close
1.

電子ブック

EB
Colin Walls
出版情報: Elsevier ScienceDirect Books , Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
What Makes an Embedded Application Tick? / 1:
Memory in Embedded Systems / 2:
Memory Architectures / 3:
How Software Influences Hardware Design / 4:
Migrating your Software to a New Processor Architecture / 5:
Embedded Software for Transportation Applications / 6:
How to Choose a CPU for Your SoC Design / 7:
An Introduction to USB Software / 8:
Towards USB 3.0 / 9:
What Makes an Embedded Application Tick? / 1:
Memory in Embedded Systems / 2:
Memory Architectures / 3:
2.

電子ブック

EB
Magnus Olsson, Catherine Mulligan, Magnus Olsson
出版情報: Elsevier ScienceDirect Books , Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
List of Abbreviations
Introduction - Background and Vision of EPC / Part I:
Mobile Broadband and the Core Network Evolution / Chapter 1:
A Global Standard / 1.1:
Origins of the Evolved Packet Core / 1.2:
3GPP Radio Access Technologies / 1.2.1:
3GPP2 Radio Access Technologies / 1.2.2:
SAE - Building Bridges Between Different Networks / 1.2.3:
A Shifting Value Chain / 1.3:
Terminology Used in This Book / 1.4:
Overview of EPS / Part II:
Architecture Overview / Chapter 2:
EPS Architecture / 2.1:
Basic LP Connectivity Over LTE Access / 2.1.1:
Adding More Advanced Functionality for LTE Access / 2.1.2:
Interworking Between LTE and GSM/GPRS or WCDMA/HSPA / 2.1.3:
Support for 3GPP Voice Services / 2.1.4:
Interworking Between LTE and CDMA Networks / 2.1.5:
Interworking Between 3GPP Access Technologies and Non-3GPP Access Technologies / 2.1.6:
Support for Broadcasting in Cellular Networks / 2.1.7:
Positioning Services / 2.1.8:
Optimizations for Small Cells and Local Access / 2.1.9:
Miscellaneous Features / 2.1.10:
Summary of the Architecture Overview / 2.1.11:
Mobile Network Radio Technologies / 2.2:
Overview of Radio Networks for Mobile Services / 2.2.1:
Radio Network Functionality / 2.2.2:
GSM / 2.2.3:
WCDMA / 2.2.4:
LTE / 2.2.5:
EPS Deployment Scenarios and Operator Cases / Chapter 3:
Scenario 1: Existing GSM/GPRS and/or WCDMA/HSPA Operators Deploying LTE/EPC / 3.1:
First Phase - Initial EPC Deployment / 3.1.1:
Second Phase - Integration with Existing Packet Core / 3.1.2:
Third Phase - Further Optimizations Towards the Common Core / 3.1.3:
Scenario 2: Existing CDMA Operators Deploying LTE/EPC / 3.2:
Scenario 3: New Operators Deploying LTE/EPC / 3.3:
Data Services in EPS / Chapter 4:
Messaging Services / 4.1:
Machine Type Communication / 4.2:
Industrial and Corporate Uses / 4.2.1:
Societal - M2M and Sustainable Development / 4.2.2:
Voice Services in EPS / Chapter 5:
Realization of Voice Over LTE / 5.1:
Voice Services Using IMS Technology / 5.2:
Single-Radio Voice Call Continuity (SRVCC) / 5.3:
Circuit-Switched Fallback / 5.4:
Comparing MMTel/SRVCC and CSFB / 5.5:
IMS Emergency Calls and Priority Services / 5.6:
Key Concepts and Services / Part III:
Session Management and Mobility / Chapter 6:
IP Connectivity and Session Management / 6.1:
The LP Connection / 6.1.1:
Session Management, Bearers, and QoS Aspects / 6.2:
General / 6.2.1:
The EPS Bearer for E-UTRAN Access / 6.2.2:
Session Management for EPS and GERAN/UTRAN Accesses / 6.2.3:
Session Management for Other Accesses / 6.2.4:
Subscriber Identifiers and Corresponding Legacy Identities / 6.3:
Permanent Subscriber Identifiers / 6.3.1:
Temporary Subscriber Identifiers / 6.3.2:
Relation to Subscription Identifiers in 2G/3G / 6.3.3:
Mobility Principles / 6.4:
Mobility within 3GPP Family of Accesses / 6.4.1:
Idle-Mode Signaling Reduction (ISR) / 6.4.3:
Closed Subscriber Group / 6.4.4:
Mobility Between E-UTRAN and HRPD / 6.4.5:
Generic Mobility Between 3GPP and Non-3GPP Accesses / 6.4.6:
Access Network Discovery and Selection / 6.4.7:
Interworking with Managed WLAN Networks / 6.5:
Pooling, Overload Protection, and Congestion Control / 6.6:
Security / Chapter 7:
Introduction / 7.1:
Security Services / 7.2:
Security Domains / 7.2.1:
Network Access Security / 7.3:
Access Security in E-UTRAN / 7.3.1:
Interworking with GERAN/UTRAN / 7.3.2:
Special Consideration for IMS Emergency Calls / 7.3.3:
Trusted and Untrusted Non-3GPP Accesses / 7.3.4:
Access Security in Trusted Non-3GPP Accesses / 7.3.5:
Access Security in Untrusted Non-3GPP Access / 7.3.6:
Special Considerations for Host-Based Mobility DSMIPv6 / 7.3.7:
Network Domain Security / 7.4:
User Domain Security / 7.5:
Security Aspects of Home eNBs and Home NBs / 7.6:
H(e)NB Security Architecture / 7.6.1:
Closed Subscriber Groups / 7.6.2:
Device Authentication / 7.6.3:
Hosting Party Authentication / 7.6.4:
Backhaul Link Security / 7.6.5:
Location Verification / 7.6.6:
Lawful Intercept / 7.7:
Quality of Service, Charging, and Policy Control / Chapter 8:
Quality of Service / 8.1:
QoS in E-UTRAN / 8.1.1:
QoS Aspects When Interworking with Other Accesses / 8.1.2:
Policy and Charging Control / 8.2:
The PCC Architecture / 8.2.1:
Basic PCC Concepts / 8.2.2:
Network vs. Terminal-Initiated QoS Control / 8.2.3:
PCC and Roaming / 8.2.4:
Additional PCC Features Developed Since Release 8 / 8.2.5:
PCC Support for Fixed Broadband Access / 8.2.6:
Charging / 8.3:
Selection Functions / Chapter 9:
Architecture Overview for Selection Functions / 9.1:
Selection of MME, SGSN, Serving GW, and PDN GW / 9.2:
Selection Procedure at a Glance / 9.2.1:
Use of DNS Infrastructure / 9.2.2:
MME Selection / 9.2.3:
SGSN Selection Function for EPS / 9.2.4:
GW Selection Overview / 9.2.5:
PDN GW Selection Function / 9.2.6:
Serving GW Selection Function / 9.2.7:
Handover (Non-3GPP Access) and PDN GW Selection / 9.2.8:
PCRF Selection / 9.3:
Subscriber Data Management. / Chapter 10:
Home Subscriber Server (HSS) / 10.1:
Subscriber Profile Repository (SPR) / 10.2:
User Data Convergence (UDC) / 10.3:
UDC Overall Description / 10.3.1:
Front-Ends and User Data Repository / 10.3.2:
Voice and Emergency Services / Chapter 11:
Voice Services Based on Circuit-Switched Technology / 11.1:
Voice Services with IMS Technology / 11.2:
MMTel / 11.3:
MMTel Architecture / 11.3.1:
VoLTE / 11.4:
T-ADS / 11.5:
Ensuring Service Coverage / 11.5.1:
Single Radio Voice Call Continuity (SRVCC) / 11.6:
Entities with Additional Functions to Support SRVCC / 11.6.1:
IMS Centralized Services (ICS) / 11.7:
Service Centralization and Continuity Application Server (SCC-AS) / 11.7.1:
SRVCC from E-UTRAN to GERAN or UTRAN / 11.7.2:
SRVCC from E-UTRAN to CDMA 1×RTT / 11.8:
Migration Paths and Coexistence of Circuit-Switched and VoLTE / 11.9:
EPS Emergency Bearer Service for IMS Emergency / 11.11:
Multimedia Priority Service (MPS) / 11.12:
LTE Broadcasting / Chapter 12:
Background and Main Concepts / 12.1:
MBMS Solution Overview / 12.2:
MBMS User Services / 12.3:
Associated Delivery Procedures / 12.3.1:
Mobile Network Architecture for MBMS / 12.4:
Interfaces / 12.4.1:
MBMS Bearer Services / 12.5:
Session Start / 12.5.1:
Session Stop / 12.5.2:
Session Update / 12.5.3:
Positioning / Chapter 13:
Positioning Solutions / 13.1:
Positioning Architecture and Protocols / 13.2:
Positioning Methods / 13.3:
Position-Reporting Formats / 13.4:
EPS Positioning Entities and Interfaces / 13.5:
GMLC / 13.5.1:
E-SMLC / 13.5.2:
SLP / 13.5.3:
Le Interface / 13.5.4:
SLg Interface / 13.5.5:
SLs Interface / 13.5.6:
LTE Positioning Protocol (LPP) / 13.5.7:
LTE Positioning Protocol Annex (LPPa) / 13.5.8:
Positioning Procedure / 13.6:
Offload Functions and Simultaneous Multi-Access / Chapter 14:
Offloading the 3GPP RAN - Simultaneous Multi-Access / 14.1:
Multi-Access PDN Connectivity (MAPCON) / 14.2.1:
LP Flow Mobility (LFOM) / 14.2.2:
Non-Seamless WLAN Offloading (NSWO) / 14.2.3:
Offloading the Core and Transport Network - Selected IP Traffic Offload (SLPTO) / 14.3:
Access to Local Networks - Local LP Access (LLPA) / 14.4:
The Nuts and Bolts of EPC / Part IV:
EPS Network Entities and Interfaces / Chapter 15:
Network Entities / 15.1:
eNodeB / 15.1.1:
Mobility Management Entity / 15.1.2:
Serving GW / 15.1.3:
PDN GW / 15.1.4:
Policy and Charging Rules Function / 15.1.5:
Home eNodeB Subsystem and Related Entities / 15.1.6:
Control Plane Between UE, eNodeB, and MME / 15.2:
S1-MME / 15.2.1:
GTP-Based Interfaces / 15.3:
Control Plane / 15.3.1:
MME↔MME(SIO) / 15.3.2:
MME↔Serving GW(S 11) / 15.3.3:
Serving GW↔PDN GW (S5/S8) / 15.3.4:
SGSN↔MME (S3) / 15.3.5:
SGSN↔Serving GW (S4) / 15.3.6:
SGSN↔SGSN (S16) / 15.3.7:
Trusted WLAN Access Network ↔ PDN GW (S2a) / 15.3.8:
ePDG PDN GW (S2b) / 15.3.9:
User Plane / 15.3.10:
eNodeB Serving GW (S1-U) / 15.3.11:
UE ↔ eNodeB Serving GW PDN GW (GTP-TJ) / 15.3.12:
UE ↔ BSS ↔ SGSN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.13:
UE ↔ UTRAN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.14:
UE ↔ UTRAN ↔ SGSN Serving GW ↔ PDN GW (GTP-U) / 15.3.15:
UE ↔ Trusted WLAN Access Network ↔ PDN GW (GTP-U) / 15.3.16:
UE ↔ ePDG ↔ PDN GW (GTP-U) / 15.3.17:
PMLP-Based Interfaces / 15.4:
Serving GW-PDN GW (S5/S8) / 15.4.1:
Trusted Non-3GPP IP Access-PDN GW (S2a) / 15.4.2:
ePDG-PDN GW (S2b) / 15.4.3:
DSMLPv6-Based Interfaces / 15.5:
UE-PDN GW (S2c) / 15.5.1:
HSS-Related Interfaces and Protocols / 15.6:
MME-HSS (S6a) and SGSN-HSS (S6d) / 15.6.1:
AAA-Related Interfaces / 15.7:
AAA Server-HSS (SWx) / 15.7.1:
Trusted Non-3GPP Access-3GPP AAA Server/Proxy (STa) / 15.7.3:
Untrusted Non-3GPP BP Access-3GPP AAA Server/Proxy (SWa) / 15.7.4:
ePDG-3GPP AAA Server/Proxy (SWm) / 15.7.5:
PDN GW-3GPP AAA Server/Proxy (S6b) / 15.7.6:
3GPP AAA Proxy-3GPP AAA Server/Proxy (SWd) / 15.7.7:
PCC-Related Interfaces / 15.8:
PCEF-PCRF (Gx) / 15.8.1:
BBERF-PCRF (Gxa/Gxc) / 15.8.3:
PCRF-AE (Rx) / 15.8.4:
TDF-PCRF (Sd) / 15.8.5:
OCS-PCRF (Sy) / 15.8.6:
PCRF-PCRF (S9) / 15.8.7:
BPCF-PCRF (S9a) / 15.8.8:
SPR-PCRF(Sp) / 15.8.9:
EIR-Related Interfaces / 15.9:
MME-EIR and SGSN-EIR Interfaces (S13 and S13') / 15.9.1:
I-WLAN-Related Interfaces / 15.10:
UE-ePDG (SWu) / 15.10.1:
ANDSF-Related Interfaces / 15.11:
ISMP Policy Node / 15.11.1:
Discovery Information Node / 15.11.2:
UE Location Node / 15.11.3:
ISRP Node / 15.11.4:
Ext Node / 15.11.5:
HRPD IW-Related Interfaces / 15.12:
Optimized Handover and Related Interfaces (S101 and S103) / 15.12.1:
MME ↔ eHRPD Access Network (S101) / 15.12.2:
Serving GW ↔ HSGW (S103) / 15.12.3:
Interface to External Networks / 15.13:
Functions / 15.13.1:
CSS Interface / 15.14:
MME-CSS Interface (S7a) / 15.14.1:
Protocols / Chapter 16:
GPRS Tunneling Protocol Overview / 16.1:
Protocol Structure / 16.2.1:
Control Plane (GTPv2-C) / 16.2.2:
User Plane (GTPv1-U) / 16.2.3:
Protocol Format / 16.2.4:
Mobile IP / 16.3:
Host-Based and Network-Based Mobility Mechanisms / 16.3.1:
Basic Principles of Mobile IP / 16.3.3:
Mobile IPv6 Security / 16.3.4:
Packet Format / 16.3.5:
Dual-Stack Operation / 16.3.6:
Additional MLPv6 Features - Route Optimization / 16.3.7:
Proxy Mobile IPv6 / 16.4:
Basic Principles / 16.4.1:
PMLPv6 Security / 16.4.3:
PMLPv6 Packet Format / 16.4.4:
Diameter / 16.4.5:
Background / 16.5.1:
Diameter Nodes / 16.5.2:
Diameter Sessions, Connections, and Transport / 16.5.4:
Diameter Request Routing / 16.5.5:
Peer Discovery / 16.5.6:
Diameter Message Format / 16.5.7:
Generic Routing Encapsulation / 16.6:
Basic Protocol Aspects / 16.6.1:
GRE Packet Format / 16.6.3:
S1-AP / 16.7:
Non-Access Stratum (NAS) / 16.8:
EPS Mobility Management / 16.8.1:
EPS Session Management / 16.8.2:
Message Structure / 16.8.3:
Security-Protected NAS Messages / 16.8.4:
Message Transport / 16.8.5:
Future Extensions and Backward Compatibility / 16.8.6:
IP Security / 16.9:
Encapsulated Security Payload and Authentication Header / 16.9.1:
Internet Key Exchange / 16.9.3:
IKEv2 Mobility and Multi-Homing / 16.9.4:
Extensible Authentication Protocol / 16.10:
Overview / 16.10.1:
Protocol / 16.10.2:
Stream Control Transmission Protocol / 16.11:
Basic Protocol Features / 16.11.1:
Multi-Steaming / 16.11.3:
Multi-Homing / 16.11.4:
Packet Structure / 16.11.5:
Procedures / Chapter 17:
Attachment and Detachment for E-UTRAN / 17.1:
Attachment Procedure for E-UTRAN / 17.1.1:
Detachment Procedure for E-UTRAN / 17.1.2:
Tracking Area Update for E-UTRAN / 17.2:
Tracking Area Update Procedure / 17.2.1:
TA Update with MME Change / 17.2.2:
Service Request for E-UTRAN / 17.3:
UE Triggered Service Request / 17.3.1:
Network Triggered Service Request / 17.3.2:
Intra- and Inter-3GPP Access Handover / 17.4:
Phases of the Handover Procedures / 17.4.1:
Handover Cases in EPS for 3GPP Accesses / 17.4.2:
Handover within E-UTRAN Access / 17.4.3:
Handover between E-UTRAN and Other 3GPP Accesses (GERAN, UTRAN) with S4-SGSN / 17.4.4:
Handover for Gn/Gp-Based SGSN / 17.4.5:
Handover between GERAN and UTRAN Access Using S4 SGSN and GTP/PMTP Protocol / 17.4.6:
Bearer and QoS-Related Procedures / 17.5:
Bearer Procedures for E-UTRAN / 17.5.1:
Bearer Procedures for GERAN/UTRAN / 17.5.2:
Attachment and Detachment for Non-3GPP Accesses / 17.6:
Attachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.1:
Detachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.2:
Attachment Procedure in Untrusted Non-3GPP Access Using PMJPv6 (S2b) / 17.6.3:
Detachment Procedure in Untrusted Non-3GPP Access Using PMIPv6 (S2b) / 17.6.4:
Attachment Procedure in Trusted Non-3GPP Access Using DSMTPv6 (S2c) / 17.6.5:
Detachment Procedure in Trusted Non-3GPP Access Using DSMJPv6 (S2c) / 17.6.6:
Intersystem Handover Between 3GPP and Non-3GPP Accesses / 17.7:
Details of Handover in EPS with Non-3GPP Accesses / 17.7.1:
QoS-Related Procedures in Non-3GPP Accesses / 17.8:
Conclusion and Future of EPS / Part V:
Conclusions and Looking Ahead / Chapter 18:
Standards Bodies Associated with EPS / Appendix A:
References
Index
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
3.

電子ブック

EB
David Kleidermacher, Mike Kleidermacher
出版情報: Elsevier ScienceDirect Books , Burlington : Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgements
Introduction to Embedded Systems Security / Chapter 1:
What is Security? / 1.1:
What is an Embedded System? / 1.2:
Embedded Security Trends / 1.3:
Embedded Systems Complexity / 1.3.1:
Network Connectivity / 1.3.2:
Reliance on Embedded Systems for Critical Infrastructure / 1.3.3:
Sophisticated Attackers / 1.3.4:
Processor Consolidation / 1.3.5:
Security Policies / 1.4:
Perfect Security / 1.4.1:
Confidentiality, Integrity, and Availability / 1.4.2:
Isolation / 1.4.3:
Information Flow Control / 1.4.4:
Physical Security Policies / 1.4.5:
Apphcation-Specific Policies / 1.4.6:
Security Threats / 1.5:
Case Study: VxWorks Debug Port Vulnerability / 1.5.1:
Wrap-up / 1.6:
Key Points / 1.7:
Bibliography and Notes / 1.8:
Systems Software Considerations / Chapter 2:
The Role of the Operating System / 2.1:
Multiple Independent Levels of Security / 2.2:
Information Flow / 2.2.1:
Data Isolation / 2.2.2:
Damage Limitation / 2.2.3:
Periods Processing / 2.2.4:
Always Invoked / 2.2.5:
Tamper Proof / 2.2.6:
Evaluable / 2.2.7:
Microkernel versus Monolith / 2.3:
Case Study: The Duqu Virus / 2.3.1:
Core Embedded Operating System Security Requirements / 2.4:
Memory Protection / 2.4.1:
Virtual Memory / 2.4.2:
Fault Recovery / 2.4.3:
Guaranteed Resources / 2.4.4:
Virtual Device Drivers / 2.4.5:
Impact of Determinism / 2.4.6:
Secure Scheduling / 2.4.7:
Access Control and Capabilities / 2.5:
Case Study: Secure Web Browser / 2.5.1:
Granularity versus Simplicity of Access Controls / 2.5.2:
Whitelists versus Blacklists / 2.5.3:
Confused Deputy Problem / 2.5.4:
Capabilities versus Access Control Lists / 2.5.5:
Capability Confinement and Revocation / 2.5.6:
Secure Design Using Capabilities / 2.5.7:
Hypervisors and System Virtualization / 2.6:
Introduction to System Virtualization / 2.6.1:
Applications of System Virtualization / 2.6.2:
Environment Sandboxing / 2.6.3:
Virtual Security Appliances / 2.6.4:
Hypervisor Architectures / 2.6.5:
Paravirtualization / 2.6.6:
Leveraging Hardware Assists for Virtualization / 2.6.7:
Hypervisor Security / 2.6.8:
I/O Virtualization / 2.7:
The Need for Shared I/O / 2.7.1:
Emulation / 2.7.2:
Pass-through / 2.7.3:
Shared IOMMU / 2.7.4:
IOMMUs and Virtual Device Drivers / 2.7.5:
Secure I/O Virtualization within Microkernels / 2.7.6:
Remote Management / 2.8:
Security Implications / 2.8.1:
Assuring Integrity of the TCB / 2.9:
Trusted Hardware and Supply Chain / 2.9.1:
Secure Boot / 2.9.2:
Static versus Dynamic Root of Trust / 2.9.3:
Remote Attestation / 2.9.4:
Secure Embedded Software Development / 2.10:
Introduction to PHASE-Principles of High-Assurance Software Engineering / 3.1:
Minimal Implementation / 3.2:
Component Architecture / 3.3:
Runtime Componentization / 3.3.1:
A Note on Processes versus Threads / 3.3.2:
Least Privilege / 3.4:
Secure Development Process / 3.5:
Change Management / 3.5.1:
Peer Reviews / 3.5.2:
Development Tool Security / 3.5.3:
Secure Coding / 3.5.4:
Software Testing and Verification / 3.5.5:
Development Process Efficiency / 3.5.6:
Independent Expert Validation / 3.6:
Common Criteria / 3.6.1:
Case Study: Operating System Protection Profiles / 3.6.2:
Case Study: HAWS-High-Assurance Web Server / 3.7:
Model-Driven Design / 3.7.1:
Introduction to MDD / 3.8.1:
Executable Models / 3.8.2:
Modeling Languages / 3.8.3:
Types of MDD Platforms / 3.8.4:
Case Study: A Digital Pathology Scanner / 3.8.5:
Selecting an MDD Platform / 3.8.6:
Using MDD in Safety-and Security-Critical Systems / 3.8.7:
Embedded Cryptography / 3.9:
Introduction / 4.1:
U.S. Government Cryptographic Guidance / 4.2:
NSA Suite B / 4.2.1:
The One-Time Pad / 4.3:
Cryptographic Synchronization / 4.3.1:
Cryptographic Modes / 4.4:
Output Feedback / 4.4.1:
Cipher Feedback / 4.4.2:
OFB with CFB Protection / 4.4.3:
Traffic Flow Security / 4.4.4:
Counter Mode / 4.4.5:
Block Ciphers / 4.5:
Additional Cryptographic Block Cipher Modes / 4.5.1:
Authenticated Encryption / 4.6:
CCM / 4.6.1:
Galois Counter Mode / 4.6.2:
Public Key Cryptography / 4.7:
RSA / 4.7.1:
Equivalent Key Strength / 4.7.2:
Trapdoor Construction / 4.7.3:
Key Agreement / 4.8:
Man-in-the-Middle Attack on Diffie-Hellman / 4.8.1:
Public Key Authentication / 4.9:
Certificate Types / 4.9.1:
Elliptic Curve Cryptography / 4.10:
Elliptic Curve Digital Signatures / 4.10.1:
Elliptic Curve Anonymous Key Agreement / 4.10.2:
Cryptographic Hashes / 4.11:
Secure Hash Algorithm / 4.11.1:
MMO / 4.11.2:
Message Authentication Codes / 4.12:
Random Number Generation / 4.13:
True Random Number Generation / 4.13.1:
Pseudo-Random Number Generation / 4.13.2:
Key Management for Embedded Systems / 4.14:
Case Study: The Walker Spy Case / 4.14.1:
Key Management-Generalized Model / 4.14.2:
Key Management Case Studies / 4.14.3:
Cryptographic Certifications / 4.15:
FIPS 140-2 Certification / 4.15.1:
NSA Certification / 4.15.2:
Data Protection Protocols for Embedded Systems / 4.16:
Data-in-Motion Protocols / 5.1:
Generalized Model / 5.2.1:
Choosing the Network Layer for Security / 5.2.2:
Ethernet Security Protocols / 5.2.3:
BPsec versus SSL / 5.2.4:
IPsec / 5.2.5:
SSL/TLS / 5.2.6:
Embedded VPN Clients / 5.2.7:
DTLS / 5.2.8:
SSH / 5.2.9:
Custom Network Security Protocols / 5.2.10:
Application of Cryptography within Network Security Protocols / 5 2.11:
Secure Multimedia Protocols / 5.2.12:
Broadcast Security / 5.2.13:
Data-at-Rest Protocols / 5.3:
Choosing the Storage Layer for Security / 5.3.1:
Symmetric Encryption Algorithm Selection / 5.3.2:
Managing the Storage Encryption Key / 5 3 3:
Advanced Threats to Data Encryption Solutions / 5.3.4:
Emerging Applications / 5.4:
Embedded Network Transactions / 6.1:
Anatomy of a Network Transaction / 6.1.1:
State of Insecurity / 6.1.2:
Network-based Transaction Threats / 6 1 3:
Modern Attempts to Improve Network Transaction Security / 6.1.4:
Trustworthy Embedded Transaction Architecture / 6.1.5:
Automotive Security / 6.2:
Vehicular Security Threats and Mitigations / 6.2.1:
Secure Android / 6.3:
Android Security Retrospective / 6.3.1:
Android Device Rooting / 6.3.2:
Mobile Phone Data Protection: A Case Study of Defense-in-Depth / 6.3.3:
Android Sandboxing Approaches / 6.3.4:
Next-Generation Software-Defined Radio / 6.4:
Red-Black Separation / 6.4.1:
Software-Defined Radio Architecture / 6.4.2:
Enter Linux / 6.4.3:
Multi-Domain Radio / 6.4.4:
Index / 6.5:
Foreword
Preface
Acknowledgements
4.

電子ブック

EB
Wenji Mao, Fei-Yue Wang, FeiYue Wang
出版情報: Elsevier ScienceDirect Books , Burlington : Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
Research Methodology and Frameworks for ISI / 1.1:
The ACP Approach / 1.2:
Modeling with Artificial Societies / 1.2.1:
Analysis with Computational Experiments / 1.2.2:
Control Through Parallel Execution / 1.2.3:
Foundations in Philosophy and Physics / 1.2.4:
Outline of Chapters / 1.3:
Agent Modeling of Terrorist Organization Behavior / Chapter 2:
Modeling Organizational Behavior / 2.1:
Action Extraction from the Web / 2.2:
Action Data Collection / 2.2.1:
Raw Action Extraction / 2.2.2:
Action Elimination / 2.2.3:
Action Refinement / 2.2.4:
Extracting Causal Knowledge from the Web / 2.3:
Construction of Action Hierarchy / 2.4:
Designing, Causal Scenarios / 2.5:
Case Study on Terrorist Organization / 2.6:
Conclusion / 2.7:
Security Story Generation for Computational Experiments / Chapter 3:
Story Generation Systems / 3.1:
System Workflow and Narrative Structure / 3.2:
Story Extraction Approach / 3.3:
Text Processing with Domain Knowledge / 3.3.1:
Event Detection and Event Element Extraction / 3.3.2:
Design and Organization of Patterns / 3.3.3:
Event Element Standardization / 3.3.4:
Evaluation of Event Relations / 3.3.5:
Experiment / 3.4:
Forecasting Croup Behavior via Probabilistic Plan Inference / 3.5:
Review of Plan-Based Inference / 4.1:
Probabilistic Plan Representation / 4.2:
Probabilistic Reasoning Approach / 4.3:
Notation / 4.3.1:
Computation / 4.3.2:
Case Study in Security Informatics / 4.4:
Construction of Plan Library / 4.4.1:
The Test Set / 4.4.2:
Experimental Results / 4.4.3:
Forecasting Complex Croup Behavior via Multiple Plan Recognition / 4.5:
Multiple Plan Recognition for Behavior Prediction / 5.1:
The MPR Problem Definition / 5.2:
The Proposed MPR Approach / 5.3:
Constructing the Explanation Graph / 5.3.1:
Computing Probability of an Explanation / 5.3.2:
Finding the Best Explanation / 5.3.3:
Algorithm and Complexity Analysis / 5.3.4:
Discussion / 5.3.5:
Experimental Design / 5.4:
Results / 5.4.2:
Social Computing in ISI: A Synthetic View / 5.5:
Social Computing / 6.1:
Theoretical and Infrastructure Underpinnings / 6.1.1:
Major Application Areas / 6.1.2:
A Social Computing-Based ISI Research Framework / 6.2:
Control and Management Through Parallel Execution / 6.2.1:
Main Issues in the ACP-Based ISI Research Framework / 6.3:
Modeling Cyber-Physical Societies / 6.3.1:
Scenario-Based Computational Experiment and Evaluation / 6.3.2:
Interactive Co-Evolution of Artificial and Actual Systems / 6.3.3:
Social Media Information Processing and Standardization / 6.3.4:
ISI Research Platform / 6.3.5:
Summary / 6.4:
Cyber-Enabled Social Movement Organizations / Chapter 7:
Studies on Social Movement Organizations: A Review / 7.1:
A New Research Framework for CeSMOs / 7.2:
CeSMO Research Questions / 7.2.1:
A Social Computing-Based CeSMO Research Framework / 7.2.2:
Case Study: Wenchuan Earthquake / 7.3:
Discussions on CeSMO Research Issues / 7.4:
CeSMO Behavior Modeling / 7.4.1:
CeSMO Network Analysis / 7.4.2:
CeSMO Social and Cultural Information Modeling and Analysis / 7.4.3:
CeSMO Behavior Prediction / 7.4.4:
Cultural Modeling for Behavior Analysis and Prediction / 7.5:
Modeling Cultural Data in Security Informatics / 8.1:
Major Machine Learning Methods / 8.2:
Naive Bayesian (NB) / 8.2.1:
Support Vector Machines (SVMs) / 8.2.2:
Artificial Neural Networks / 8.2.3:
k-Nearest Neighbor (kNN) / 8.2.4:
Decision Trees / 8.2.5:
Random Forest (RF) / 8.2.6:
Associative Classification (AC) / 8.2.7:
Experiment and Analysis / 8.3:
Datasets / 8.3.1:
Evaluation Measures / 8.3.2:
Observations and Analysis / 8.3.3:
Discussions on Cultural Modeling Research Issues / 8.4:
Cultural Datasets Construction / 8.4.1:
Attribute Selection / 8.4.2:
Best Performance of Classifiers / 8.4.3:
Handling the Class Imbalance Problem / 8.4.4:
Model Interpretability / 8.4.5:
Incorporation of Domain Knowledge / 8.4.6:
Cultural and Social Dynamics of Behavioral Patterns / 8.4.7:
Index / 8.5:
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
5.

電子ブック

EB
Tammy Noergaard
出版情報: Elsevier ScienceDirect Books , Newnes, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Acknowledgments
About the Author
Introduction to Embedded Systems / Section I:
A Systems Engineering Approach to Embedded Systems Design / Chapter 1:
Know Your Standards / Chapter 2:
Embedded Hardware / Section II:
Embedded Hardware Building Blocks and the Embedded Board / Chapter 3:
Embedded Processors / Chapter 4:
Board Memory / Chapter 5:
Board I/O (Input/Output) / Chapter 6:
Board Buses / Chapter 7:
Embedded Software Introduction / Section III:
Device Drivers / Chapter 8:
Embedded Operating Systems / Chapter 9:
Middleware and Application Software / Chapter 10:
Putting It All Together: Design and Development / Section IV:
Defining the System-Creating the Architecture and Documenting the Design / Chapter 11:
The Final Phases of Embedded Design: Implementation and Testing / Chapter 12:
Projects and Exercises / Appendix A:
Schematic Symbols / Appendix B:
Acronyms and Abbreviations / Appendix C:
Glossary / Appendix D:
Index
What's on the CD-ROM
Foreword
Acknowledgments
About the Author
6.

電子ブック

EB
Magnus Olsson, Catherine Mulligan, Magnus Olsson
出版情報: Elsevier ScienceDirect Books , Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
List of Abbreviations
Introduction - Background and Vision of EPC / Part I:
Mobile Broadband and the Core Network Evolution / Chapter 1:
A Global Standard / 1.1:
Origins of the Evolved Packet Core / 1.2:
3GPP Radio Access Technologies / 1.2.1:
3GPP2 Radio Access Technologies / 1.2.2:
SAE - Building Bridges Between Different Networks / 1.2.3:
A Shifting Value Chain / 1.3:
Terminology Used in This Book / 1.4:
Overview of EPS / Part II:
Architecture Overview / Chapter 2:
EPS Architecture / 2.1:
Basic LP Connectivity Over LTE Access / 2.1.1:
Adding More Advanced Functionality for LTE Access / 2.1.2:
Interworking Between LTE and GSM/GPRS or WCDMA/HSPA / 2.1.3:
Support for 3GPP Voice Services / 2.1.4:
Interworking Between LTE and CDMA Networks / 2.1.5:
Interworking Between 3GPP Access Technologies and Non-3GPP Access Technologies / 2.1.6:
Support for Broadcasting in Cellular Networks / 2.1.7:
Positioning Services / 2.1.8:
Optimizations for Small Cells and Local Access / 2.1.9:
Miscellaneous Features / 2.1.10:
Summary of the Architecture Overview / 2.1.11:
Mobile Network Radio Technologies / 2.2:
Overview of Radio Networks for Mobile Services / 2.2.1:
Radio Network Functionality / 2.2.2:
GSM / 2.2.3:
WCDMA / 2.2.4:
LTE / 2.2.5:
EPS Deployment Scenarios and Operator Cases / Chapter 3:
Scenario 1: Existing GSM/GPRS and/or WCDMA/HSPA Operators Deploying LTE/EPC / 3.1:
First Phase - Initial EPC Deployment / 3.1.1:
Second Phase - Integration with Existing Packet Core / 3.1.2:
Third Phase - Further Optimizations Towards the Common Core / 3.1.3:
Scenario 2: Existing CDMA Operators Deploying LTE/EPC / 3.2:
Scenario 3: New Operators Deploying LTE/EPC / 3.3:
Data Services in EPS / Chapter 4:
Messaging Services / 4.1:
Machine Type Communication / 4.2:
Industrial and Corporate Uses / 4.2.1:
Societal - M2M and Sustainable Development / 4.2.2:
Voice Services in EPS / Chapter 5:
Realization of Voice Over LTE / 5.1:
Voice Services Using IMS Technology / 5.2:
Single-Radio Voice Call Continuity (SRVCC) / 5.3:
Circuit-Switched Fallback / 5.4:
Comparing MMTel/SRVCC and CSFB / 5.5:
IMS Emergency Calls and Priority Services / 5.6:
Key Concepts and Services / Part III:
Session Management and Mobility / Chapter 6:
IP Connectivity and Session Management / 6.1:
The LP Connection / 6.1.1:
Session Management, Bearers, and QoS Aspects / 6.2:
General / 6.2.1:
The EPS Bearer for E-UTRAN Access / 6.2.2:
Session Management for EPS and GERAN/UTRAN Accesses / 6.2.3:
Session Management for Other Accesses / 6.2.4:
Subscriber Identifiers and Corresponding Legacy Identities / 6.3:
Permanent Subscriber Identifiers / 6.3.1:
Temporary Subscriber Identifiers / 6.3.2:
Relation to Subscription Identifiers in 2G/3G / 6.3.3:
Mobility Principles / 6.4:
Mobility within 3GPP Family of Accesses / 6.4.1:
Idle-Mode Signaling Reduction (ISR) / 6.4.3:
Closed Subscriber Group / 6.4.4:
Mobility Between E-UTRAN and HRPD / 6.4.5:
Generic Mobility Between 3GPP and Non-3GPP Accesses / 6.4.6:
Access Network Discovery and Selection / 6.4.7:
Interworking with Managed WLAN Networks / 6.5:
Pooling, Overload Protection, and Congestion Control / 6.6:
Security / Chapter 7:
Introduction / 7.1:
Security Services / 7.2:
Security Domains / 7.2.1:
Network Access Security / 7.3:
Access Security in E-UTRAN / 7.3.1:
Interworking with GERAN/UTRAN / 7.3.2:
Special Consideration for IMS Emergency Calls / 7.3.3:
Trusted and Untrusted Non-3GPP Accesses / 7.3.4:
Access Security in Trusted Non-3GPP Accesses / 7.3.5:
Access Security in Untrusted Non-3GPP Access / 7.3.6:
Special Considerations for Host-Based Mobility DSMIPv6 / 7.3.7:
Network Domain Security / 7.4:
User Domain Security / 7.5:
Security Aspects of Home eNBs and Home NBs / 7.6:
H(e)NB Security Architecture / 7.6.1:
Closed Subscriber Groups / 7.6.2:
Device Authentication / 7.6.3:
Hosting Party Authentication / 7.6.4:
Backhaul Link Security / 7.6.5:
Location Verification / 7.6.6:
Lawful Intercept / 7.7:
Quality of Service, Charging, and Policy Control / Chapter 8:
Quality of Service / 8.1:
QoS in E-UTRAN / 8.1.1:
QoS Aspects When Interworking with Other Accesses / 8.1.2:
Policy and Charging Control / 8.2:
The PCC Architecture / 8.2.1:
Basic PCC Concepts / 8.2.2:
Network vs. Terminal-Initiated QoS Control / 8.2.3:
PCC and Roaming / 8.2.4:
Additional PCC Features Developed Since Release 8 / 8.2.5:
PCC Support for Fixed Broadband Access / 8.2.6:
Charging / 8.3:
Selection Functions / Chapter 9:
Architecture Overview for Selection Functions / 9.1:
Selection of MME, SGSN, Serving GW, and PDN GW / 9.2:
Selection Procedure at a Glance / 9.2.1:
Use of DNS Infrastructure / 9.2.2:
MME Selection / 9.2.3:
SGSN Selection Function for EPS / 9.2.4:
GW Selection Overview / 9.2.5:
PDN GW Selection Function / 9.2.6:
Serving GW Selection Function / 9.2.7:
Handover (Non-3GPP Access) and PDN GW Selection / 9.2.8:
PCRF Selection / 9.3:
Subscriber Data Management. / Chapter 10:
Home Subscriber Server (HSS) / 10.1:
Subscriber Profile Repository (SPR) / 10.2:
User Data Convergence (UDC) / 10.3:
UDC Overall Description / 10.3.1:
Front-Ends and User Data Repository / 10.3.2:
Voice and Emergency Services / Chapter 11:
Voice Services Based on Circuit-Switched Technology / 11.1:
Voice Services with IMS Technology / 11.2:
MMTel / 11.3:
MMTel Architecture / 11.3.1:
VoLTE / 11.4:
T-ADS / 11.5:
Ensuring Service Coverage / 11.5.1:
Single Radio Voice Call Continuity (SRVCC) / 11.6:
Entities with Additional Functions to Support SRVCC / 11.6.1:
IMS Centralized Services (ICS) / 11.7:
Service Centralization and Continuity Application Server (SCC-AS) / 11.7.1:
SRVCC from E-UTRAN to GERAN or UTRAN / 11.7.2:
SRVCC from E-UTRAN to CDMA 1×RTT / 11.8:
Migration Paths and Coexistence of Circuit-Switched and VoLTE / 11.9:
EPS Emergency Bearer Service for IMS Emergency / 11.11:
Multimedia Priority Service (MPS) / 11.12:
LTE Broadcasting / Chapter 12:
Background and Main Concepts / 12.1:
MBMS Solution Overview / 12.2:
MBMS User Services / 12.3:
Associated Delivery Procedures / 12.3.1:
Mobile Network Architecture for MBMS / 12.4:
Interfaces / 12.4.1:
MBMS Bearer Services / 12.5:
Session Start / 12.5.1:
Session Stop / 12.5.2:
Session Update / 12.5.3:
Positioning / Chapter 13:
Positioning Solutions / 13.1:
Positioning Architecture and Protocols / 13.2:
Positioning Methods / 13.3:
Position-Reporting Formats / 13.4:
EPS Positioning Entities and Interfaces / 13.5:
GMLC / 13.5.1:
E-SMLC / 13.5.2:
SLP / 13.5.3:
Le Interface / 13.5.4:
SLg Interface / 13.5.5:
SLs Interface / 13.5.6:
LTE Positioning Protocol (LPP) / 13.5.7:
LTE Positioning Protocol Annex (LPPa) / 13.5.8:
Positioning Procedure / 13.6:
Offload Functions and Simultaneous Multi-Access / Chapter 14:
Offloading the 3GPP RAN - Simultaneous Multi-Access / 14.1:
Multi-Access PDN Connectivity (MAPCON) / 14.2.1:
LP Flow Mobility (LFOM) / 14.2.2:
Non-Seamless WLAN Offloading (NSWO) / 14.2.3:
Offloading the Core and Transport Network - Selected IP Traffic Offload (SLPTO) / 14.3:
Access to Local Networks - Local LP Access (LLPA) / 14.4:
The Nuts and Bolts of EPC / Part IV:
EPS Network Entities and Interfaces / Chapter 15:
Network Entities / 15.1:
eNodeB / 15.1.1:
Mobility Management Entity / 15.1.2:
Serving GW / 15.1.3:
PDN GW / 15.1.4:
Policy and Charging Rules Function / 15.1.5:
Home eNodeB Subsystem and Related Entities / 15.1.6:
Control Plane Between UE, eNodeB, and MME / 15.2:
S1-MME / 15.2.1:
GTP-Based Interfaces / 15.3:
Control Plane / 15.3.1:
MME↔MME(SIO) / 15.3.2:
MME↔Serving GW(S 11) / 15.3.3:
Serving GW↔PDN GW (S5/S8) / 15.3.4:
SGSN↔MME (S3) / 15.3.5:
SGSN↔Serving GW (S4) / 15.3.6:
SGSN↔SGSN (S16) / 15.3.7:
Trusted WLAN Access Network ↔ PDN GW (S2a) / 15.3.8:
ePDG PDN GW (S2b) / 15.3.9:
User Plane / 15.3.10:
eNodeB Serving GW (S1-U) / 15.3.11:
UE ↔ eNodeB Serving GW PDN GW (GTP-TJ) / 15.3.12:
UE ↔ BSS ↔ SGSN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.13:
UE ↔ UTRAN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.14:
UE ↔ UTRAN ↔ SGSN Serving GW ↔ PDN GW (GTP-U) / 15.3.15:
UE ↔ Trusted WLAN Access Network ↔ PDN GW (GTP-U) / 15.3.16:
UE ↔ ePDG ↔ PDN GW (GTP-U) / 15.3.17:
PMLP-Based Interfaces / 15.4:
Serving GW-PDN GW (S5/S8) / 15.4.1:
Trusted Non-3GPP IP Access-PDN GW (S2a) / 15.4.2:
ePDG-PDN GW (S2b) / 15.4.3:
DSMLPv6-Based Interfaces / 15.5:
UE-PDN GW (S2c) / 15.5.1:
HSS-Related Interfaces and Protocols / 15.6:
MME-HSS (S6a) and SGSN-HSS (S6d) / 15.6.1:
AAA-Related Interfaces / 15.7:
AAA Server-HSS (SWx) / 15.7.1:
Trusted Non-3GPP Access-3GPP AAA Server/Proxy (STa) / 15.7.3:
Untrusted Non-3GPP BP Access-3GPP AAA Server/Proxy (SWa) / 15.7.4:
ePDG-3GPP AAA Server/Proxy (SWm) / 15.7.5:
PDN GW-3GPP AAA Server/Proxy (S6b) / 15.7.6:
3GPP AAA Proxy-3GPP AAA Server/Proxy (SWd) / 15.7.7:
PCC-Related Interfaces / 15.8:
PCEF-PCRF (Gx) / 15.8.1:
BBERF-PCRF (Gxa/Gxc) / 15.8.3:
PCRF-AE (Rx) / 15.8.4:
TDF-PCRF (Sd) / 15.8.5:
OCS-PCRF (Sy) / 15.8.6:
PCRF-PCRF (S9) / 15.8.7:
BPCF-PCRF (S9a) / 15.8.8:
SPR-PCRF(Sp) / 15.8.9:
EIR-Related Interfaces / 15.9:
MME-EIR and SGSN-EIR Interfaces (S13 and S13') / 15.9.1:
I-WLAN-Related Interfaces / 15.10:
UE-ePDG (SWu) / 15.10.1:
ANDSF-Related Interfaces / 15.11:
ISMP Policy Node / 15.11.1:
Discovery Information Node / 15.11.2:
UE Location Node / 15.11.3:
ISRP Node / 15.11.4:
Ext Node / 15.11.5:
HRPD IW-Related Interfaces / 15.12:
Optimized Handover and Related Interfaces (S101 and S103) / 15.12.1:
MME ↔ eHRPD Access Network (S101) / 15.12.2:
Serving GW ↔ HSGW (S103) / 15.12.3:
Interface to External Networks / 15.13:
Functions / 15.13.1:
CSS Interface / 15.14:
MME-CSS Interface (S7a) / 15.14.1:
Protocols / Chapter 16:
GPRS Tunneling Protocol Overview / 16.1:
Protocol Structure / 16.2.1:
Control Plane (GTPv2-C) / 16.2.2:
User Plane (GTPv1-U) / 16.2.3:
Protocol Format / 16.2.4:
Mobile IP / 16.3:
Host-Based and Network-Based Mobility Mechanisms / 16.3.1:
Basic Principles of Mobile IP / 16.3.3:
Mobile IPv6 Security / 16.3.4:
Packet Format / 16.3.5:
Dual-Stack Operation / 16.3.6:
Additional MLPv6 Features - Route Optimization / 16.3.7:
Proxy Mobile IPv6 / 16.4:
Basic Principles / 16.4.1:
PMLPv6 Security / 16.4.3:
PMLPv6 Packet Format / 16.4.4:
Diameter / 16.4.5:
Background / 16.5.1:
Diameter Nodes / 16.5.2:
Diameter Sessions, Connections, and Transport / 16.5.4:
Diameter Request Routing / 16.5.5:
Peer Discovery / 16.5.6:
Diameter Message Format / 16.5.7:
Generic Routing Encapsulation / 16.6:
Basic Protocol Aspects / 16.6.1:
GRE Packet Format / 16.6.3:
S1-AP / 16.7:
Non-Access Stratum (NAS) / 16.8:
EPS Mobility Management / 16.8.1:
EPS Session Management / 16.8.2:
Message Structure / 16.8.3:
Security-Protected NAS Messages / 16.8.4:
Message Transport / 16.8.5:
Future Extensions and Backward Compatibility / 16.8.6:
IP Security / 16.9:
Encapsulated Security Payload and Authentication Header / 16.9.1:
Internet Key Exchange / 16.9.3:
IKEv2 Mobility and Multi-Homing / 16.9.4:
Extensible Authentication Protocol / 16.10:
Overview / 16.10.1:
Protocol / 16.10.2:
Stream Control Transmission Protocol / 16.11:
Basic Protocol Features / 16.11.1:
Multi-Steaming / 16.11.3:
Multi-Homing / 16.11.4:
Packet Structure / 16.11.5:
Procedures / Chapter 17:
Attachment and Detachment for E-UTRAN / 17.1:
Attachment Procedure for E-UTRAN / 17.1.1:
Detachment Procedure for E-UTRAN / 17.1.2:
Tracking Area Update for E-UTRAN / 17.2:
Tracking Area Update Procedure / 17.2.1:
TA Update with MME Change / 17.2.2:
Service Request for E-UTRAN / 17.3:
UE Triggered Service Request / 17.3.1:
Network Triggered Service Request / 17.3.2:
Intra- and Inter-3GPP Access Handover / 17.4:
Phases of the Handover Procedures / 17.4.1:
Handover Cases in EPS for 3GPP Accesses / 17.4.2:
Handover within E-UTRAN Access / 17.4.3:
Handover between E-UTRAN and Other 3GPP Accesses (GERAN, UTRAN) with S4-SGSN / 17.4.4:
Handover for Gn/Gp-Based SGSN / 17.4.5:
Handover between GERAN and UTRAN Access Using S4 SGSN and GTP/PMTP Protocol / 17.4.6:
Bearer and QoS-Related Procedures / 17.5:
Bearer Procedures for E-UTRAN / 17.5.1:
Bearer Procedures for GERAN/UTRAN / 17.5.2:
Attachment and Detachment for Non-3GPP Accesses / 17.6:
Attachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.1:
Detachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.2:
Attachment Procedure in Untrusted Non-3GPP Access Using PMJPv6 (S2b) / 17.6.3:
Detachment Procedure in Untrusted Non-3GPP Access Using PMIPv6 (S2b) / 17.6.4:
Attachment Procedure in Trusted Non-3GPP Access Using DSMTPv6 (S2c) / 17.6.5:
Detachment Procedure in Trusted Non-3GPP Access Using DSMJPv6 (S2c) / 17.6.6:
Intersystem Handover Between 3GPP and Non-3GPP Accesses / 17.7:
Details of Handover in EPS with Non-3GPP Accesses / 17.7.1:
QoS-Related Procedures in Non-3GPP Accesses / 17.8:
Conclusion and Future of EPS / Part V:
Conclusions and Looking Ahead / Chapter 18:
Standards Bodies Associated with EPS / Appendix A:
References
Index
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
7.

電子ブック

EB
Rob Huddleston
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2010
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgments
Introduction
Quick Start: Dive Into Flash Catalyst CS5
Rich Internet Applications and the Flash Platform / Part I:
Understanding Rich Internet Applications / Chapter 1:
Introducing Flash Catalyst / Chapter 2:
Working with Other Applications / Chapter 3:
Designing the Application / Part II:
Wireframing an Application in Flash Catalyst / Chapter 4:
Creating an Application Comp in Illustrator / Chapter 5:
Creating Assets in Photoshop / Chapter 6:
Using Fireworks with Flash Catalyst / Chapter 7:
Creating the Application in Catalyst / Part III:
Converting Illustrator and Photoshop Artwork into Catalyst Projects / Chapter 8:
Converting Artwork to Components / Chapter 9:
Creating View States / Chapter 10:
Adding Animation / Chapter 11:
Working with Design-time Data / Chapter 12:
Adding Multimedia / Chapter 13:
Exporting Projects into Flash Builder 4 / Part IV:
Flash Builder 4 and the Flex Framework / Chapter 14:
Export a Flash Catalyst Project to Flash Builder / Chapter 15:
Returning a Project to Flash Catalyst / Chapter 16:
Exporting Catalyst Projects Directly to Flash Player / Chapter 17:
Creating a Project for AIR / Chapter 18:
Build a Complete Project / Part V:
Creating a Design Comp in Illustrator / Chapter 19:
Importing the Design into Catalyst / Chapter 20:
Importing Additional Artwork from Illustrator and Photoshop / Chapter 21:
Converting Artwork to Components in Your Project / Chapter 22:
Creating View States in Your Project / Chapter 23:
Adding Data Lists / Chapter 24:
Importing Your Project into Flash Builder / Chapter 25:
Connecting Your Project to Live Data / Chapter 26:
Appendixes / Part VI:
Keyboard Shortcuts / Appendix A:
Best Practices / Appendix B:
What's on the Book's Web Site / Appendix C:
Index
Foreword
Preface
Acknowledgments
8.

電子ブック

EB
Rose Qingyang Hu, Rose Qingyang Hu, Yi Qian, Haijian Sun
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2013
所蔵情報: loading…
9.

電子ブック

EB
Thierry; Ran, Moshe Lestable, Thierry Lestable, Moshe Ran
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2011
所蔵情報: loading…
目次情報: 続きを見る
About the Editors
Contributors
Preface
Acknowledgments
Abbreviations
Coding / Gerhard Bauch ; Claude Berrou ; David Declercq ; Alexandre Graell I Amat ; Youssouf Ould-Cheikh-Mouhamedou ; Yannick Saouter ; Jossy Sayir ; Marcos B.S. Tavares1:
General Code Types / 1.1:
Designing Codes Based on Graphs / 1.2:
Pseudorandom Designs / 1.3:
Pseudorandom Designs for Turbo Codes / 1.3.1:
Structured Designs / 1.3.2:
Code Optimization / 1.3.3:
Repeat Accumulate Codes / 1.4:
Binary versus Nonbinary / 1.5:
Performance Results of Nonbinary LDPC Codes / 1.6:
Small Codeword Lengths / 1.6.1:
High-Order Modulations / 1.6.2:
Brief Presentation of NB-LDPC Decoders / 1.6.3:
Three-Dimensional (3D) Turbo Codes / 1.7:
The Encoding Structure / 1.7.1:
Simulation Results / 1.7.2:
Conclusions / 1.8:
References
Decoding / Moshe Ran ; Carlos De Segovia ; Omer Ran2:
Algebraic Soft-Decision (ASD) and Reliability-Based Decoders / 2.1:
Reliability-Based Soft-Decision Decoding / 2.1.1:
Adaptive Iterative Soft-Decision Decoders for Short Packet Lengths / 2.1.2:
Algebraic Soft-Decision and Reed-Solomon Codes / 2.1.3:
Graph versus Trellis Decoding Algorithms / 2.2:
BP-Based Algorithms / 2.2.1:
BCJR-Based Algorithms / 2.2.2:
Incremental Redundancy for Coding / Stefania Sesia ; Charly Poulliat3:
Introduction / 3.1:
Retransmission Protocols (ARQ) / 3.2:
Stop-and-Wait ARQ Protocol / 3.2.1:
Go-Back-N ARQ Protocol / 3.2.2:
Selective Repeat (SR) ARQ Protocol / 3.2.3:
Summary, and Challenges / 3.2.4:
HARQ Schemes / 3.3:
Type I HARQ / 3.3.1:
Type II HARQ / 3.3.2:
Comparison in Terms of Buffer Requirements / 3.3.3:
Design of Hybrid ARQ Type II / 3.4:
Mathematical System Model / 3.4.1:
Throughput Analysis / 3.4.2:
Code Design / 3 5:
Rate-Compatible Punctured (RCP) Convolutional Codes / 3.5.1:
Rate-Compatible Punctured Turbo Codes / 3.5.2:
Fountain and Raptor Codes / 3.5.3:
Low-Density Parity-Check Codes / 3 5.4:
Generalization of the Mutual Information Evolution for Incremental Redundancy Protocols / 3.6:
Complexity for Iterative Decoding Schemes in the Context of Incremental Redundancy Protocols / 3.6.1:
ARQ/HARQ in the Standards / 3.7:
Retransmission Protocols in 3GPP Standard / 3.7.7:
Retransmission Protocols in Non-3GPP Standard / 3.7.2:
Architecture and Hardware Requirements / Frank Kienle3.8:
Turbo Decoder Implementation / 4.1:
Interleaver and Deinterleaver / 4.1.1:
Serial Turbo Decoding / 4.1.2:
Parallel and Shuffled Turbo Decoding / 4.1.3:
Turbo Decoding with Parallel Component Decoder / 4.1.4:
MAP Decoder / 4.1.5:
Branch Metric Calculation / 4.1.6:
State and Path Metrics / 4.1.7:
Duobinary Codes / 4.1.8:
Quantization / 4.1.9:
Normalization / 4.1.10:
Implementation Results / 4.1.11:
LDPC Decoder Architectures / 4.2:
Generic Architecture Template / 4.2.1:
Two-Phase Architecture / 4.2.2:
Two-Phase Architecture with PN Branch / 4.2.3:
Single-Phase Architecture / 4.2.4:
Layered Architecture / 4.2.5:
Other Architecture Concepts / 4.2.6:
Considering Throughput and Latency / 4.2.7:
Considering VLSI Complexity / 4.2.8:
Considering Communications Performance / 4.2.9:
The LDPC Code Decoder Design Space / 4.2.10:
Architecture Parallelism / 4.2.11:
Traveling the Design Space / 4.2.12:
Implementation Issues / 4.2.13:
FPGA Implementation / 4.2.14:
ASIC Implementation / 4.2.15:
Power and Energy Issues / 4.2.16:
Design Studies / 4.2.17:
Turbo-Principle Extensions / Isabelle Siaud ; Ming Jiang ; Anne-Marie Ulmer-Moll ; Maryline Hélard ; Thierry Lestable5:
From Turbo Code to Advanced Iterative Receivers / 5.1:
From Turbo Code to Turbo Equalization / 5.2.1:
Turbo-Equalization Principle / 5.2.2:
Turbo Equalization Applied to Iterative Receiver / 5.2.3:
Turbo-Based Interleaving Techniques / 5.3:
General Principles of the Algorithm / 5.3.1:
Mathematical Description / 5.3.2:
Performance as Inner Interleaving to Turbo-FEC Structure / 5.3.3:
Performance as Outer Binary Interleaving / 5.3.4:
Performance as Dynamic Subcarrier Mapping Allocation / 5.5.5:
Turbo-MIMO Techniques / 5.4:
System Overview / 5.4.7:
Genetically Inspired Optimization / 5.4.3:
Turbo MIMO-OFDM Receiver using GA-Aided Iterative Channel Estimation / 5.4.4:
Standardization / Marie-Hélene Hamon ; Isabelle Siaud)5.4.5:
3GPP Systems: UMTS and LTE / 6.1:
IEEE 802.16/WiMAX / 6.2:
IEEE802.11n / 6.3:
Satellite (DVB-RCS, DVB-S2) / 6.4:
Wireless Rural Area Network: The IEEE802.22 standard [IEEE802_22] / 6.5:
FEC Coding / 6.5.1:
Outing Interleaving / 6.5.2:
Others / 6.6:
Index
About the Editors
Contributors
Preface
10.

電子ブック

EB
John Walkenbach, Walkenbach
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2010
所蔵情報: loading…
目次情報: 続きを見る
Introduction
Some Essential Background / Part I:
Excel 2010: Where It Came From / Chapter 1:
Excel in a Nutshell / Chapter 2:
Formula Tricks and Techniques / Chapter 3:
Understanding Excel Files / Chapter 4:
Excel Application Development / Part II:
What Is a Spreadsheet Application? / Chapter 5:
Essentials of Spreadsheet Application Development / Chapter 6:
Understanding Visual Basic for Applications / Part III:
Introducing Visual Basic for Applications / Chapter 7:
VBA Programming Fundamentals / Chapter 8:
Working with VBA Sub Procedures / Chapter 9:
Creating Function Procedures / Chapter 10:
VBA Programming Examples and Techniques / Chapter 11:
Working with UserForms / Part IV:
Custom Dialog Box Alternatives / Chapter 12:
Introducing UserForms / Chapter 13:
UserForm Examples / Chapter 14:
Advanced UserForm Techniques / Chapter 15:
Advanced Programming Techniques / Part V:
Developing Excel Utilities with VBA / Chapter 16:
Working with Pivot Tables / Chapter 17:
Working with Charts / Chapter 18:
Understanding Excel's Events / Chapter 19:
Interacting with Other Applications / Chapter 20:
Creating and Using Add-Ins / Chapter 21:
Developing Applications / Part VI:
Working with the Ribbon / Chapter 22:
Working with Shortcut Menus / Chapter 23:
Providing Help for Your Applications / Chapter 24:
Developing User-Oriented Applications / Chapter 25:
Other Topics / Part VII:
Compatibility Issues / Chapter 26:
Manipulating Files with VBA / Chapter 27:
Manipulating Visual Basic Components / Chapter 28:
Understanding Class Modules / Chapter 29:
Working with Colors / Chapter 30:
Frequently Asked Questions about Excel Programming / Chapter 31:
Appendixes / Part VIII:
Excel Resources Online / Appendix A:
VBA Statements and Functions Reference / Appendix B:
VBA Error Codes / Appendix C:
What's on the CD-ROM / Appendix D:
Index
End-User License Agreement
Introduction
Some Essential Background / Part I:
Excel 2010: Where It Came From / Chapter 1:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼