:
Hybrid Systems / 4.6:
An Elementary Hybrid System / 5.1:
Networks of Continuous Systems / 5.2:
Hybrid Models as Discrete-Event Systems / 5.3:
Numerical Simulation of Hybrid Systems / 5.4:
A Simulator for Hybrid Systems / 5.5:
Interactive Simulation of the Robotic Tank / 5.6:
Correcting the Dynamics of a Turn / 5.6.1:
A Simplified Model of the Motor / 5.6.2:
Updating the Display / 5.6.3:
Implementing the Tank Physics / 5.6.4:
Approximating Continuous Interaction Between Hybrid Models / 5.7:
A Final Comment on Cellular Automata / 5.8:
Differential Automata with Constant Derivatives / 5.8.3:
Modeling Asynchronous Cellular Automata with Differential Automata / 5.8.2:
A Homomorphism from Differential Automata to Asynchronous Cellular Automata
Applications / 5.9:
Control Through a Packet-Switched Network / 6.1:
Model of the Pendulum and Its PID Controller / 6.1.1:
Integration with an Ethernet Simulator / 6.1.2:
Frequency Regulation in an Electrical Power System / 6.1.3:
Generation / 6.2.1:
Transmission Network and Electrical Loads / 6.2.2:
Frequency Monitoring and Load Actuation / 6.2.3:
Software Implementation / 6.2.4:
The Future / 6.2.5:
Simulation Programming Languages / 7.1:
Parallel Computing and Discrete-Event Simulation / 7.2:
The Many Forms of Discrete Systems and Their Simulators / 7.3:
Other Facets of Modeling and Simulation / 7.4:
Design and Test of Simulations / Appendix A:
Decomposing a Model / A.1:
Bottom-Up Testing / A.1.1:
Invariants and Assertions / A.1.2:
Input and Output Objects / A.2:
Simple Structures / A.2.1:
Unions / A.2.2:
Pointers and Hierarchies of Events / A.2.3:
Mixing Strategies with Model Wrappers / A.2.4:
Reducing Execution Time / A.3:
Parallel Discrete Event Simulation / Appendix B:
A Conservative Algorithm / B.1:
Lookahead / B.1.1:
The Algorithm / B.1.2:
Implementing the Algorithm with OpenMP / B.2:
Pragmas, Volatiles, and Locks / B.2.1:
Overview of the Simulator / B.2.2:
The LogicalProcess / B.2.3:
The MessageQ / B.2.4:
The ParSimulator / B.2.5:
Demonstration of Gustafsort's and Amdahl's Laws / B.3:
Mathematical Topics / Appendix C:
System Homomorphisms / C.1:
Sinusoidal State-Steady Analysis / C.2:
References
Index
Preface
Introduction / 1:
Elements of a Software Architecture / 1.1:
14.

電子ブック

EB
Michael S. Gendron, M.S Gendron
出版情報: Wiley Online Library - AutoHoldings Books , New York : John Wiley & Sons, Incorporated, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgments
Introducing ICT Strategy / Part 1:
Defining information and Communication Technology infrastructure / Chapter 1:
ICT and Business Intelligence
ICT Value Management
Business-Driven Infrastructure Design
ICT Infrastructure Defined
Conclusion
Notes
Introductory Business and Technology Strategy Concepts / Chapter 2:
Introduction to Business and Technology Strategy
Budgeting Technology Expenditures
Why Build an ICT Infrastructure to Support Business Processes? / Chapter 3:
Reasons to Build an ICT Infrastructure
Business Processes in an Organizational Context
Organizations, Supply Chains, Value Chains, and Processes
A Summary: What Is a Process?
understanding How ICT Produces Value / Part 2:
Understanding Your Organization and Its Competitive Environment / Chapter 4:
Organizational Value Propositions
Value Search Models: Internal and External Analysis
Value Models: Environmental Scanning
Process Improvement or innovation? / Chapter 5:
Improvement versus Innovation
Determining a Starting Point
Organizational Enablers
ICT as an Enabler
ICT Constraints
Summary of Enablers of Process Change
Measuring the Business Value of ICT / Chapter 6:
Introductory Theories
Technology Justification Models
Balanced Scorecard
Best Practices / Part 3:
Best Practices for Documenting Process Change / Chapter 7:
Design Documents
Process Design Diagram Set
Business Process Modeling
Using TSI to Introduce BPM
Best Practices for Documenting Technology Recommendations / Chapter 8:
ICT Design Documents
ICT Infrastructure Diagram Set
ICT Infrastructure Modeling
The Business-Driven Infrastructure Design Cycle / Chapter 9:
The BDID Process
Members of the ICT Design Team
BDID Phases
Note
Appendix
About the Author
Index
Foreword
Preface
Acknowledgments
15.

電子ブック

EB
Daniel J. Duffy, Andrea Germani
出版情報: Wiley Online Library - AutoHoldings Books , Chichester : John Wiley & Sons, Incorporated, 2013
所蔵情報: loading…
16.

電子ブック

EB
Martin Host, Austen Rainer, Per Runeson, Bjorn Regnell
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2012
所蔵情報: loading…
17.

電子ブック

EB
Mark Levene
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2010
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Chapter 1:
MEMS / 1.1:
Coupled systems / 1.2:
Required knowledge / 1.3:
Dimensional analysis / 1.4:
Microfabrication / Chapter 2:
Bulk and surface micromachining / 2.1:
Lithography / 2.2:
Layer deposition / 2.3:
Layer etching / 2.4:
Fabrication process design / 2.5:
Statics / Chapter 3:
Static equilibrium / 3.1:
Stress-strain relationship / 3.2:
Thermal stress / 3.3:
Beam behaviors subjected to torsional moment / 3.4:
Moment-curvature relationship / 3.5:
Beam equation / 3.6:
Galerkin method / 3.7:
Energy method / 3.8:
Energy method for beam problems / 3.9:
Static behaviors of microstructures / Chapter 4:
Elements of microstructures / 4.1:
Stiffness of commonly used beams / 4.2:
Truss / 4.3:
Stiffness transformation / 4.4:
Static behavior of planar structures / 4.5:
Residual stress / 4.6:
Cubic force of structures / 4.7:
Potential energy / 4.8:
Analogy between potential energies / 4.9:
Dynamics / Chapter 5:
Cubic equation / 5.1:
Description of motion / 5.2:
Governing equations of Dynamics / 5.3:
Energy conversion between potential and kinetic energy / 5.4:
Free vibration of undamped systems / 5.5:
Vibration of damped systems / 5.6:
Systems with multi-degree-of-systems / 5.7:
Continuous systems / 5.8:
Effective mass, damping and stiffness / 5.9:
Systems with repeated structures / 5.10:
Duffing's equation / 5.11:
Fluid dynamics / Chapter 6:
Viscous flow / 6.1:
Continuity equation / 6.2:
Navier-Stokes equation / 6.3:
Reynolds equation / 6.4:
Couette flow / 6.5:
Stokes' second problem or Oscillating plate in fluid / 6.6:
Creeping flow / 6.7:
Squeeze film / 6.8:
Electromagnetics / Chapter 7:
Basic elements of electric circuit / 7.1:
Kirchhoff's circuit laws / 7.2:
Electrostatics / 7.3:
Force and moment due to electric field / 7.4:
Electrostatic forces and moments acting on various objects / 7.5:
Electromagnetic force / 7.6:
Force acting on moving charge in electric and magnetic fields / 7.7:
Piezoresistance / 7.8:
Piezoelectricity / 7.9:
Actuators: piezoelectric and thermal actuators / Chapter 8:
Composite beams / 8.1:
Piezoelectric actuators / 8.2:
Thermal actuators / 8.3:
Actuators: electrostatic and electromagnetic actuators / Chapter 9:
Electrostatic actuators / 9.1:
Comb drive actuator / 9.2:
Parallel plate actuator / 9.3:
Torsional actuator / 9.4:
Fixed-fixed beam actuator / 9.5:
Cantilever beam actuator / 9.6:
Dynamic response of gap-closing actuators / 9.7:
Approximation of gap-closing actuators / 9.8:
Electromagnetic actuators / 9.9:
Sensors / Chapter 10:
Force and pressure sensors / 10.1:
Accelerometers / 10.2:
Micromachined Accelerometers / 10.3:
Electrostatic accelerometers / 10.4:
Vibratory gyroscopes / 10.5:
Other issues / 10.6:
Introduction / Chapter 1:
MEMS / 1.1:
Coupled systems / 1.2:
18.

電子ブック

EB
Hubregt J. Visser
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Inc., 2012
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
List of Abbreviations
Introduction / 1:
The Early History of Antennas / 1.1:
Antennas and Electromagnetic Radiation / 1.2:
Electromagnetic Radiation / 1.2.1:
Short Wire Dipole Radiation / 1.2.2:
The Modern History of Antennas / 1.3:
Frequency Spectrum and Antenna Types / 1.4:
Dipole Antennas / 1.4.1:
Loop Antennas / 1.4.2:
Aperture Antennas / 1.4.3:
Reflector Antennas / 1.4.4:
Array Antennas / 1.4.5:
Modem Antennas / 1.4.6:
Organization of the Book / 1.5:
Problems / 1.6:
References
Antenna System-Level Performance Parameters / 2:
Radiation Pattern / 2.1:
Field Regions / 2.1.1:
Three-Dimensional Radiation Pattern / 2.1.2:
Planar Cuts / 2.1.3:
Power Patterns / 2.1.4:
Directivity and Gain / 2.1.5:
Antenna Beamwidth / 2.1.6:
Antenna Impedance and Bandwidth / 2.2:
Polarization / 2.3:
Elliptical Polarization / 2.3.1:
Circular Polarization / 2.3.2:
Linear Polarization / 2.3.3:
Axial Ratio / 2.3.4:
Antenna Effective Area and Vector Effective Length / 2.4:
Effective Area / 2.4.1:
Vector Effective Length / 2.4.2:
Radio Equation / 2.5:
Radar Equation / 2.6:
Radar Cross-Section / 2.6.1:
Vector Analysis / 2.7:
Addition and Subtraction / 3.1:
Products / 3.2:
Scalar Product or Dot Product / 3.2.1:
Vector Product or Cross Product / 3.2.2:
Triple Product / 3.2.3:
Differentiation / 3.3:
Gradient / 3.3.1:
Divergence / 3.3.2:
Curl / 3.3.3:
Radiated Fields / 3.4:
Maxwell Equations / 4.1:
Vector Potential / 4.2:
Far-Field Approximations / 4.3:
Magnetic Field / 4.3.1:
Electric Field / 4.3.2:
Reciprocity / 4.4:
Lorentz Reciprocity Theorem / 4.4.1:
Antenna Reciprocity / 4.4.2:
Elementary Dipole / 4.5:
Radiation / 5.1.1:
Input Impedance / 5.1.2:
Non-Infinitesimal Dipole Antenna / 5.2:
Printed Monopole and Inverted-F Antennas / 5.2.1:
Application of Theory / 5.3.1:
Planar Monopole Antenna Design / 5.3.2:
Printed UWB Antenna Design / 5.3.3:
Miniature Monopole with Cable Current Suppression / 5.3.4:
Inverted-F Antenna Design / 5.3.5:
General Constant Current Loop / 5.4:
Small Loop Antenna / 6.1.1:
Comparison of Short Dipole and Small Loop Antenna / 6.1.4:
Printed Loop Antenna / 6.2:
Design of a Printed Loop Antenna / 6.2.1:
Magnetic Sources / 6.3:
Uniqueness Theorem / 7.2:
Equivalence Principle / 7.3:
Uniform Distribution in a Rectangular Aperture / 7.4:
Uniform Distribution in a Circular Aperture / 7.6:
Microstrip Antennas / 7.7:
Design of a Linearly Polarized Microstrip Antenna / 7.7.1:
Design of a Circularly Polarized Microstrip Antenna / 7.7.3:
A Linear Array of Non-Isotropic Point-Source Radiators / 7.8:
Array Factor / 8.2:
Side Lobes and Grating Lobes / 8.3:
Side-Lobe Level / 8.3.1:
Grating Lobes / 8.3.2:
Linear Phase Taper / 8.4:
Special Topics / 8.5:
Mutual Coupling / 8.6.1:
Antenna Diversity / 8.6.2:
Sequential Rotation and Phasing / 8.6.3:
Array Antenna Design / 8.7:
Theory / 8.7.1:
A Linear Microstrip Patch Array Antenna / 8.7.2:
Effective Aperture and Directivity / 8.8:
Vector Formulas / Appendix B:
Complex Analysis / Appendix C:
Complex Numbers / C.1:
Use of Complex Variables / C.2:
Physical Constants and Material Parameters / Appendix D:
Two-Port Network Parameters / Appendix E:
Transmission Line Theory / Appendix F:
Distributed Parameters / F.1:
Guided Waves / F.2:
VSWR and Reflection Factor / F.2.1:
Impedance and Relative Impedance / F.2.2:
Input Impedance of a Transmission Line / F.3:
Terminated Lossless Transmission Line / F.4:
Matched Load / F.4.1:
Short Circuit / F.4.2:
Open Circuit / F.4.3:
Imaginary Unit Termination / F.4.4:
Real Termination / F.4.5:
Quarter Wavelength Impedance Transformer / F.5:
Coplanar Waveguide (CPW) / Appendix G:
Index
Preface
Acknowledgements
List of Abbreviations
19.

電子ブック

EB
Richard Cascarino
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2012
所蔵情報: loading…
20.

電子ブック

EB
Tzi-Dar Chiueh, Lai. I-Wei, Pei-Yun Tsai
出版情報: Wiley Online Library - AutoHoldings Books , Wiley-IEEE Press, 2012
所蔵情報: loading…
21.

電子ブック

EB
Michael Minelli, Michele Chambers, Ambiga Dhiraj, Dhiraj Rajaram
出版情報: Wiley Online Library - AutoHoldings Books , New York : John Wiley & Sons, Incorporated, 2013
所蔵情報: loading…
22.

電子ブック

EB
Albert J. Marcella, Frederic Guillossou
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2012
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgments
The Fundamentals of Data / Chapter 1:
Base 2 Numbering System: Binary and Character Encoding
Communication in a Two-State Universe
Electricity and Magnetism
Building Blocks: The Origins of Data
Growing the Building Blocks of Data
Moving Beyond Base 2
American Standard Code for Information Interchange
Character Codes: The Basis for Processing Textual Data
Extended ASCII and Unicode
Summary
Notes
Binary to Decimal / Chapter 2:
Computer as a Calculator
Why Is This Important in Forensics?
Data Representation
Converting Binary to Decimal
Conversion Analysis
A Forensic Case Example: An Application of the Math
Decimal to Binary: Recap for Review
The Power of HEX: Finding Slivers of Data / Chapter 3:
What the HEX?
Bits and Bytes and Nibbles
Nibbles and Bits
Binary to HEX Conversion
Binary (HEX) Editor
The Needle within the Haystack
Files / Chapter 4:
Opening
Files, File Structures, and File Formats
File Extensions
Changing a File's Extension to Evade Detection
Files and the HEX Editor
Files Signature
ASCII Is Not Text or HEX
Value of File Signatures
Complex Files: Compound, Compressed, and Encrypted Files
Why Do Compound Files Exist?
Compressed Files
Forensics and Encrypted Files
The Structure of Ciphers
Common File Extensions / Appendix 4A:
Files Signature Database / Appendix 4B:
Magic Number Definition / Appendix 4C:
Compound Document Header / Appendix 4D:
The Boot Process and the Master Boot Record (MBR) / Chapter 5:
Booting Up
Primary Functions of the Boot Process
Forensic Imaging and Evidence Collection
Summarizing the BIOS
BIOS Setup Utility: Step by Step
The Master Boot Record (MBR)
Partition Table
Hard Disk Partition
Endianness and the Partition Table / Chapter 6:
The Flavor of Endianness
Endianness
The Origins of Endian
Partition Table within the Master Boot Record
Volume versus Partition / Chapter 7:
Tech Review
Cylinder, Head, Sector, and Logical Block Addressing
Volumes and Partitions
File Systems-FAT 12/16 / Chapter 8:
File Systems
Metadata
File Allocation Table (FAT) File System
Slack
HEX Review Note
Directory Entries
File Allocation Table (FAT)
How Is Cluster Size Determined?
Expanded Cluster Size
Directory Entries and the FAT
FAT Filing System Limitations
Directory Entry Limitations
Partition Table Fields / Appendix 8A:
File Allocation Table Values / Appendix 8B:
Directory Entry Byte Offset Description / Appendix 8C:
FAT 12/16 Byte Offset Values / Appendix 8D:
FAT 32 Byte Offset Values / Appendix 8E:
The Power of 2 / Appendix 8F:
File Systems-NTFS and Beyond / Chapter 9:
New Technology File System
Partition Boot Record
Master File Table
NTFS Summary
exFAT
Alternative Filing System Concepts
Common NTFS Systems Defined Attributes / Appendix 9A:
Cyber Forensics: Investigative Smart Practices / Chapter 10:
The Forensic Process
Forensic Investigative Smart Practices
The Initial Contact, the Request / Step 1:
Evidence Handling / Step 2:
Acquisition of Evidence / Step 3:
Data Preparation / Step 4:
Time
Note
Time and Forensics / Chapter 11:
What Is Time?
Network Time Protocol
Timestamp Data
Keeping Track of Time
Clock Models and Time Bounding: The Foundations of Forensic Time
MS-DOS 32-Bit Timestamp: Date and Time
Date Determination
Time Determination
Time Inaccuracy
Investigation: Incident Closure / Chapter 12:
Investigation (Continued) / Step 5:
Communicate Findings / Step 6:
Characteristics of a Good Cyber Forensic Report
Report Contents
Retention and Curation of Evidence / Step 7:
Investigation Wrap-Up and Conclusion / Step 8:
Investigator's Role as an Expert Witness
A Cyber Forensic Process Summary / Chapter 13:
Binary
Binary-Decimal-ASCII
Data Versus Code
HEX
From Raw Data to Files
Accessing Files
Partitions
The Investigation Process
Appendix: Forensic Investigations, ABC Inc.
Glossary
About the Authors
Index
Preface
Acknowledgments
The Fundamentals of Data / Chapter 1:
23.

電子ブック

EB
Peter J. Huber
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2011
所蔵情報: loading…
目次情報: 続きを見る
Preface
What is Data Analysis? / 1:
Tukey's 1962 paper / 1.1:
The Path of Statistics / 1.2:
Strategy Issues in Data Analysis / 2:
Strategy in Data Analysis / 2.1:
Philosophical issues / 2.2:
On the theory of data analysis and its teaching / 2.2.1:
Science and data analysis / 2.2.2:
Economy of forces / 2.2.3:
Issues of size / 2.3:
Strategic planning / 2.4:
Planning the data collection / 2.4.1:
Choice of data and methods. / 2.4.2:
Systematic and random errors / 2.4.3:
Strategic reserves / 2.4.4:
Human factors / 2.4.5:
The stages of data analysis / 2.5:
Inspection / 2.5.1:
Error checking / 2.5.2:
Modification / 2.5.3:
Comparison / 2.5.4:
Modeling and Model fitting / 2.5.5:
Simulation / 2.5.6:
What-if analyses / 2.5.7:
Interpretation / 2.5.8:
Presentation of conclusions / 2.5.9:
Tools required for strategy reasons / 2.6:
Ad hoc programming / 2.6.1:
Graphics / 2.6.2:
Record keeping / 2.6.3:
Creating and keeping order / 2.6.4:
Massive Data Sets / 3:
Introduction / 3.1:
Disclosure: Personal experiences / 3.2:
What is massive? A classification of size / 3.3:
Obstacles to scaling / 3.4:
Human limitations: visualization / 3.4.1:
Human - machine interactions / 3.4.2:
Storage requirements / 3.4.3:
Computational complexity / 3.4.4:
Conclusions / 3.4.5:
On the structure of large data sets / 3.5:
Types of data / 3.5.1:
How do data sets grow? / 3.5.2:
On data organization / 3.5.3:
Derived data sets / 3.5.4:
Data base management and related issues / 3.6:
Data archiving / 3.6.1:
The stages of a data analysis / 3.7:
Actual collection / 3.7.1:
Data access / 3.7.3:
Initial data checking / 3.7.4:
Data analysis proper / 3.7.5:
The final product: presentation of arguments and conclusions / 3.7.6:
Examples and some thoughts on strategy / 3.8:
Volume reduction / 3.9:
Supercomputers and software challenges / 3.10:
When do we need a Concorde? / 3.10.1:
General Purpose Data Analysis and Supercomputers / 3.10.2:
Languages, Programming Environments and Data-based Prototyping / 3.10.3:
Summary of conclusions / 3.11:
Languages for Data Analysis / 4:
Goals and purposes / 4.1:
Natural languages and computing languages / 4.2:
Natural languages / 4.2.1:
Batch languages / 4.2.2:
Immediate languages / 4.2.3:
Language and literature / 4.2.4:
Object orientation and related structural issues / 4.2.5:
Extremism and compromises, slogans and reality / 4.2.6:
Some conclusions / 4.2.7:
Interface issues / 4.3:
The command line interface / 4.3.1:
The menu interface / 4.3.2:
The batch interface and programming environments / 4.3.3:
Some personal experiences / 4.3.4:
Miscellaneous issues / 4.4:
On building blocks / 4.4.1:
On the scope of names / 4.4.2:
On notation / 4.4.3:
Book-keeping problems / 4.4.4:
Requirements for a general purpose immediate language / 4.5:
Approximate Models / 5:
Models / 5.1:
Bayesian modeling / 5.2:
Mathematical statistics and approximate models / 5.3:
Statistical significance and physical relevance / 5.4:
Judicious use of a wrong model / 5.5:
Composite models / 5.6:
Modeling the length of day / 5.7:
The role of simulation / 5.8:
Pitfalls / 5.9:
Simpson's paradox / 6.1:
Missing data / 6.2:
The Case of the Babylonian Lunar Six / 6.2.1:
X-ray crystallography / 6.2.2:
Regression of Y on X or of X on Y? / 6.3:
Create order in data / 7:
General considerations / 7.1:
Principal component methods / 7.2:
Principal component methods: Jury data / 7.2.1:
Multidimensional scaling / 7.3:
Multidimensional scaling: the method / 7.3.1:
Multidimensional scaling: a synthetic example / 7.3.2:
Multidimensional scaling: map reconstruction / 7.3.3:
Correspondence analysis / 7.4:
Correspondence analysis: the method / 7.4.1:
Kültepe eponyms / 7.4.2:
Further examples: marketing and Shakespearean plays / 7.4.3:
Multidimensional scaling vs. Correspondence analysis / 7.5:
Hodson's grave data / 7.5.1:
Plato data / 7.5.2:
More case studies / 8:
A nutshell example / 8.1:
Shape invariant modeling / 8.2:
Comparison of point configurations / 8.3:
The cyclodecane conformation / 8.3.1:
The Thomson problem / 8.3.2:
Notes on numerical optimization / 8.4:
References
Index
Preface
What is Data Analysis? / 1:
Tukey's 1962 paper / 1.1:
24.

電子ブック

EB
Jason Buffington
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : Sybex, 2010
所蔵情報: loading…
目次情報: 続きを見る
Data Protection Overview / 1:
Measuring Risk / 2:
The Layers of Data Protection / 3:
Better Backups and DPM 2010 / 4:
File Services / 5:
Windows Clustering / 6:
Exchange Replication / 7:
SQL Mirroring / 8:
Virtualization / 9:
Management / 10:
Monitoring / 11:
Disaster Recovery and Business Continuity / 12:
Data Protection Overview / 1:
Measuring Risk / 2:
The Layers of Data Protection / 3:
25.

電子ブック

EB
Paulraj Ponniah
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Inc., 2010
所蔵情報: loading…
目次情報: 続きを見る
Preface
Overview And Concepts / Part 1:
The Compelling Need for Data Warehousing / 1:
Chapter Objectives
Escalating Need for Strategic Information
Failures of Past Decision Support Systems
Operational Versus Decision-Support Systems
Data Warehousing--The Only Viable Solution
Data Warehouse Defined
The Data Warehousing Movement
Evolution of Business Intelligence
Chapter Summary
Review Questions
Exercises
Data Warehouse: The Building Blocks / 2:
Defining Features
Data Warehouses and Data Marts
Architectural Types
Overview of Components
Metadata in the Data Warehouse
Trends in Data Warehousing / 3:
Continued Growth in Data Warehousing
Data Warehousing has Become Mainstream
Data Warehouse Expansion
Vendor Solutions and Products
Significant Trends
Real-Time Data Warehousing
Multiple Data Types
Data Visualization
Emergence of Standards
Web-Enabled Data Warehouse
Planning And Requirements / Part 2:
Planning and Project Management / 4:
Planning Your Data Warehouse
The Data Warehouse Project
The Project Team
Project Management Considerations
Defining the Business Requirements / 5:
Dimensional Analysis
Information Packages?A Useful Concept
Requirements Gathering Methods
Requirements Definition: Scope and Content
Requirements as the Driving Force for Data Warehousing / 6:
Data Design
The Architectural Plan
Data Storage Specifications
Information Delivery Strategy
Architecture And Infrastructure / Part 3:
The Architectural Components / 7:
Understanding Data Warehouse Architecture
Distinguishing Characteristics
Architectural Framework
Technical Architecture
Infrastructure as the Foundation for Data Warehousing / 8:
Infrastructure Supporting Architecture
Hardware and Operating Systems
Database Software
Collection of Tools
Data Warehouse Appliances
The Significant Role of Metadata / 9:
Why Metadata is Important
Metadata Types by Functional Areas
Business Metadata
Technical Metadata
How to Provide Metadata
Data Design And Data Preparation / Part 4:
Principles of Dimensional Modeling / 10:
From Requirements to Data Design
The STAR Schema
STAR Schema Keys
Advantages of the STAR Schema
STAR Schema: Examples
Dimensional Modeling: Advanced Topics / 11:
Updates to the Dimension Tables
Miscellaneous Dimensions
The Snowflake Schema
Aggregate Fact Tables
Families of STARS
Data Extraction, Transformation, and Loading / 12:
ETL Overview
Data Extraction
Data Transformation
Data Loading
ETL Summary
Other Integration Approaches
Data Quality: A key to Success / 13:
Why is Data Quality Critical?
Data Quality Challenges
Data Quality Tools
Data Quality Initiative
Master Data Management
Information Access And Delivery / Part 5:
Matching Information to the Classes of Users / 14:
Information from the Data Warehouse
Who Will Use the Information?
Information Delivery
Information Delivery Tools
Information Delivery: Special Topics
OLAP in the Data Warehouse / 15:
Demand for Online Analytical Processing
Major Features and Functions
OLAP Models
OLAP Implementation Considerations
Data Warehousing and the Web / 16:
Web-Based Information Delivery
OLAP and the Web
Building a Web-Enabled Data Warehouse
Data Mining Basics / 17:
What is Data Mining?
Major Data Mining Techniques
Data Mining Applications
Implementation And Maintenance / Part 6:
The Physical Design Process / 18:
Physical Design Steps
Physical Design Considerations
Physical Storage
Indexing the Data Warehouse
Performance Enhancement Techniques
Data Warehouse Deployment / 19:
Data Warehouse Testing
Major Deployment Activities
Considerations for a Pilot
Security
Backup and Recovery
Growth and Maintenance / 20:
Monitoring the Data Warehouse
User Training and Support
Managing the Data Warehouse
Answers to Selected Exercises
Project Life Cycle Steps and Checklists / Appendix A:
Critical Factors for Success / Appendix B:
Guidelines for Evaluating Vendor Solutions / Appendix C:
Highlights of Vendors and Products / Appendix D:
Real-World Examples of Best Practices / Appendix E:
References
Glossary
Index
Preface
Overview And Concepts / Part 1:
The Compelling Need for Data Warehousing / 1:
26.

電子ブック

EB
Vicki Lynn Sauter
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2011
所蔵情報: loading…
目次情報: 続きを見る
Introduction to Decision Support Systems / I:
Introduction / Chapter 1:
Decision Making / Chapter 2:
DSS Components / II:
The Data Component / Chapter 3:
The Model Component / Chapter 4:
Intelligence and Decision Support Systems
The User Interface / Chapter 5:
Issues of Design / III:
International Decision Support Systems / Chapter 6:
Designing a Decision Support System / Chapter 7:
Object Oriented Technologies and Decision Support Systems Design / Chapter 8:
Implementation Strategy / Chapter 9:
Extension of Decision Support Systems / IV:
Executive Systems and Dashboards / Chapter 10:
Group Decision Support Systems / Chapter 11:
Introduction to Decision Support Systems / I:
Introduction / Chapter 1:
Decision Making / Chapter 2:
27.

電子ブック

EB
Distributed Intelligence in Design Symposium, Tuba Kocatark, Tuba Kocaturk, Tuba Kocat?�Nurk, Tuba Kocat?urk, Tuba Kocat?urk, Tuba Kocat?rk, Benachir Medjdoub, Mediated Intelligence in Design.
出版情報: Wiley Online Library - AutoHoldings Books , Chichester : John Wiley & Sons, Inc., 2011
所蔵情報: loading…
目次情報: 続きを見る
Note on editors
List of contributors
Foreword / Paul Richens
Introduction: Distributed intelligence in design / Tuba Kocatürk ; Benachir Medjdoub
Part 1
Of sails and sieves and sticky tape / Bryan Lawson1:
Distributed perspectives for intelligent conceptual design / Volker Mueller2:
Distributed intelligence or a simple coherent mental model? / Chris J. K. Williams ; Roly Hudson3:
Sharing intelligence: The problem of knowledge atrophy / Peter Brandon4:
Part 2
Pedagogical frameworks for emergent digital practices in architecture / Brent Allpress5:
Emergence and convergence of knowledge in building production: Knowledge-based design and digital manufacturing / Eduardo Lyon6:
Artifact and affect: Open-ended strata of communication / Matias del Campo ; Sandra Manninger7:
Digital tools for creative hinges / Sean Hanna8:
Part 3
The effects of integrated BIM in processes and business models / Arto Kiviniemi9:
Integrated building design for production management systems / Rita Cristina Ferreira10:
Flexibility, semantics and standards / Robin Drogemuller ; John H. Frazer11:
Examples of distributed intelligence on large-scale building lifecycle projects / Martin Riese12:
Part 4
Rapid practice expansion through strategic design computation / Cristiano Ceccato13:
Algorithmic modelling, parametric thinking / Neil Katz14:
Interview with the Specialist Modelling Group (SMG): The dynamic coordination of distributed intelligence at Foster and Partners / Hugh Whitehead ; Xavier de Kestelier ; Irene Gallou15:
Interview with Lars Hesselgren, Director PLP Research / Lars Hesselgren16:
Geometry, topology, materiality: The structural parameters in a collaborative design approach / Manfred Grohmann ; Oliver Tessmann17:
Index
Note on editors page
Note on editors
List of contributors
Foreword / Paul Richens
28.

電子ブック

EB
Serge; Kordon, Fabrice; Pautet, Laurent; Petrucci, Laure Haddad, Serge Haddad
出版情報: Wiley Online Library - AutoHoldings Books , London : John Wiley & Sons, Inc., 2011
所蔵情報: loading…
29.

電子ブック

EB
Stefan G. Bucher, Brice Dunwoodie, Ric Shreves
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2011
所蔵情報: loading…
30.

電子ブック

EB
Mounir Frikha
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2011
所蔵情報: loading…
31.

電子ブック

EB
Thomas W. O'Gorman
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2012
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction / 1:
Why Use Adaptive Tests? / 1.1:
A Brief History of Adaptive Tests / 1.2:
The Adaptive Test of Hogg, Fisher, and Randies / 1.3:
Limitations of Rank-Based Tests / 1.4:
The Adaptive Weighted Least Squares Approach / 1.5:
Development of the Adaptive WLS Test / 1.6:
Smoothing Methods and Normalizing Transformations / 2:
Traditional Estimators of the Median and the Interquartile Range / 2.1:
Percentile Estimators that Use the Smooth Cumulative Distribution Function / 2.2:
Estimating the Bandwidth / 2.3:
Normalizing Transformations / 2.4:
The Weighting Algorithm / 2.5:
Computing the Bandwidth / 2.6:
Examples of Transformed Data / 2.7:
A Two-Sample Adaptive Test / 3:
A Two-Sample Model / 3.1:
Computing the Adaptive Weights / 3.2:
The Test Statistics for Adaptive Tests / 3.3:
Permutation Methods for Two-Sample Tests / 3.4:
An Example of a Two-Sample Test / 3.5:
R Code for the Two-Sample Test / 3.6:
Level of Significance of the Adaptive Test / 3.7:
Power of the Adaptive Test / 3.8:
Sample Size Estimation / 3.9:
A SAS Macro for the Adaptive Test / 3.10:
Modifications for One-Tailed Tests / 3.11:
Justification of the Weighting Method / 3.12:
Comments on the Adaptive Two-sample Test / 3.13:
Permutation Tests with Linear Models / 4:
Notation / 4.1:
Permutations with Blocking / 4.3:
Linear Models in Matrix Form / 4.4:
Permutation Methods / 4.5:
Permutation Test Statistics / 4.6:
An Important Rule of Test Construction / 4.7:
A Permutation Algorithm / 4.8:
A Performance Comparison of the Permutation Methods / 4.9:
Discussion / 4.10:
An Adaptive Test for a Subset of Coefficients / 5:
The General Adaptive Testing Method / 5.1:
Simple Linear Regression / 5.2:
An Example of a Simple Linear Regression / 5.3:
Multiple Linear Regression / 5.4:
An Example of a Test in Multiple Regression / 5.5:
Conclusions / 5.6:
More Applications of Adaptive Tests / 6:
The Completely Randomized Design / 6.1:
Tests for Randomized Complete Block Designs / 6.2:
Adaptive Tests for Two-way Designs / 6.3:
Dealing with Unequal Variances / 6.4:
Extensions to More Complex Designs / 6.5:
The Adaptive Analysis of Paired Data / 7:
The Adaptive Test of Miao and Gastwirth / 7.1:
An Adaptive Weighted Least Squares Test / 7.3:
An Example Using Paired Data / 7.4:
Simulation Study / 7.5:
Discussion of Tests for Paired Data / 7.6:
Multicenter and Cross-Over Trials / 8:
Tests in Multicenter Clinical Trials / 8.1:
Adaptive Analysis of Cross-over Trials / 8.2:
Adaptive Multivariate Tests / 9:
The Traditional Likelihood Ratio Test / 9.1:
An Adaptive Multivariate Test / 9.2:
An Example with Two Dependent Variables / 9.3:
Performance of the Adaptive Test / 9.4:
Conclusions for Multivariate Tests / 9.5:
Analysis of Repeated Measures Data / 10:
The Multivariate LR Test / 10.1:
The Adaptive Test / 10.3:
The Mixed Model Test / 10.4:
Two-Sample Tests / 10.5:
Two-Sample Tests for Parallelism / 10.6:
Two-Sample Tests for Group Effect / 10.7:
An Example of Repeated Measures Data / 10.8:
Dealing with Missing Data / 10.9:
Conclusions and Recommendations / 10.10:
Rank-Based Tests of Significance / 11:
The Quest for Power / 11.1:
Two-Sample Rank Tests / 11.2:
The HFR Test / 11.3:
Significance Level of Adaptive Tests / 11.4:
Biining's Adaptive Test for Location / 11.5:
An Adaptive Test for Location and Scale / 11.6:
Other Adaptive Rank Tests / 11.7:
Maximum Test / 11.8:
Adaptive Confidence Intervals and Estimates / 11.9:
The Relationship Between Tests and Confidence Intervals / 12.1:
The Iterative Procedure of Garthwaite / 12.2:
Confidence Interval for a Difference / 12.3:
A 95% Confidence Interval for Slope / 12.4:
A General Formula for Confidence Limits / 12.5:
Computing a Confidence Interval Using R / 12.6:
Computing a 95% Confidence Interval Using SAS / 12.7:
Adaptive Estimation / 12.8:
Adaptive Estimation of the Difference Between Two Population Means / 12.9:
Adaptive Estimation of a Slope in a Multiple Regression Model / 12.10:
Computing an Adaptive Estimate Using R / 12.11:
Computing an Adaptive Estimate Using SAS / 12.12:
Exercises / 12.13:
R Code for Univariate Adaptive Tests / Appendix A:
SAS Macro for Adaptive Tests / Appendix B:
SAS Macro for Multiple Comparisons Procedures / Appendix C:
R Code for Adaptive Tests with Blocking Factors / Appendix D:
R Code for Adaptive Test with Paired Data / Appendix E:
SAS Macro for Adaptive Test with Paired Data / Appendix F:
R Code for Multivariate Adaptive Tests / Appendix G:
R Code for Confidence Intervals and Estimates / Appendix H:
SAS Macro for Confidence Intervals / Appendix I:
SAS Macro for Estimates / Appendix J:
References
Index
Preface
Introduction / 1:
Why Use Adaptive Tests? / 1.1:
32.

電子ブック

EB
Eiji Oki, Roberto Rojas-Cessa, Mallikarjun Tatipamula, Christian Vogt
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2012
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgments
About the Authors
Transmission Control Protocol/Internet Protocol Overview / 1:
Fundamental Architecture / 1.1:
Internet Protocol Basics / 1.2:
Packet Header / 1.2.1:
Internet Protocol Address / 1.2.2:
Internet Protocol Classification / 1.2.3:
Subnet and its Masking / 1.2.4:
Subnet Calculation / 1.2.5:
Routing / 1.3:
Routing across Providers / 1.3.1:
Routing within Edge Networks / 1.3.2:
Routing Scalability / 1.3.3:
References
Transport-Layer Protocols / 2:
Transmission Control Protocol / 2.1:
Transmission Control Protocol Header Structure / 2.1.1:
Three-Way Handshake / 2.1.2:
Transmission Control Protocol Flow Control and Congestion Control / 2.1.3:
Port Number / 2.1.4:
User Datagram Protocol / 2.2:
User Datagram Protocol Header Structure / 2.2.1:
Stream Control Transmission Protocol / 2.3:
Stream Control Transmission Protocol Packet Structure / 2.3.1:
Security: Prevention of SYN Attacks / 2.3.2:
Real-Time Transport Protocol / 2.4:
Real-Time Transport Protocol Header Structure / 2.4.1:
Internet Architecture / 3:
Internet Exchange Point / 3.1:
History of Internet Exchange Points / 3.2:
Internet Service Provider Interconnection Relationships / 3.3:
Peering and Transit / 3.4:
IP Routing Protocols / 4:
Overview of Routing Protocols / 4.1:
Interior Gateway Protocol / 4.1.1:
Exterior Gateway Protocol / 4.1.2:
Routing Information Protocol / 4.2:
Routing Information Protocol Header Format / 4.2.1:
Update of Routing Table in Routing Information Protocol / 4.2.2:
Maintenance of Routing Table in Routing Information Protocol / 4.2.3:
Split Horizon / 4.2.4:
Limitations of Routing Information Protocol / 4.2.5:
Open Shortest Path First / 4.3:
Shortest-Path Algorithm / 4.3.1:
Hierarchical Routing / 4.3.2:
Open Shortest Path First Packet Format / 4.3.3:
Comparison of Routing Information Protocol and Open Shortest Path First / 4.3.4:
Border Gateway Protocol / 4.4:
Border Gateway Protocol Message Flows / 4.4.1:
Border Gateway Protocol Policy Selection Attributes / 4.4.2:
Multiprotocol Label Switching / 5:
Overview / 5.1:
Functions and Mechanisms / 5.2:
Applicabilities / 5.3:
IP Quality Of Service / 6:
Introduction / 6.1:
Quality of Service in IP Version 4/75 / 6.2:
Integrated Services / 6.3:
Packet Scheduler / 6.3.1:
Packet Classifier / 6.3.2:
Admission Control / 6.3.3:
Resource Reservation Protocol (RSVP) / 6.3.4:
Differentiated Services / 6.4:
Quality Of Service with Nested Differentiated Services Levels / 6.5:
Drawbacks of Explicit Endpoint Admission Control with Path Selection / 6.5.1:
OSPF-Based Adaptive and Flexible Quality of Service Provisioning / 6.5.2:
Combination of Security and Quality of Service / 6.5.3:
Path Selection Algorithm Analysis / 6.5.4:
IP Multicast and Anycast / 7:
Addressing / 7.1:
Multicast Addressing / 7.1.1:
Differences between Multicasting and Multiple Unicasting / 7.1.2:
Multicast Routing / 7.2:
Optimal Routing: Shortest-Path Trees / 7.2.1:
Unicast Routing / 7.2.2:
Routing Protocols / 7.2.3:
Multicast Open Shortest Path First (MOSPF) / 7.3.1:
Distance Vector Multicast Routing Protocol / 7.3.2:
Core-Based Tree (CBT) Protocol / 7.3.3:
Protocol-Independent Multicast / 7.3.4:
Simple Multicast Routing Protocol / 7.3.5:
Anycasting / 7.4:
Architectural Issues / 7.4.1:
Anycast Addresses / 7.4.2:
Differences between the Services Offered by IP Multicasting and IP Anycasting / 7.4.3:
IPv6 Anycast Routing Protocol: Protocol-Independent Anycast-Sparse Mode / 7.5:
Layer-2 Transport over Packet / 8:
Draft-Martini Signaling and Encapsulation / 8.1:
Functionality / 8.1.1:
Encapsulation / 8.1.2:
Protocol-Specific Encapsulation / 8.1.3:
Layer-2 Tunneling Protocol / 8.2:
Layer-2 Tunneling Protocol Version 3 / 8.2.1:
Pseudowire Emulation Edge to Edge / 8.2.2:
Virtual Private Wired Service / 9:
Types of Private Wire Services / 9.1:
Layer-2 Virtual Private Services: Wide Area Networks and Local Area Networks / 9.1.1:
Virtual Private Wire Service / 9.1.2:
Virtual Private Multicast Service / 9.1.3:
IP-Only Layer-2 Virtual Private Network / 9.1.4:
Internet Protocol Security / 9.1.5:
Generic Routing Encapsulation / 9.2:
Layer-3 Virtual Private Network 2547bis, Virtual Router / 9.3:
Virtual Router Redundancy Protocol / 9.4.1:
IP and Optical Networking / 10:
IP/Optical Network Evolution / 10.1:
Where Networking Is Today / 10.1.1:
Where Networking Is Going / 10.1.2:
Challenges in Legacy Traditional IP/Optical Networks / 10.2:
Proprietary Network Management Systems / 10.2.1:
Complexity of Provisioning in Legacy IP/Optical Networks / 10.2.2:
Automated Provisioning in IP/Optical Networks / 10.3:
Control Plane Models for IP/Optical Networking / 10.4:
Optical Internetworking Forum's Optical User Network Interface: Overlay Model / 10.4.1:
Internet Engineering Task Force's Generalized Multiprotocol Label Switching: Peer Model / 10.4.2:
Next-Generation MultiLayer Network Design Requirements / 10.5:
Benefits and Challenges in IP/Optical Networking / 10.6:
IP Version 6 / 11:
Addresses in EP Version 6 / 11.1:
Unicast IP Addresses / 11.1.1:
Multicast IP Addresses / 11.1.2:
IP Packet Headers / 11.2:
IP Address Resolution / 11.3:
IP Version 6 Deployment: Drivers and Impediments / 11.4:
Need for Backwards Compatibility / 11.4.1:
Initial Deployment Drivers / 11.4.2:
Reaching a Critical Mass / 11.4.3:
IP Traffic Engineering / 12:
Models of Traffic Demands / 12.1:
Optimal Routing with Multiprotocol Label Switching / 12.2:
Applicability of Optimal Routing / 12.2.1:
Network Model / 12.2.3:
Optimal Routing Formulations with Three Models / 12.2.4:
Link-Weight Optimization with Open Shortest Path First / 12.3:
Examples of Routing Control with Link Weights / 12.3.1:
Link-Weight Setting Against Network Failure / 12.3.3:
Extended Shortest-Path-Based Routing Schemes / 12.4:
Smart-Open Shortest Path First / 12.4.1:
Two-Phase Routing / 12.4.2:
Fine Two-Phase Routing / 12.4.3:
Features of Routing Schemes / 12.4.4:
IP Network Security / 13:
Detection of Denial-of-Service Attack / 13.1:
Backscatter Analysis / 13.2.1:
Multilevel Tree or Online Packet Statistics / 13.2.2:
IP Traceback / 13.3:
IP Traceback Solutions / 13.3.1:
Edge Sampling Scheme / 13.4:
Advanced Marking Scheme / 13.5:
Mobility Support for IP / 14:
Mobility Management Approaches / 14.1:
Host Routes / 14.1.1:
Tunneling / 14.1.2:
Route Optimization / 14.1.3:
Security Threats Related to IP Mobility / 14.2:
Impersonation / 14.2.1:
Redirection-Based Hooding / 14.2.2:
Possible Solutions / 14.2.3:
Mobility Support in IPv6 / 14.3:
Reactive Versus Proactive Mobility Support / 14.4:
Relation to Multihoming / 14.5:
Protocols Supplementing Mobility / 14.6:
Router and Subnet Prefix Discovery / 14.6.1:
Movement Detection / 14.6.2:
IP Address Configuration / 14.6.3:
Neighbor Unreachability Detection / 14.6.4:
Internet Control Message Protocol for IP Version 6 / 14.6.5:
Optimizations / 14.6.6:
Media-Independent Handover Services / 14.6.7:
Index
Preface
Acknowledgments
About the Authors
33.

電子ブック

EB
Rajkumar Buyya, James Broberg, Rajkumar Buyya, Andrzej Goscinski, Andrz Go??sci??nski, Andrzej Go??sci??nski, Andrzej Go?sci?nski, Andrzej Go?sci?nski
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2011
所蔵情報: loading…
目次情報: 続きを見る
Preface
Contributors
Foundations / Part I:
Introduction to Cloud Computing / Willliam Voorsluys ; James Broberg ; Rajkumar Buyya1:
Migrating into a Cloud / T. S. Mohan2:
Enriching the "Integration as a Service" Paradigm for the Cloud Era / Pethuru Raj3:
Cloud Computing for Enterprise Applications / Tariq Ellahi ; Benoit Hudzia ; Hui Li ; Maik A. Lindner ; Philip Robinson4:
Infrastructure as a Service (IAAS) / Part II:
Virtual Machines Provisioning and Migration Services / Mohamed El-Refaey5:
On the Management of Virtual Machines for Cloud Infrastructures / Ignacio M. Llorente ; Rubn S. Montero ; Borja Sotomayor ; David Breitgand ; Alessandro Maraschini ; Eliezer Levy ; Benny Rochwerger6:
Enhancing Cloud Computing Environments Using a Cluster as a Service / Michael Brock ; Andrzej Goscinski7:
Secure Distributed Data Storage in Cloud Computing / Yu Chen ; Wei-Shinn Ku ; Jun Feng ; Pu Liu ; Zhou Su8:
Platform and Software as a Service (PAAS/IAAS) / Part III:
Aneka-Integration of Private and Public Clouds / Christian Vecchiola ; Xingchen Chu ; Michael Mattess9:
CometCloud: An Autonomic Cloud Engine / Hyunjoo Kim ; Manish Parashar10:
T-Systems' Cloud-Based Solutions for Business Applications / Michael Pauly11:
Workflow Engine for Clouds / Suraj Pandey ; Dileban Karunamoorthy12:
Understanding Scientific Applications for Cloud Environments / Shantenu Jha ; Daniel S. Katz ; Andre Luckow ; Andre Merzky ; Katerina Stamou13:
The MapReduce Programming Model and Implementations / Hai Jin ; Shadi Ibrahim ; Li Qi ; Haijun Cao ; Song Wu ; Xuanhua Shi14:
Monitoring and Management / Part IV:
An Architecture for Federated Cloud Computing / Constantino Vzquez ; David Hadas ; Massimo Villari ; Philippe Massonet ; Alex Galis ; Yaron Wolfsthal ; Kenneth Nagin|cLars Larsson ; Fermn Galn15:
SLA Management in Cloud Computing: A Service Provider's Perspective / Sumit Bose ; Anjaneyulu Padala ; Dheepak R A ; Sridhar Murthy ; Ganesan Malaiyandisamy16:
Performance Prediction for HPC on Clouds / Rocco Aversa ; Beniamino Di Martino ; Massimiliano Rak ; Salvatore Venticinque ; Umberto Villano17:
Applications / Part V:
Architecting Applications for the Amazon Cloud / Jinesh Varia18:
Massively Multiplayer Online Game Hosting on Cloud Resources / Vlad Nae ; Radu Prodan ; Alexandru Iosup19:
Building Content Delivery Networks Using Clouds / 20:
Resource Cloud Mashups / Lutz Schubert ; Matthias Assel ; Alexander Kipp ; Stefan Wesner21:
Governance and Case Studies / Part VI:
Organizational Readiness and Change Management in the Cloud Age / Robert Lam22:
Data Security in the Cloud / Susan Morrow23:
Legal Issues in Cloud Computing / Janine Anthony Bowen ; Esq24:
Achieving Production Readiness for Cloud Services / Wai-Kit Cheah ; Henry Kasim25:
Index
Preface
Contributors
Foundations / Part I:
34.

電子ブック

EB
Barrie A. Sosinsky
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2011
所蔵情報: loading…
35.

電子ブック

EB
Amnon H. Eden, J. Nicholson, Jonathan Nicholson
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2011
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Guide to the Reader
Codecharts
Propositions
Prologue
Motivation / 1:
Design Description Languages / 2:
Theory Versus Practice / 2.1:
Decidability / 2.2:
Abstraction / 2.3:
Elegance / 2.4:
An Overview of Codecharts / 3:
Object-Orientation / 3.1:
Visualization / 3.2:
Rigour / 3.3:
Automated Verifiability / 3.4:
Scalability / 3.5:
Genericity / 3.6:
Minimality / 3.7:
Information Neglect / 3.8:
UML Versus Codecharts / 4:
Historical Notes / 5:
Practice / Part I:
Modelling Small Programs / 6:
Modelling Individual Classes / 6.1:
Modelling Individual Methods / 6.2:
Modelling Properties / 6.3:
*Modelling Implementation Minutia / 6.4:
Modelling Simple Relations / 6.5:
Modelling Indirect Relations / 6.6:
*Subtyping / 6.7:
Modelling Large Programs / 7:
Modelling Sets of Classes / 7.1:
Modelling Total Relations Between Sets / 7.2:
Modelling Sets of Methods (Clans) / 7.3:
*Modelling Isomorphic Relations / 7.4:
Modelling Sets of Methods (Tribes) / 7.5:
Modelling Class Hierarchies / 7.6:
Modelling Methods in Hierarchies / 7.7:
Modelling Properties of Sets / 7.8:
*Case Study: Total Versus. Isomorphic / 7.9:
Case Study. JDOM / 7.10:
Case Study: Java 3D / 7.11:
*Modelling Industry-Scale Programs / 8:
Modelling Sets of Hierarchies / 8.1:
Modelling Sets of Sets of Methods (Clans) / 8.2:
Modelling Sets of Sets of Methods (Tribes) / 8.3:
Modelling Total Relations Revisited / 8.4:
Modelling Isomorphic Relations Revisited / 8.5:
Modelling Design Motifs / 9:
Modelling Application Frameworks / 10:
Case Study: Enterprise JavaBeans / 10.1:
Case Study: JUnit / 10.2:
Modelling Design Patterns / 11:
Case Study: The Composite Pattern / 11.1:
Case Study: The Iterator Pattern / 11.2:
Case Study: The Factory Method Pattern / 11.3:
*Case Study: The Abstract Factory Pattern / 11.4:
*Concluding Remarks / 11.5:
Modelling Early Design Revisited / 12:
*Advanced Modelling Techniques / 13:
Ad Hoc Symbols / 13.1:
Modelling Information Hiding / 13.2:
Theory / Part II:
Abstract Semantics / 14:
Finite Structures / 14.1:
Abstract Semantics Functions / 14.2:
Design Models / 14.3:
Program Modelling Revisited / 14.4:
Verification / 15:
Verifying Closed Specifications / 15.1:
Verifying Open Specifications / 15.2:
Verifying Pattern Implementations / 15.3:
Tool Support for Automated Verification / 15.4:
*Schemas / 16:
LePUS3 in Classical Logic / 17:
LePUS3 and Class?Z as First-Order Languages / 17.1:
Specifications in the Predicate Logic / 17.2:
The Axioms of Class-Based Programs / 17.3:
Reasoning about Charts / 18:
The Gang of Four Companion / Appendix I:
Formal Definitions / Appendix II:
UML Quick Reference / Appendix III:
References
Index
Preface
Acknowledgements
Guide to the Reader
36.

電子ブック

EB
Robert Caiming Qiu, Zhen Hu, Husheng Li, Michael C. Wicks
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2012
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction / 1:
Vision: "Big Data" / 1.1:
Cognitive Radio: System Concepts / 1.2:
Spectrum Sensing Interface and Data Structures / 1.3:
Mathematical Machinery / 1.4:
Convex Optimization / 1.4.1:
Game Theory / 1.4.2:
"Big Data" Modeled as Large Random Matrices / 1.4.3:
Sample Covariance Matrix / 1.5:
Large Sample Covariance Matrices of Spiked Population Models / 1.6:
Random Matrices and Noncommutative Random Variables / 1.7:
Principal Component Analysis / 1.8:
Generalized Likelihood Ratio Test (GLRT) / 1.9:
Bregman Divergence for Matrix Nearness / 1.10:
Spectrum Sensing: Basic Techniques / 2:
Challenges / 2.1:
Energy Detection: No Prior Information about Deterministic or Stochastic Signal / 2.2:
Detection in White Noise: Lowpass Case / 2.2.1:
Time-Domain Representation of the Decision Statistic / 2.2.2:
Spectral Representation of the Decision Statistic / 2.2.3:
Detection and False Alarm Probabilities over AWGN Channels / 2.2.4:
Expansion of Random Process in Orthonormal Series with Uncorrelated Coefficients: The Karhunen-Loeve Expansion / 2.2.5:
Spectrum Sensing Exploiting Second-Order Statistics / 2.3:
Signal Detection Formulation / 2.3.1:
Wide-Sense Stationary Stochastic Process: Continuous-Time / 2.3.2:
Nonstationary Stochastic Process: Continuous-Time / 2.3.3:
Spectrum Correlation-Based Spectrum Sensing for WSS Stochastic Signal: Heuristic Approach / 2.3.4:
Likelihood Ratio Test of Discrete-Time WSS Stochastic Signal / 2.3.5:
Asymptotic Equivalence between Spectrum Correlation and Likelihood Ratio Test / 2.3.6:
Likelihood Ratio Test of Continuous-Time Stochastic Signals in Noise: Selin's Approach / 2.3.7:
Statistical Pattern Recognition: Exploiting Prior Information about Signal through Machine Learning / 2.4:
Karhunen-Loeve Decomposition for Continuous-Time Stochastic Signal / 2.4.1:
Feature Template Matching / 2.5:
Cyclostationary Detection / 2.6:
Classical Detection / 3:
Formalism of Quantum Information / 3.1:
Hypothesis Detection for Collaborative Sensing / 3.2:
The Data Matrix / 3.3:
Random Matrices with Independent Rows / 3.4:
The Multivariate Normal Distribution / 3.5:
Sample Covariance Matrix Estimation and Matrix Compressed Sensing / 3.6:
The Maximum Likelihood Estimation / 3.6.1:
Likelihood Ratio Test (Wilks' Test) for Multisample Hypotheses / 3.6.2:
Likelihood Ratio Test / 3.7:
General Gaussian Detection and Estimator-Correlator Structure / 3.7.1:
Tests with Repeated Observations / 3.7.2:
Detection Using Sample Covariance Matrices / 3.7.3:
GLRT for Multiple Random Vectors / 3.7.4:
Linear Discrimination Functions / 3.7.5:
Detection of Correlated Structure for Complex Random Vectors / 3.7.6:
Hypothesis Detection of Noncommutative Random Matrices / 4:
Why Noncommutative Random Matrices? / 4.1:
Partial Orders of Covariance Matrices: A < B / 4.2:
Partial Ordering of Completely Positive Mappings: (A) < (B) / 4.3:
Partial Ordering of Matrices Using Majorization: A ϒ B / 4.4:
Partial Ordering of Unitarily Invariant Norms: |||A||| < |||B||| / 4.5:
Partial Ordering of Positive Definite Matrices of Many Copies: K k=1 Ak ≤ K k=1 Bk / 4.6:
Partial Ordering of Positive Operator Valued Random Variables: Prob(A ≤ X ≤ B) / 4.7:
Partial Ordering Using Stochastic Order: A ≤st B / 4.8:
Quantum Hypothesis Detection / 4.9:
Quantum Hypothesis Testing for Many Copies / 4.10:
Large Random Matrices / 5:
Large Dimensional Random Matrices: Moment Approach, Stieltjes Transform and Free Probability / 5.1:
Spectrum Sensing Using Large Random Matrices / 5.2:
System Model / 5.2.1:
Marchenko-Pastur Law / 5.2.2:
Moment Approach / 5.3:
Limiting Spectral Distribution / 5.3.1:
Limits of Extreme Eigenvalues / 5.3.2:
Convergence Rates of Spectral Distributions / 5.3.3:
Standard Vector-In, Vector-Out Model / 5.3.4:
Generalized Densities / 5.3.5:
Stieltjes Transform / 5.4:
Basic Theorems / 5.4.1:
Large Random Hankel, Markov and Toepltiz Matrices / 5.4.2:
Information Plus Noise Model of Random Matrices / 5.4.3:
Generalized Likelihood Ratio Test Using Large Random Matrices / 5.4.4:
Detection of High-Dimensional Signals in White Noise / 5.4.5:
Eigenvalues of (A + B)−1B and Applications / 5.4.6:
Canonical Correlation Analysis / 5.4.7:
Angles and Distances between Subspaces / 5.4.8:
Multivariate Linear Model / 5.4.9:
Equality of Covariance Matrices / 5.4.10:
Multiple Discriminant Analysis / 5.4.11:
Case Studies and Applications / 5.5:
Fundamental Example of Using Large Random Matrix / 5.5.1:
Free Deconvolution / 5.5.2:
Optimal Precoding of MIMO Systems / 5.5.4:
Marchenko and Pastur's Probability Distribution / 5.5.5:
Convergence and Fluctuations Extreme Eigenvalues / 5.5.6:
Information plus Noise Model and Spiked Models / 5.5.7:
Hypothesis Testing and Spectrum Sensing / 5.5.8:
Energy Estimation in a Wireless Network / 5.5.9:
Multisource Power Inference / 5.5.10:
Target Detection, Localization, and Reconstruction / 5.5.11:
State Estimation and Malignant Attacker in the Smart Grid / 5.5.12:
Covariance Matrix Estimation / 5.5.13:
Deterministic Equivalents / 5.5.14:
Local Failure Detection and Diagnosis / 5.5.15:
Regularized Estimation of Large Covariance Matrices / 5.6:
Regularized Covariance Estimates / 5.6.1:
Banding the Inverse / 5.6.2:
Covariance Regularization by Thresholding / 5.6.3:
Regularized Sample Covariance Matrices / 5.6.4:
Optimal Rates of Convergence for Covariance Matrix Estimation / 5.6.5:
Banding Sample Autocovariance Matrices of Stationary Processes / 5.6.6:
Free Probability / 5.7:
Large Random Matrices and Free Convolution / 5.7.1:
Vandermonde Matrices / 5.7.2:
Convolution and Deconvolution with Vandermonde Matrices / 5.7.3:
Finite Dimensional Statistical Inference / 5.7.4:
Linear Programming / 6:
Quadratic Programming / 6.2:
Semidefinite Programming / 6.3:
Geometric Programming / 6.4:
Lagrange Duality / 6.5:
Optimization Algorithm / 6.6:
Interior Point Methods / 6.6.1:
Stochastic Methods / 6.6.2:
Robust Optimization / 6.7:
Multiobjective Optimization / 6.8:
Optimization for Radio Resource Management / 6.9:
Examples and Applications / 6.10:
Spectral Efficiency for Multiple Input Multiple Output Ultra-Wideband Communication System / 6.10.1:
Wideband Waveform Design for Single Input Single Output Communication System with Noncoherent Receiver / 6.10.2:
Wideband Waveform Design for Multiple Input Single Output Cognitive Radio / 6.10.3:
Wideband Beamforming Design / 6.10.4:
Layering as Optimization Decomposition for Cognitive Radio Network / 6.10.5:
Summary / 6.11:
Machine Learning / 7:
Unsupervised Learning / 7.1:
Centroid-Based Clustering / 7.1.1:
k-Nearest Neighbors / 7.1.2:
Independent Component Analysis / 7.1.3:
Nonnegative Matrix Factorization / 7.1.5:
Self-Organizing Map / 7.1.6:
Supervised Learning / 7.2:
Linear Regression / 7.2.1:
Logistic Regression / 7.2.2:
Artificial Neural Network / 7.2.3:
Decision Tree Learning / 7.2.4:
Naive Bayes Classifier / 7.2.5:
Support Vector Machines / 7.2.6:
Semisupervised Learning / 7.3:
Constrained Clustering / 7.3.1:
Co-Training / 7.3.2:
Graph-Based Methods / 7.3.3:
Transductive Inference / 7.4:
Transfer Learning / 7.5:
Active Learning / 7.6:
Reinforcement Learning / 7.7:
Q-Learning / 7.7.1:
Markov Decision Process / 7.7.2:
Partially Observable MDPs / 7.7.3:
Kernel-Based Learning / 7.8:
Dimensionality Reduction / 7.9:
Kernel Principal Component Analysis / 7.9.1:
Multidimensional Scaling / 7.9.2:
Isomap / 7.9.3:
Locally-Linear Embedding / 7.9.4:
Laplacian Eigenmaps / 7.9.5:
Semidefinite Embedding / 7.9.6:
Ensemble Learning / 7.10:
Markov Chain Monte Carlo / 7.11:
Filtering Technique / 7.12:
Kalman Filtering / 7.12.1:
Particle Filtering / 7.12.2:
Collaborative Filtering / 7.12.3:
Bayesian Network / 7.13:
Agile Transmission Techniques (I): Multiple Input Multiple Output / 7.14:
Benefits of MIMO / 8.1:
Array Gain / 8.1.1:
Diversity Gain / 8.1.2:
Multiplexing Gain / 8.1.3:
Space Time Coding / 8.2:
Space Time Block Coding / 8.2.1:
Space Time Trellis Coding / 8.2.2:
Layered Space Time Coding / 8.2.3:
Multi-User MIMO / 8.3:
Space-Division Multiple Access / 8.3.1:
MIMO Broadcast Channel / 8.3.2:
MIMO Multiple Access Channel / 8.3.3:
MIMO Interference Channel / 8.3.4:
MIMO Network / 8.4:
MIMO Cognitive Radio Network / 8.5:
Agile Transmission Techniques (II): Orthogonal Frequency Division Multiplexing / 8.6:
OFDM Implementation / 9.1:
Synchronization / 9.2:
Channel Estimation / 9.3:
Peak Power Problem / 9.4:
Adaptive Transmission / 9.5:
Spectrum Shaping / 9.6:
Orthogonal Frequency Division Multiple Access / 9.7:
MIMO OFDM / 9.8:
OFDM Cognitive Radio Network / 9.9:
Basic Concepts of Games / 9.10:
Elements of Games / 10.1.1:
Nash Equilibrium: Definition and Existence / 10.1.2:
Nash Equilibrium: Computation / 10.1.3:
Nash Equilibrium: Zero-Sum Games / 10.1.4:
Nash Equilibrium: Bayesian Case / 10.1.5:
Nash Equilibrium: Stochastic Games / 10.1.6:
Primary User Emulation Attack Games / 10.2:
PUE Attack / 10.2.1:
Two-Player Case: A Strategic-Form Game / 10.2.2:
Game in Queuing Dynamics: A Stochastic Game / 10.2.3:
Games in Channel Synchronization / 10.3:
Background of the Game / 10.3.1:
Game Formulation / 10.3.2:
Bayesian Equilibrium / 10.3.4:
Numerical Results / 10.3.5:
Games in Collaborative Spectrum Sensing / 10.4:
False Report Attack / 10.4.1:
Elements of Game / 10.4.2:
Cognitive Radio Network / 10.4.4:
Basic Concepts of Networks / 11.1:
Network Architecture / 11.1.1:
Network Layers / 11.1.2:
Cross-Layer Design / 11.1.3:
Main Challenges in Cognitive Radio Networks / 11.1.4:
Complex Networks / 11.1.5:
Channel Allocation in MAC Layer / 11.2:
Problem Formulation / 11.2.1:
Scheduling Algorithm / 11.2.2:
Solution / 11.2.3:
Discussion / 11.2.4:
Scheduling in MAC Layer / 11.3:
Network Model / 11.3.1:
Goal of Scheduling / 11.3.2:
Performance of the CNC Algorithm / 11.3.3:
Distributed Scheduling Algorithm / 11.3.5:
Routing in Network Layer / 11.4:
Challenges of Routing in Cognitive Radio / 11.4.1:
Stationary Routing / 11.4.2:
Dynamic Routing / 11.4.3:
Congestion Control in Transport Layer / 11.5:
Congestion Control in Internet / 11.5.1:
Challenges in Cognitive Radio / 11.5.2:
Preface
Introduction / 1:
Vision: "Big Data" / 1.1:
37.

電子ブック

EB
Theo; Gijsenij, Arjan; van de Weijer, Joost; Geusebroek, Jan-Mark Gevers, Jan-Mark Geusebroek, Theo Gevers, Arjan Gijsenij, Joost van de Weijer
出版情報: Wiley Online Library - AutoHoldings Books , Chicester : John Wiley & Sons, Incorporated, 2012
所蔵情報: loading…
38.

電子ブック

EB
Geof H. Givens, Jennifer A. Hoeting, Jennifer Ann Hoeting
出版情報: Wiley Online Library - AutoHoldings Books , Chicester : John Wiley & Sons, Inc., 2012
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgments
Review / 1:
Mathematical notation / 1.1:
Taylor's theorem and mathematical limit theory / 1.2:
Statistical notation and probability distributions / 1.3:
Likelihood inference / 1.4:
Bayesian inference / 1.5:
Statistical limit theory / 1.6:
Markov chains / 1.7:
Computing / 1.8:
Optimization / Part I:
Optimization and Solving Nonlinear Equations / 2:
Univariate problems / 2.1:
Multivariate problems / 2.2:
Problems
Combinatorial Optimization / 3:
Hard problems and NP-completeness / 3.1:
Local search / 3.2:
Simulated annealing / 3.3:
Genetic algorithms / 3.4:
Tabu algorithms / 3.5:
EM Optimization Methods / 4:
Missing data, marginalization, and notation / 4.1:
The EM algorithm / 4.2:
EM Variants / 4.3:
Integration and Simulation / Part II:
Numerical Integration / 5:
Newton-Côtes quadrature / 5.1:
Romberg integration / 5.2:
Gaussian quadrature / 5.3:
Frequently encountered problems / 5.4:
Simulation and Monte Carlo Integration / 6:
Introduction to the Monte Carlo method / 6.1:
Approximate Simulation / 6.3:
Variance reduction techniques / 6.4:
Markov Chain Monte Carlo / 7:
Metropolis-Hastings algorithm / 7.1:
Gibbs sampling / 7.2:
Implementation / 7.3:
Advanced Topics in MCMC / 8:
Adaptive MCMC / 8.1:
Reversible Jump MCMC / 8.2:
Auxiliary variable methods / 8.3:
Other Metropolis Hastings Algorithms / 8.4:
Perfect sampling / 8.5:
Markov chain maximum likelihood / 8.6:
Example: MCMC for Markov random fields / 8.7:
Approximating Distributions / Part III:
Bootstrapping / 9:
The bootstrap principle / 9.1:
Basic methods / 9.2:
Bootstrap inference / 9.3:
Reducing Monte Carlo error / 9.4:
Bootstrapping dependent data / 9.5:
Bootstrap performance / 9.6:
Other uses of the bootstrap / 9.7:
Permutation tests / 9.8:
Density Estimation And Smoothing / Part IV:
Nonparametric Density Estimation / 10:
Measures of performance / 10.1:
Kernel density estimation / 10.2:
Nonkernel methods / 10.3:
Multivariate methods / 10.4:
Bivariate Smoothing / 11:
Predictor-response data / 11.1:
Linear smoothers / 11.2:
Comparison of linear smoothers / 11.3:
Nonlinear smoothers / 11.4:
Confidence bands / 11.5:
General bivariate data / 11.6:
Multivariate Smoothing / 12:
General multivariate data / 12.1:
Data Acknowledgments
References
Index
Preface
Acknowledgments
Review / 1:
39.

電子ブック

EB
Mischa Dohler, Yonghui Li
出版情報: Wiley Online Library - AutoHoldings Books , Chichester : John Wiley & Sons, Incorporated, 2010
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction / 1:
Book Structure / 1.1:
Quick Introduction / 1.2:
Application Scenarios / 1.3:
Pros & Cons of Cooperation / 1.4:
Cooperative Performance Bounds / 1.5:
Definitions & Terminology / 1.6:
Background & Milestones / 1.7:
Concluding Remarks / 1.8:
Wireless Relay Channel / 2:
Introductory Note / 2.1:
General Characteristics & Trends / 2.2:
Regenerative Relaying Channel / 2.3:
Transparent Relaying Channel / 2.4:
Distributed MIMO Channel / 2.5:
Transparent Relaying Techniques / 2.6:
Transparent Relaying Protocols / 3.1:
Transparent Space-Time Processing / 3.3:
Distributed System Optimization / 3.4:
Regenerative Relaying Techniques / 3.5:
Regenerative Relay Protocols / 4.1:
Distributed Space-Time Coding / 4.3:
Distributed Network Coding / 4.4:
Hardware Issues / 4.5:
Analog Hardware Transceivers / 5.1:
Digital Hardware Transceivers / 5.3:
Architectural Comparisons / 5.4:
Complexity of 3G UMTS Voice/HSDPA Relay / 5.5:
Complexity of LTE/WiMAX Relay / 5.6:
Hardware Demonstrators / 5.7:
Conclusions & Outlook / 5.8:
Contributions / 6.1:
Real-World Impairments / 6.2:
Open Research Problems / 6.3:
Business Challenges / 6.4:
Bibliography
Abbreviations
Functions
Symbols
Pros and Cons of Cooperation
Definitions and Terminology
Background and Milestones
General Characteristics and Trends
Conclusions and Outlook
References
Index
Preface
Introduction / 1:
Book Structure / 1.1:
40.

電子ブック

EB
Fayez Gebali
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2011
所蔵情報: loading…
41.

電子ブック

EB
Tammy Noergaard
出版情報: Elsevier ScienceDirect Books Complete , Newnes, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Acknowledgments
About the Author
Introduction to Embedded Systems / Section I:
A Systems Engineering Approach to Embedded Systems Design / Chapter 1:
Know Your Standards / Chapter 2:
Embedded Hardware / Section II:
Embedded Hardware Building Blocks and the Embedded Board / Chapter 3:
Embedded Processors / Chapter 4:
Board Memory / Chapter 5:
Board I/O (Input/Output) / Chapter 6:
Board Buses / Chapter 7:
Embedded Software Introduction / Section III:
Device Drivers / Chapter 8:
Embedded Operating Systems / Chapter 9:
Middleware and Application Software / Chapter 10:
Putting It All Together: Design and Development / Section IV:
Defining the System-Creating the Architecture and Documenting the Design / Chapter 11:
The Final Phases of Embedded Design: Implementation and Testing / Chapter 12:
Projects and Exercises / Appendix A:
Schematic Symbols / Appendix B:
Acronyms and Abbreviations / Appendix C:
Glossary / Appendix D:
Index
What's on the CD-ROM
Foreword
Acknowledgments
About the Author
42.

電子ブック

EB
Bruno Clerckx, Claude Oestges
出版情報: Elsevier ScienceDirect Books Complete , Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Introduction to multi-antenna communications / Chapter 1:
From Multi-Dimensional Propagation to Multi-Link MIMO Channels / Chapter 2:
Analytical MIMO Channel Representations For System Design / Chapter 3:
Physical MIMO Channel Models For Performance Simulation / Chapter 4:
Mutual information and capacity of real-world random MIMO channels / Chapter 5:
Space-time coding over i.i.d. Rayleigh flat fading channels / Chapter 6:
MIMO Detection Fundamentals / Chapter 7:
Error probability in real-world MIMO channels / Chapter 8:
Space-time coding over real-world MIMO channels with no transmit channel knowledge / Chapter 9:
Space-time coding with Partial transmit channel knowledge / Chapter 10:
Space-time coding for frequency selective channels / Chapter 11:
Multi-user MIMO / Chapter 12:
Cooperative Multi-Cell MIMO: an Overview / Chapter 13:
Cooperative Multi-Cell MIMO with no Data Sharing / Chapter 14:
Cooperative Multi-Cell MIMO with Data Sharing / Chapter 15:
MIMO in LTE and WiMAX / Chapter 16:
MIMO System Level Evaluation / Chapter 17:
Introduction to multi-antenna communications / Chapter 1:
From Multi-Dimensional Propagation to Multi-Link MIMO Channels / Chapter 2:
Analytical MIMO Channel Representations For System Design / Chapter 3:
43.

電子ブック

EB
David Kleidermacher, Mike Kleidermacher
出版情報: Elsevier ScienceDirect Books Complete , Burlington : Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgements
Introduction to Embedded Systems Security / Chapter 1:
What is Security? / 1.1:
What is an Embedded System? / 1.2:
Embedded Security Trends / 1.3:
Embedded Systems Complexity / 1.3.1:
Network Connectivity / 1.3.2:
Reliance on Embedded Systems for Critical Infrastructure / 1.3.3:
Sophisticated Attackers / 1.3.4:
Processor Consolidation / 1.3.5:
Security Policies / 1.4:
Perfect Security / 1.4.1:
Confidentiality, Integrity, and Availability / 1.4.2:
Isolation / 1.4.3:
Information Flow Control / 1.4.4:
Physical Security Policies / 1.4.5:
Apphcation-Specific Policies / 1.4.6:
Security Threats / 1.5:
Case Study: VxWorks Debug Port Vulnerability / 1.5.1:
Wrap-up / 1.6:
Key Points / 1.7:
Bibliography and Notes / 1.8:
Systems Software Considerations / Chapter 2:
The Role of the Operating System / 2.1:
Multiple Independent Levels of Security / 2.2:
Information Flow / 2.2.1:
Data Isolation / 2.2.2:
Damage Limitation / 2.2.3:
Periods Processing / 2.2.4:
Always Invoked / 2.2.5:
Tamper Proof / 2.2.6:
Evaluable / 2.2.7:
Microkernel versus Monolith / 2.3:
Case Study: The Duqu Virus / 2.3.1:
Core Embedded Operating System Security Requirements / 2.4:
Memory Protection / 2.4.1:
Virtual Memory / 2.4.2:
Fault Recovery / 2.4.3:
Guaranteed Resources / 2.4.4:
Virtual Device Drivers / 2.4.5:
Impact of Determinism / 2.4.6:
Secure Scheduling / 2.4.7:
Access Control and Capabilities / 2.5:
Case Study: Secure Web Browser / 2.5.1:
Granularity versus Simplicity of Access Controls / 2.5.2:
Whitelists versus Blacklists / 2.5.3:
Confused Deputy Problem / 2.5.4:
Capabilities versus Access Control Lists / 2.5.5:
Capability Confinement and Revocation / 2.5.6:
Secure Design Using Capabilities / 2.5.7:
Hypervisors and System Virtualization / 2.6:
Introduction to System Virtualization / 2.6.1:
Applications of System Virtualization / 2.6.2:
Environment Sandboxing / 2.6.3:
Virtual Security Appliances / 2.6.4:
Hypervisor Architectures / 2.6.5:
Paravirtualization / 2.6.6:
Leveraging Hardware Assists for Virtualization / 2.6.7:
Hypervisor Security / 2.6.8:
I/O Virtualization / 2.7:
The Need for Shared I/O / 2.7.1:
Emulation / 2.7.2:
Pass-through / 2.7.3:
Shared IOMMU / 2.7.4:
IOMMUs and Virtual Device Drivers / 2.7.5:
Secure I/O Virtualization within Microkernels / 2.7.6:
Remote Management / 2.8:
Security Implications / 2.8.1:
Assuring Integrity of the TCB / 2.9:
Trusted Hardware and Supply Chain / 2.9.1:
Secure Boot / 2.9.2:
Static versus Dynamic Root of Trust / 2.9.3:
Remote Attestation / 2.9.4:
Secure Embedded Software Development / 2.10:
Introduction to PHASE-Principles of High-Assurance Software Engineering / 3.1:
Minimal Implementation / 3.2:
Component Architecture / 3.3:
Runtime Componentization / 3.3.1:
A Note on Processes versus Threads / 3.3.2:
Least Privilege / 3.4:
Secure Development Process / 3.5:
Change Management / 3.5.1:
Peer Reviews / 3.5.2:
Development Tool Security / 3.5.3:
Secure Coding / 3.5.4:
Software Testing and Verification / 3.5.5:
Development Process Efficiency / 3.5.6:
Independent Expert Validation / 3.6:
Common Criteria / 3.6.1:
Case Study: Operating System Protection Profiles / 3.6.2:
Case Study: HAWS-High-Assurance Web Server / 3.7:
Model-Driven Design / 3.7.1:
Introduction to MDD / 3.8.1:
Executable Models / 3.8.2:
Modeling Languages / 3.8.3:
Types of MDD Platforms / 3.8.4:
Case Study: A Digital Pathology Scanner / 3.8.5:
Selecting an MDD Platform / 3.8.6:
Using MDD in Safety-and Security-Critical Systems / 3.8.7:
Embedded Cryptography / 3.9:
Introduction / 4.1:
U.S. Government Cryptographic Guidance / 4.2:
NSA Suite B / 4.2.1:
The One-Time Pad / 4.3:
Cryptographic Synchronization / 4.3.1:
Cryptographic Modes / 4.4:
Output Feedback / 4.4.1:
Cipher Feedback / 4.4.2:
OFB with CFB Protection / 4.4.3:
Traffic Flow Security / 4.4.4:
Counter Mode / 4.4.5:
Block Ciphers / 4.5:
Additional Cryptographic Block Cipher Modes / 4.5.1:
Authenticated Encryption / 4.6:
CCM / 4.6.1:
Galois Counter Mode / 4.6.2:
Public Key Cryptography / 4.7:
RSA / 4.7.1:
Equivalent Key Strength / 4.7.2:
Trapdoor Construction / 4.7.3:
Key Agreement / 4.8:
Man-in-the-Middle Attack on Diffie-Hellman / 4.8.1:
Public Key Authentication / 4.9:
Certificate Types / 4.9.1:
Elliptic Curve Cryptography / 4.10:
Elliptic Curve Digital Signatures / 4.10.1:
Elliptic Curve Anonymous Key Agreement / 4.10.2:
Cryptographic Hashes / 4.11:
Secure Hash Algorithm / 4.11.1:
MMO / 4.11.2:
Message Authentication Codes / 4.12:
Random Number Generation / 4.13:
True Random Number Generation / 4.13.1:
Pseudo-Random Number Generation / 4.13.2:
Key Management for Embedded Systems / 4.14:
Case Study: The Walker Spy Case / 4.14.1:
Key Management-Generalized Model / 4.14.2:
Key Management Case Studies / 4.14.3:
Cryptographic Certifications / 4.15:
FIPS 140-2 Certification / 4.15.1:
NSA Certification / 4.15.2:
Data Protection Protocols for Embedded Systems / 4.16:
Data-in-Motion Protocols / 5.1:
Generalized Model / 5.2.1:
Choosing the Network Layer for Security / 5.2.2:
Ethernet Security Protocols / 5.2.3:
BPsec versus SSL / 5.2.4:
IPsec / 5.2.5:
SSL/TLS / 5.2.6:
Embedded VPN Clients / 5.2.7:
DTLS / 5.2.8:
SSH / 5.2.9:
Custom Network Security Protocols / 5.2.10:
Application of Cryptography within Network Security Protocols / 5 2.11:
Secure Multimedia Protocols / 5.2.12:
Broadcast Security / 5.2.13:
Data-at-Rest Protocols / 5.3:
Choosing the Storage Layer for Security / 5.3.1:
Symmetric Encryption Algorithm Selection / 5.3.2:
Managing the Storage Encryption Key / 5 3 3:
Advanced Threats to Data Encryption Solutions / 5.3.4:
Emerging Applications / 5.4:
Embedded Network Transactions / 6.1:
Anatomy of a Network Transaction / 6.1.1:
State of Insecurity / 6.1.2:
Network-based Transaction Threats / 6 1 3:
Modern Attempts to Improve Network Transaction Security / 6.1.4:
Trustworthy Embedded Transaction Architecture / 6.1.5:
Automotive Security / 6.2:
Vehicular Security Threats and Mitigations / 6.2.1:
Secure Android / 6.3:
Android Security Retrospective / 6.3.1:
Android Device Rooting / 6.3.2:
Mobile Phone Data Protection: A Case Study of Defense-in-Depth / 6.3.3:
Android Sandboxing Approaches / 6.3.4:
Next-Generation Software-Defined Radio / 6.4:
Red-Black Separation / 6.4.1:
Software-Defined Radio Architecture / 6.4.2:
Enter Linux / 6.4.3:
Multi-Domain Radio / 6.4.4:
Index / 6.5:
Foreword
Preface
Acknowledgements
44.

電子ブック

EB
Magnus Olsson, Catherine Mulligan, Magnus Olsson
出版情報: Elsevier ScienceDirect Books Complete , Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
List of Abbreviations
Introduction - Background and Vision of EPC / Part I:
Mobile Broadband and the Core Network Evolution / Chapter 1:
A Global Standard / 1.1:
Origins of the Evolved Packet Core / 1.2:
3GPP Radio Access Technologies / 1.2.1:
3GPP2 Radio Access Technologies / 1.2.2:
SAE - Building Bridges Between Different Networks / 1.2.3:
A Shifting Value Chain / 1.3:
Terminology Used in This Book / 1.4:
Overview of EPS / Part II:
Architecture Overview / Chapter 2:
EPS Architecture / 2.1:
Basic LP Connectivity Over LTE Access / 2.1.1:
Adding More Advanced Functionality for LTE Access / 2.1.2:
Interworking Between LTE and GSM/GPRS or WCDMA/HSPA / 2.1.3:
Support for 3GPP Voice Services / 2.1.4:
Interworking Between LTE and CDMA Networks / 2.1.5:
Interworking Between 3GPP Access Technologies and Non-3GPP Access Technologies / 2.1.6:
Support for Broadcasting in Cellular Networks / 2.1.7:
Positioning Services / 2.1.8:
Optimizations for Small Cells and Local Access / 2.1.9:
Miscellaneous Features / 2.1.10:
Summary of the Architecture Overview / 2.1.11:
Mobile Network Radio Technologies / 2.2:
Overview of Radio Networks for Mobile Services / 2.2.1:
Radio Network Functionality / 2.2.2:
GSM / 2.2.3:
WCDMA / 2.2.4:
LTE / 2.2.5:
EPS Deployment Scenarios and Operator Cases / Chapter 3:
Scenario 1: Existing GSM/GPRS and/or WCDMA/HSPA Operators Deploying LTE/EPC / 3.1:
First Phase - Initial EPC Deployment / 3.1.1:
Second Phase - Integration with Existing Packet Core / 3.1.2:
Third Phase - Further Optimizations Towards the Common Core / 3.1.3:
Scenario 2: Existing CDMA Operators Deploying LTE/EPC / 3.2:
Scenario 3: New Operators Deploying LTE/EPC / 3.3:
Data Services in EPS / Chapter 4:
Messaging Services / 4.1:
Machine Type Communication / 4.2:
Industrial and Corporate Uses / 4.2.1:
Societal - M2M and Sustainable Development / 4.2.2:
Voice Services in EPS / Chapter 5:
Realization of Voice Over LTE / 5.1:
Voice Services Using IMS Technology / 5.2:
Single-Radio Voice Call Continuity (SRVCC) / 5.3:
Circuit-Switched Fallback / 5.4:
Comparing MMTel/SRVCC and CSFB / 5.5:
IMS Emergency Calls and Priority Services / 5.6:
Key Concepts and Services / Part III:
Session Management and Mobility / Chapter 6:
IP Connectivity and Session Management / 6.1:
The LP Connection / 6.1.1:
Session Management, Bearers, and QoS Aspects / 6.2:
General / 6.2.1:
The EPS Bearer for E-UTRAN Access / 6.2.2:
Session Management for EPS and GERAN/UTRAN Accesses / 6.2.3:
Session Management for Other Accesses / 6.2.4:
Subscriber Identifiers and Corresponding Legacy Identities / 6.3:
Permanent Subscriber Identifiers / 6.3.1:
Temporary Subscriber Identifiers / 6.3.2:
Relation to Subscription Identifiers in 2G/3G / 6.3.3:
Mobility Principles / 6.4:
Mobility within 3GPP Family of Accesses / 6.4.1:
Idle-Mode Signaling Reduction (ISR) / 6.4.3:
Closed Subscriber Group / 6.4.4:
Mobility Between E-UTRAN and HRPD / 6.4.5:
Generic Mobility Between 3GPP and Non-3GPP Accesses / 6.4.6:
Access Network Discovery and Selection / 6.4.7:
Interworking with Managed WLAN Networks / 6.5:
Pooling, Overload Protection, and Congestion Control / 6.6:
Security / Chapter 7:
Introduction / 7.1:
Security Services / 7.2:
Security Domains / 7.2.1:
Network Access Security / 7.3:
Access Security in E-UTRAN / 7.3.1:
Interworking with GERAN/UTRAN / 7.3.2:
Special Consideration for IMS Emergency Calls / 7.3.3:
Trusted and Untrusted Non-3GPP Accesses / 7.3.4:
Access Security in Trusted Non-3GPP Accesses / 7.3.5:
Access Security in Untrusted Non-3GPP Access / 7.3.6:
Special Considerations for Host-Based Mobility DSMIPv6 / 7.3.7:
Network Domain Security / 7.4:
User Domain Security / 7.5:
Security Aspects of Home eNBs and Home NBs / 7.6:
H(e)NB Security Architecture / 7.6.1:
Closed Subscriber Groups / 7.6.2:
Device Authentication / 7.6.3:
Hosting Party Authentication / 7.6.4:
Backhaul Link Security / 7.6.5:
Location Verification / 7.6.6:
Lawful Intercept / 7.7:
Quality of Service, Charging, and Policy Control / Chapter 8:
Quality of Service / 8.1:
QoS in E-UTRAN / 8.1.1:
QoS Aspects When Interworking with Other Accesses / 8.1.2:
Policy and Charging Control / 8.2:
The PCC Architecture / 8.2.1:
Basic PCC Concepts / 8.2.2:
Network vs. Terminal-Initiated QoS Control / 8.2.3:
PCC and Roaming / 8.2.4:
Additional PCC Features Developed Since Release 8 / 8.2.5:
PCC Support for Fixed Broadband Access / 8.2.6:
Charging / 8.3:
Selection Functions / Chapter 9:
Architecture Overview for Selection Functions / 9.1:
Selection of MME, SGSN, Serving GW, and PDN GW / 9.2:
Selection Procedure at a Glance / 9.2.1:
Use of DNS Infrastructure / 9.2.2:
MME Selection / 9.2.3:
SGSN Selection Function for EPS / 9.2.4:
GW Selection Overview / 9.2.5:
PDN GW Selection Function / 9.2.6:
Serving GW Selection Function / 9.2.7:
Handover (Non-3GPP Access) and PDN GW Selection / 9.2.8:
PCRF Selection / 9.3:
Subscriber Data Management. / Chapter 10:
Home Subscriber Server (HSS) / 10.1:
Subscriber Profile Repository (SPR) / 10.2:
User Data Convergence (UDC) / 10.3:
UDC Overall Description / 10.3.1:
Front-Ends and User Data Repository / 10.3.2:
Voice and Emergency Services / Chapter 11:
Voice Services Based on Circuit-Switched Technology / 11.1:
Voice Services with IMS Technology / 11.2:
MMTel / 11.3:
MMTel Architecture / 11.3.1:
VoLTE / 11.4:
T-ADS / 11.5:
Ensuring Service Coverage / 11.5.1:
Single Radio Voice Call Continuity (SRVCC) / 11.6:
Entities with Additional Functions to Support SRVCC / 11.6.1:
IMS Centralized Services (ICS) / 11.7:
Service Centralization and Continuity Application Server (SCC-AS) / 11.7.1:
SRVCC from E-UTRAN to GERAN or UTRAN / 11.7.2:
SRVCC from E-UTRAN to CDMA 1×RTT / 11.8:
Migration Paths and Coexistence of Circuit-Switched and VoLTE / 11.9:
EPS Emergency Bearer Service for IMS Emergency / 11.11:
Multimedia Priority Service (MPS) / 11.12:
LTE Broadcasting / Chapter 12:
Background and Main Concepts / 12.1:
MBMS Solution Overview / 12.2:
MBMS User Services / 12.3:
Associated Delivery Procedures / 12.3.1:
Mobile Network Architecture for MBMS / 12.4:
Interfaces / 12.4.1:
MBMS Bearer Services / 12.5:
Session Start / 12.5.1:
Session Stop / 12.5.2:
Session Update / 12.5.3:
Positioning / Chapter 13:
Positioning Solutions / 13.1:
Positioning Architecture and Protocols / 13.2:
Positioning Methods / 13.3:
Position-Reporting Formats / 13.4:
EPS Positioning Entities and Interfaces / 13.5:
GMLC / 13.5.1:
E-SMLC / 13.5.2:
SLP / 13.5.3:
Le Interface / 13.5.4:
SLg Interface / 13.5.5:
SLs Interface / 13.5.6:
LTE Positioning Protocol (LPP) / 13.5.7:
LTE Positioning Protocol Annex (LPPa) / 13.5.8:
Positioning Procedure / 13.6:
Offload Functions and Simultaneous Multi-Access / Chapter 14:
Offloading the 3GPP RAN - Simultaneous Multi-Access / 14.1:
Multi-Access PDN Connectivity (MAPCON) / 14.2.1:
LP Flow Mobility (LFOM) / 14.2.2:
Non-Seamless WLAN Offloading (NSWO) / 14.2.3:
Offloading the Core and Transport Network - Selected IP Traffic Offload (SLPTO) / 14.3:
Access to Local Networks - Local LP Access (LLPA) / 14.4:
The Nuts and Bolts of EPC / Part IV:
EPS Network Entities and Interfaces / Chapter 15:
Network Entities / 15.1:
eNodeB / 15.1.1:
Mobility Management Entity / 15.1.2:
Serving GW / 15.1.3:
PDN GW / 15.1.4:
Policy and Charging Rules Function / 15.1.5:
Home eNodeB Subsystem and Related Entities / 15.1.6:
Control Plane Between UE, eNodeB, and MME / 15.2:
S1-MME / 15.2.1:
GTP-Based Interfaces / 15.3:
Control Plane / 15.3.1:
MME↔MME(SIO) / 15.3.2:
MME↔Serving GW(S 11) / 15.3.3:
Serving GW↔PDN GW (S5/S8) / 15.3.4:
SGSN↔MME (S3) / 15.3.5:
SGSN↔Serving GW (S4) / 15.3.6:
SGSN↔SGSN (S16) / 15.3.7:
Trusted WLAN Access Network ↔ PDN GW (S2a) / 15.3.8:
ePDG PDN GW (S2b) / 15.3.9:
User Plane / 15.3.10:
eNodeB Serving GW (S1-U) / 15.3.11:
UE ↔ eNodeB Serving GW PDN GW (GTP-TJ) / 15.3.12:
UE ↔ BSS ↔ SGSN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.13:
UE ↔ UTRAN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.14:
UE ↔ UTRAN ↔ SGSN Serving GW ↔ PDN GW (GTP-U) / 15.3.15:
UE ↔ Trusted WLAN Access Network ↔ PDN GW (GTP-U) / 15.3.16:
UE ↔ ePDG ↔ PDN GW (GTP-U) / 15.3.17:
PMLP-Based Interfaces / 15.4:
Serving GW-PDN GW (S5/S8) / 15.4.1:
Trusted Non-3GPP IP Access-PDN GW (S2a) / 15.4.2:
ePDG-PDN GW (S2b) / 15.4.3:
DSMLPv6-Based Interfaces / 15.5:
UE-PDN GW (S2c) / 15.5.1:
HSS-Related Interfaces and Protocols / 15.6:
MME-HSS (S6a) and SGSN-HSS (S6d) / 15.6.1:
AAA-Related Interfaces / 15.7:
AAA Server-HSS (SWx) / 15.7.1:
Trusted Non-3GPP Access-3GPP AAA Server/Proxy (STa) / 15.7.3:
Untrusted Non-3GPP BP Access-3GPP AAA Server/Proxy (SWa) / 15.7.4:
ePDG-3GPP AAA Server/Proxy (SWm) / 15.7.5:
PDN GW-3GPP AAA Server/Proxy (S6b) / 15.7.6:
3GPP AAA Proxy-3GPP AAA Server/Proxy (SWd) / 15.7.7:
PCC-Related Interfaces / 15.8:
PCEF-PCRF (Gx) / 15.8.1:
BBERF-PCRF (Gxa/Gxc) / 15.8.3:
PCRF-AE (Rx) / 15.8.4:
TDF-PCRF (Sd) / 15.8.5:
OCS-PCRF (Sy) / 15.8.6:
PCRF-PCRF (S9) / 15.8.7:
BPCF-PCRF (S9a) / 15.8.8:
SPR-PCRF(Sp) / 15.8.9:
EIR-Related Interfaces / 15.9:
MME-EIR and SGSN-EIR Interfaces (S13 and S13') / 15.9.1:
I-WLAN-Related Interfaces / 15.10:
UE-ePDG (SWu) / 15.10.1:
ANDSF-Related Interfaces / 15.11:
ISMP Policy Node / 15.11.1:
Discovery Information Node / 15.11.2:
UE Location Node / 15.11.3:
ISRP Node / 15.11.4:
Ext Node / 15.11.5:
HRPD IW-Related Interfaces / 15.12:
Optimized Handover and Related Interfaces (S101 and S103) / 15.12.1:
MME ↔ eHRPD Access Network (S101) / 15.12.2:
Serving GW ↔ HSGW (S103) / 15.12.3:
Interface to External Networks / 15.13:
Functions / 15.13.1:
CSS Interface / 15.14:
MME-CSS Interface (S7a) / 15.14.1:
Protocols / Chapter 16:
GPRS Tunneling Protocol Overview / 16.1:
Protocol Structure / 16.2.1:
Control Plane (GTPv2-C) / 16.2.2:
User Plane (GTPv1-U) / 16.2.3:
Protocol Format / 16.2.4:
Mobile IP / 16.3:
Host-Based and Network-Based Mobility Mechanisms / 16.3.1:
Basic Principles of Mobile IP / 16.3.3:
Mobile IPv6 Security / 16.3.4:
Packet Format / 16.3.5:
Dual-Stack Operation / 16.3.6:
Additional MLPv6 Features - Route Optimization / 16.3.7:
Proxy Mobile IPv6 / 16.4:
Basic Principles / 16.4.1:
PMLPv6 Security / 16.4.3:
PMLPv6 Packet Format / 16.4.4:
Diameter / 16.4.5:
Background / 16.5.1:
Diameter Nodes / 16.5.2:
Diameter Sessions, Connections, and Transport / 16.5.4:
Diameter Request Routing / 16.5.5:
Peer Discovery / 16.5.6:
Diameter Message Format / 16.5.7:
Generic Routing Encapsulation / 16.6:
Basic Protocol Aspects / 16.6.1:
GRE Packet Format / 16.6.3:
S1-AP / 16.7:
Non-Access Stratum (NAS) / 16.8:
EPS Mobility Management / 16.8.1:
EPS Session Management / 16.8.2:
Message Structure / 16.8.3:
Security-Protected NAS Messages / 16.8.4:
Message Transport / 16.8.5:
Future Extensions and Backward Compatibility / 16.8.6:
IP Security / 16.9:
Encapsulated Security Payload and Authentication Header / 16.9.1:
Internet Key Exchange / 16.9.3:
IKEv2 Mobility and Multi-Homing / 16.9.4:
Extensible Authentication Protocol / 16.10:
Overview / 16.10.1:
Protocol / 16.10.2:
Stream Control Transmission Protocol / 16.11:
Basic Protocol Features / 16.11.1:
Multi-Steaming / 16.11.3:
Multi-Homing / 16.11.4:
Packet Structure / 16.11.5:
Procedures / Chapter 17:
Attachment and Detachment for E-UTRAN / 17.1:
Attachment Procedure for E-UTRAN / 17.1.1:
Detachment Procedure for E-UTRAN / 17.1.2:
Tracking Area Update for E-UTRAN / 17.2:
Tracking Area Update Procedure / 17.2.1:
TA Update with MME Change / 17.2.2:
Service Request for E-UTRAN / 17.3:
UE Triggered Service Request / 17.3.1:
Network Triggered Service Request / 17.3.2:
Intra- and Inter-3GPP Access Handover / 17.4:
Phases of the Handover Procedures / 17.4.1:
Handover Cases in EPS for 3GPP Accesses / 17.4.2:
Handover within E-UTRAN Access / 17.4.3:
Handover between E-UTRAN and Other 3GPP Accesses (GERAN, UTRAN) with S4-SGSN / 17.4.4:
Handover for Gn/Gp-Based SGSN / 17.4.5:
Handover between GERAN and UTRAN Access Using S4 SGSN and GTP/PMTP Protocol / 17.4.6:
Bearer and QoS-Related Procedures / 17.5:
Bearer Procedures for E-UTRAN / 17.5.1:
Bearer Procedures for GERAN/UTRAN / 17.5.2:
Attachment and Detachment for Non-3GPP Accesses / 17.6:
Attachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.1:
Detachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.2:
Attachment Procedure in Untrusted Non-3GPP Access Using PMJPv6 (S2b) / 17.6.3:
Detachment Procedure in Untrusted Non-3GPP Access Using PMIPv6 (S2b) / 17.6.4:
Attachment Procedure in Trusted Non-3GPP Access Using DSMTPv6 (S2c) / 17.6.5:
Detachment Procedure in Trusted Non-3GPP Access Using DSMJPv6 (S2c) / 17.6.6:
Intersystem Handover Between 3GPP and Non-3GPP Accesses / 17.7:
Details of Handover in EPS with Non-3GPP Accesses / 17.7.1:
QoS-Related Procedures in Non-3GPP Accesses / 17.8:
Conclusion and Future of EPS / Part V:
Conclusions and Looking Ahead / Chapter 18:
Standards Bodies Associated with EPS / Appendix A:
References
Index
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
45.

電子ブック

EB
Dan Harres
出版情報: Elsevier ScienceDirect Books Complete , Newnes, 2013
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Parts of a Robot / 2:
Building an Inexpensive Robot by Modifying a Radio-Controlled Car / 3:
Beginning Electronics / 4:
Computer Arithmetic / 5:
Computer Logic / 6:
Introducing the MSP430 Microcontroller / 7:
Starting to Program - An Introduction to MSP430 Assembler / 8:
Building MSP430 Assembler Programs / 9:
Introducing C for the MSP430 / 10:
More C and Mixing C With Assembler / 11:
MSP430 Parallel and Serial Ports / 12:
MSP430 Timing, Counters, and Interrupts / 13:
MSP430 Data Acquisition / 14:
Inexpensive Ways to Perform Circuit Simulation / 15:
Prototyping Circuits / 16:
Collision Avoidance / 17:
Adding a Tachometer / 18:
Controlling Things With a Remote / 19:
Troubleshooting / 20:
The Working, High-Performance Robot / 21:
Introduction / 1:
The Parts of a Robot / 2:
Building an Inexpensive Robot by Modifying a Radio-Controlled Car / 3:
46.

電子ブック

EB
Wenji Mao, Fei-Yue Wang, FeiYue Wang
出版情報: Elsevier ScienceDirect Books Complete , Burlington : Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
Research Methodology and Frameworks for ISI / 1.1:
The ACP Approach / 1.2:
Modeling with Artificial Societies / 1.2.1:
Analysis with Computational Experiments / 1.2.2:
Control Through Parallel Execution / 1.2.3:
Foundations in Philosophy and Physics / 1.2.4:
Outline of Chapters / 1.3:
Agent Modeling of Terrorist Organization Behavior / Chapter 2:
Modeling Organizational Behavior / 2.1:
Action Extraction from the Web / 2.2:
Action Data Collection / 2.2.1:
Raw Action Extraction / 2.2.2:
Action Elimination / 2.2.3:
Action Refinement / 2.2.4:
Extracting Causal Knowledge from the Web / 2.3:
Construction of Action Hierarchy / 2.4:
Designing, Causal Scenarios / 2.5:
Case Study on Terrorist Organization / 2.6:
Conclusion / 2.7:
Security Story Generation for Computational Experiments / Chapter 3:
Story Generation Systems / 3.1:
System Workflow and Narrative Structure / 3.2:
Story Extraction Approach / 3.3:
Text Processing with Domain Knowledge / 3.3.1:
Event Detection and Event Element Extraction / 3.3.2:
Design and Organization of Patterns / 3.3.3:
Event Element Standardization / 3.3.4:
Evaluation of Event Relations / 3.3.5:
Experiment / 3.4:
Forecasting Croup Behavior via Probabilistic Plan Inference / 3.5:
Review of Plan-Based Inference / 4.1:
Probabilistic Plan Representation / 4.2:
Probabilistic Reasoning Approach / 4.3:
Notation / 4.3.1:
Computation / 4.3.2:
Case Study in Security Informatics / 4.4:
Construction of Plan Library / 4.4.1:
The Test Set / 4.4.2:
Experimental Results / 4.4.3:
Forecasting Complex Croup Behavior via Multiple Plan Recognition / 4.5:
Multiple Plan Recognition for Behavior Prediction / 5.1:
The MPR Problem Definition / 5.2:
The Proposed MPR Approach / 5.3:
Constructing the Explanation Graph / 5.3.1:
Computing Probability of an Explanation / 5.3.2:
Finding the Best Explanation / 5.3.3:
Algorithm and Complexity Analysis / 5.3.4:
Discussion / 5.3.5:
Experimental Design / 5.4:
Results / 5.4.2:
Social Computing in ISI: A Synthetic View / 5.5:
Social Computing / 6.1:
Theoretical and Infrastructure Underpinnings / 6.1.1:
Major Application Areas / 6.1.2:
A Social Computing-Based ISI Research Framework / 6.2:
Control and Management Through Parallel Execution / 6.2.1:
Main Issues in the ACP-Based ISI Research Framework / 6.3:
Modeling Cyber-Physical Societies / 6.3.1:
Scenario-Based Computational Experiment and Evaluation / 6.3.2:
Interactive Co-Evolution of Artificial and Actual Systems / 6.3.3:
Social Media Information Processing and Standardization / 6.3.4:
ISI Research Platform / 6.3.5:
Summary / 6.4:
Cyber-Enabled Social Movement Organizations / Chapter 7:
Studies on Social Movement Organizations: A Review / 7.1:
A New Research Framework for CeSMOs / 7.2:
CeSMO Research Questions / 7.2.1:
A Social Computing-Based CeSMO Research Framework / 7.2.2:
Case Study: Wenchuan Earthquake / 7.3:
Discussions on CeSMO Research Issues / 7.4:
CeSMO Behavior Modeling / 7.4.1:
CeSMO Network Analysis / 7.4.2:
CeSMO Social and Cultural Information Modeling and Analysis / 7.4.3:
CeSMO Behavior Prediction / 7.4.4:
Cultural Modeling for Behavior Analysis and Prediction / 7.5:
Modeling Cultural Data in Security Informatics / 8.1:
Major Machine Learning Methods / 8.2:
Naive Bayesian (NB) / 8.2.1:
Support Vector Machines (SVMs) / 8.2.2:
Artificial Neural Networks / 8.2.3:
k-Nearest Neighbor (kNN) / 8.2.4:
Decision Trees / 8.2.5:
Random Forest (RF) / 8.2.6:
Associative Classification (AC) / 8.2.7:
Experiment and Analysis / 8.3:
Datasets / 8.3.1:
Evaluation Measures / 8.3.2:
Observations and Analysis / 8.3.3:
Discussions on Cultural Modeling Research Issues / 8.4:
Cultural Datasets Construction / 8.4.1:
Attribute Selection / 8.4.2:
Best Performance of Classifiers / 8.4.3:
Handling the Class Imbalance Problem / 8.4.4:
Model Interpretability / 8.4.5:
Incorporation of Domain Knowledge / 8.4.6:
Cultural and Social Dynamics of Behavioral Patterns / 8.4.7:
Index / 8.5:
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
47.

電子ブック

EB
Chen, Badong Chen, Jinchun Hu, Yu Zhu, Jose C. Principe
出版情報: Elsevier ScienceDirect Books Complete , Elsevier, 2013
所蔵情報: loading…
48.

電子ブック

EB
Yang, Wenji Mao, Christopher C. Yang, Xiaolong Zheng, Hui Wang
出版情報: Elsevier ScienceDirect Books Complete , Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Revealing the Hidden World of the Dark Web: Social Media Forums and Videos
Proactive Cyber Defense
Privacy-Preserving Social Network Integration
A Digraph Model for Risk Identification and Management in SCADA Systems
High-Level Architecture and Design of a Decision Engine for Marine Safety & Security
Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach
Importance of Cutting Terrorist Financing
Study on Covert Networks of Terrorist Based on Interactive Relationship Hypothesis
Incorporating Data and Methodologies for Knowledge Discover for Crime
Revealing the Hidden World of the Dark Web: Social Media Forums and Videos
Proactive Cyber Defense
Privacy-Preserving Social Network Integration
49.

電子ブック

EB
Xin-She Yang, Zhihua Cui, Xin-She Yang, Amir Hossein Gandomi, Mehmet Karamanoglu, Renbin Xiao, Zhihua Cui, Amir Hossein Gandomi, Mehmet Karamanoglu, Renbin Xiao
出版情報: Elsevier ScienceDirect Books Complete , Elsevier, 2013
所蔵情報: loading…
50.

電子ブック

EB
Adrian Fernandez, Dung Dang
出版情報: Elsevier ScienceDirect Books Complete , Newnes, 2013
所蔵情報: loading…
51.

電子ブック

EB
Colin Walls
出版情報: Elsevier ScienceDirect Books Complete , Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
What Makes an Embedded Application Tick? / 1:
Memory in Embedded Systems / 2:
Memory Architectures / 3:
How Software Influences Hardware Design / 4:
Migrating your Software to a New Processor Architecture / 5:
Embedded Software for Transportation Applications / 6:
How to Choose a CPU for Your SoC Design / 7:
An Introduction to USB Software / 8:
Towards USB 3.0 / 9:
What Makes an Embedded Application Tick? / 1:
Memory in Embedded Systems / 2:
Memory Architectures / 3:
52.

電子ブック

EB
Robert Oshana, Mark Kraeling
出版情報: Elsevier ScienceDirect Books Complete , Newnes, 2013
所蔵情報: loading…
53.

電子ブック

EB
Doug Abbott
出版情報: Elsevier ScienceDirect Books Complete , Newnes, 2013
所蔵情報: loading…
目次情報: 続きを見る
Preface
About the Author
The Embedded and Real-Time Space / Chapter 1:
Introducing Linux / Chapter 2:
The Host Development Environment / Chapter 3:
Configuring and Building the Kernel / Chapter 4:
BlueCat Linux, The "Less is MoreâÇ  Philosophy / Chapter 5:
Debugging Embedded Software / Chapter 6:
Kernel Modules and Device Drivers / Chapter 7:
Embedded Networking / Chapter 8:
Introduction to Real-Time Programming / Chapter 9:
Linux and Real-Time / Chapter 10:
The RTAI / Chapter 11:
Posix Threads / Chapter 12:
Cutting It Down to Size / Chapter 13:
Eclipse Integrated Development Environment / Chapter 14:
RTAI Application Programming Interface (API) / Appendix A:
Posix Threads (Pthreads) Application, Programming Interface / Appendix B:
Why Software Should Not Have Owners / Appendix C:
Upgrading From Kernel 2.4 to 2.6 / Appendix D:
Index
Preface
About the Author
The Embedded and Real-Time Space / Chapter 1:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼