close
1.

電子ブック

EB
René Brun, Rene Brun, Federico Carminati, Giuliana Galli Carminati
出版情報: SpringerLink Books Physics And Astronomy 2012 , Dordrecht : Springer Berlin Heidelberg, 2012
所蔵情報: loading…
2.

電子ブック

EB
Moses Charikar, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , SIAM, 2010
所蔵情報: loading…
3.

電子ブック

EB
Úlfar Erlingsson, Takeo Kanade, Roel Wieringa, Nicola Zannone, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Model-Based Security I / Session 1:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations / Benjamin Aziz ; Alvaro E. Arenas ; Michael Wilson
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy / David Power ; Mark Slaymaker ; Andrew Simpson
Security Validation of Business Processes via Model-Checking / Wihem Arsac ; Luca Compagna ; Giancarlo Pellegrino ; Serena Elisa Ponta
Tools and Mechanisms / Session 2:
On-Device Control Flow Verification for Java Programs / Arnaud Fontaine ; Samuel Hym ; Isabelle Simplot-Ryl
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations / Ricardo Corin ; Felipe Andrés Manzano
Predictability of Enforcement / Nataliia Bielova ; Fabio Massacci
Web Security / Session 3:
SessionShield: Lightweight Protection against Session Hijacking / Nick Nikiforakis ; Wannes Meert ; Yves Younan ; Martin Johns ; Wouter Joosen
Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applications / Thanh Binh Dao ; Etsuya Shibayama
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications / Philippe De Ryck ; Lieven Desmet
Model-Based Security II / Sesssion 4:
Lightweight Modeling and Analysis of Security Concepts / Jörn Eichler
A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications / Linda Ariani Gunawan ; Frank Alexander Kraemer ; Peter Herrmann
An Architecture-Centric Approach to Detecting Security Patterns in software / Michaela Bunke ; Karsten Sohr
Security Requirements Engineering / Session 5:
The Security Twin Peaks / Thomas Heyman ; Koen Yskout ; Riccardo Scandariato ; Holger Schmidt ; Yijun Yu
Evolution of Security Requirements Tests for Service-Centric Systems / Michael Felderer ; Berthold Agreiter ; Ruth Breu
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes / Stephan Neuhaus ; Viet Hung Nguyen
Authorization / Session 6:
Authorization Enforcement Usability Case Study / Steffen Bartsch
Scalable Authorization Middleware for Service Oriented Architectures / Tom Goovaerts
Adaptable Authentication Model: Exploring Security with Weaker Attacker Models / Naveed Ahmed ; Christian D. Jensen
Ideas / Session 7:
Idea: Interactive Support for Secure Software Development / Jing Xie ; Bill Chu ; Heather Richter Lipford
Idea: A Reference Platform for Systematic Information Security Management Tool Support / Ingo Müller ; Jun Han ; Jean-Guy Schneider ; Steven Versteeg
Idea: Simulation Based Security Requirement Verification for Transaction Level Models / Johannes Loinig ; Christian Steger ; Reinhold Weiss ; Ernst Haselsteiner
Author Index
Model-Based Security I / Session 1:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations / Benjamin Aziz ; Alvaro E. Arenas ; Michael Wilson
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy / David Power ; Mark Slaymaker ; Andrew Simpson
4.

電子ブック

EB
Indranil Gupta, Takeo Kanade, Cecilia Mascolo, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cloud Computing
FLEX: A Slot Allocation Scheduling Optimizer for MapReduce Workloads / Joel Wolf ; Deepak Rajan ; Kirsten Hildrum ; Rohit Khandekar ; Vibhore Kumar ; Sujay Parekh ; Kun-Lung Wu ; Andrey Balmin
Adapting Distributed Real-Time and Embedded Pub/Sub Middleware for Cloud Computing Environments / Joe Hoffert ; Douglas C. Schmidt ; Aniruddha Gokhale
BrownMap: Enforcing Power Budget in Shared Data Centers / Akshat Verma ; Pradipta De ; Vijay Mann ; Tapan Nayak ; Amit Purohit ; Gargi Dasgupta ; Ravi Kothari
Data Management
A Dynamic Data Middleware Cache for Rapidly-Growing Scientific Repositories / Tanu Malik ; Xiaodan Wang ; Philip Little ; Amitabh Chaudhary ; Ani Thakar
Anonygator: Privacy and Integrity Preserving Data Aggregation / Krishna P.N. Puttaswamy ; Ranjita Bhagwan ; Venkata N. Padmanabhan
Middleware for a Re-configurable Distributed Archival Store Based on Secret Sharing / Shiva Chaitanya ; Dharani Vijayakumar ; Bhuvan Urgaonkar ; Anand Sivasubramaniam
Publish-Subscribe and Multicast Systems
Parametric Subscriptions for Content-Based Publish/Subscribe Networks / K.R. Jayaram ; Chamikara Jayalath ; Patrick Eugster
Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications / Qi Huang ; Daniel A. Freedman ; Ymir Vigfusson ; Ken Birman ; Bo Peng
FaReCast: Fast, Reliable Application Layer Multicast for Flash Dissemination / Kyungbaek Kim ; Sharad Mehrotra ; Nalini Venkatasubramanian
Social and Location-Aware Middleware
The Gossple Anonymous Social Network / Marin Bertier ; Davide Frey ; Rachid Guerraoui ; Anne-Marie Kermarrec ; Vincent Leroy
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications / Nicolas Kourtellis ; Joshua Finnis ; Paul Anderson ; Jeremy Blackburn ; Cristian Borcea ; Adriana Iamnitchi
PerPos: A Translucent Positioning Middleware Supporting Adaptation of Internal Positioning Processes / Jakob Langdal ; Kari R. Schougaard ; Mikkel B. Kjærgaard ; Thomas Toftkjær
Reliability and Legacy
dFault: Fault Localization in Large-Scale Peer-to-Peer Systems / Pawan Prakash ; Ramana Rao Kompella ; Venugopalan Ramasubramanian ; Ranveer Chandra
Bridging the Gap between Legacy Services and Web Services / Tegawendé F. Bissyandé ; Laurent Réveillère ; Yérom-David Bromberg ; Julia L. Lawall ; Gilles Muller
Trust and Security
Enforcing End-to-End Application Security in the Cloud (Big Ideas Paper) / Jean Bacon ; David Evans ; David M. Eyers ; Matteo Migliavacca ; Peter Pietzuch ; Brian Shand
LiFTinG: Lightweight Freerider-Tracking in Gossip / Kévin Huguenin ; Maxime Monod ; Swagatika Prusty
Distributed Middleware Enforcement of Event Flow Security Policy / Ioannis Papagiannis
Transactional Memory
Automatically Generating Symbolic Prefetches for Distributed Transactional Memories / Alokika Dash ; Brian Demsky
Asynchronous Lease-Based Replication of Software Transactional Memory / Nuno Carvalho ; Paolo Romano ; Luís Rodrigues
Author Index
Cloud Computing
FLEX: A Slot Allocation Scheduling Optimizer for MapReduce Workloads / Joel Wolf ; Deepak Rajan ; Kirsten Hildrum ; Rohit Khandekar ; Vibhore Kumar ; Sujay Parekh ; Kun-Lung Wu ; Andrey Balmin
Adapting Distributed Real-Time and Embedded Pub/Sub Middleware for Cloud Computing Environments / Joe Hoffert ; Douglas C. Schmidt ; Aniruddha Gokhale
5.

電子ブック

EB
Fabio Massacci, Takeo Kanade, Dan Wallach, Nicola Zannone, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Attack Analysis and Prevention I / Session 1:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks / Francesco Gadaleta ; Yves Younan ; Wouter Joosen
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests / Philippe De Ryck ; Lieven Desmet ; Thomas Heyman ; Frank Piessens
Idea: Opcode-Sequence-Based Malware Detection / Igor Santos ; Felix Brezo ; Javier Nieves ; Yoseba K. Penya ; Borja Sanz ; Carlos Laorden ; Pablo G. Bringas
Attack Analysis and Prevention II / Session 2:
Experiences with PDG-Based IFC / Christian Hammer
Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications / James Walden ; Maureen Doyle ; Robert Lenhof ; John Murray
Idea: Towards Architecture-Centric Security Analysis of Software / Karsten Sohr ; Bernhard Berger
Policy Verification and Enforcement I / Session 3:
Formally-Based Black-Box Monitoring of Security Protocols / Alfredo Pironti ; Jan Jürjens
Secure Code Generation for Web Applications / Martin Johns ; Christian Beyerlein ; Rosemaria Giesecke ; Joachim Posegga
Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation / Per Håkon Meland ; Inger Anne Tøndel ; Jostein Jensen
Policy Verification and Enforcement II / Session 4:
Model-Driven Security Policy Deployment: Property Oriented Approach / Stere Preda ; Nora Cuppens-Boulahia ; Frédéric Cuppens ; Joaquin Garcia-Alfaro ; Laurent Toutain
Category-Based Authorisation Models: Operational Semantics and Expressive Power / Clara Bertolissi ; Maribel Fernández
Idea: Efficient Evaluation of Access Control Constraints / Achim D. Brucker ; Helmut Petritsch
Secure System and Software Development I / Session 5:
Formal Verification of Application-Specific Security Properties in a Model-Driven Approach / Nina Moebius ; Kurt Stenzel ; Wolfgang Reif
Idea: Enforcing Consumer-Specified Security Properties for Modular Software / Giacomo A. Galilei ; Vincenzo Gervasi
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks / Ben Smith ; Laurie Williams ; Andrew Austin
Secure System and Software Development II / Session 6:
Automatic Generation of Smart, Security-Aware GUI Models / David Basin ; Manuel Clavel ; Marina Egea ; Michael Schläpfer
Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems / Albin Zuccato ; Nils Daniels ; Cheevarat Jampathom ; Mikael Nilson
Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality / Aida Omerovic ; Anette Andresen ; Håvard Grindheim ; Per Myrseth ; Atle Refsdal ; Ketil Stølen ; Jon Ølnes
Author Index
Attack Analysis and Prevention I / Session 1:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks / Francesco Gadaleta ; Yves Younan ; Wouter Joosen
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests / Philippe De Ryck ; Lieven Desmet ; Thomas Heyman ; Frank Piessens
6.

電子ブック

EB
David Hutchison, Takeo Kanade, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
7.

電子ブック

EB
Jean-Luc Starck, Jalal M. Fadili, Fionn Murtagh
出版情報: Cambridge University Press Online Books , Cambridge University Press, 2010
所蔵情報: loading…
目次情報: 続きを見る
Acronyms
Notation
Preface
Introduction to the World of Sparsity / 1:
Sparse Representation / 1.1:
From Fourier to Wavelets / 1.2:
From Wavelets to Overcomplete Representations / 1.3:
Novel Applications of the Wavelet and Curvelet Transforms / 1.4:
Summary / 1.5:
The Wavelet Transform / 2:
Introduction / 2.1:
The Continuous Wavelet Transform / 2.2:
Examples of Wavelet Functions / 2.3:
Continuous Wavelet Transform Algorithm / 2.4:
The Discrete Wavelet Transform / 2.5:
Nondyadic Resolution Factor / 2.6:
The Lifting Scheme / 2.7:
Wavelet Packets / 2.8:
Guided Numerical Experiments / 2.9:
Redundant Wavelet Transform / 2.10:
The Undecimated Wavelet Transform / 3.1:
Partially Decimated Wavelet Transform / 3.3:
The Dual-Tree Complex Wavelet Transform / 3.4:
Isotropic Undecimated Wavelet Transform: Starlet Transform / 3.5:
Nonorthogonal Filter Bank Design / 3.6:
Pyramidal Wavelet Transform / 3.7:
Nonlinear Multiscale Transforms / 3.8:
Decimated Nonlinear Transform / 4.1:
Multiscale Transform and Mathematical Morphology / 4.3:
Multiresolution Based on the Median Transform / 4.4:
The Ridgelet and Curvelet Transforms / 4.5:
Background and Example / 5.1:
Ridgelets / 5.3:
Curvelets / 5.4:
Curvelets and Contrast Enhancement / 5.5:
Sparsity and Noise Removal / 5.6:
Term-By-Term Nonlinear Denoising / 6.1:
Block Nonlinear Denoising / 6.3:
Beyond Additive Gaussian Noise / 6.4:
Poisson Noise and the Haar Transform / 6.5:
Poisson Noise with Low Counts / 6.6:
Linear Inverse Problems / 6.7:
Sparsity-Regularized Linear Inverse Problems / 7.1:
Monotone Operator Splitting Framework / 7.3:
Selected Problems and Algorithms / 7.4:
Sparsity Penalty with Analysis Prior / 7.5:
Other Sparsity-Regularized Inverse Problems / 7.6:
General Discussion: Sparsity, Inverse Problems, and Iterative Thresholding / 7.7:
Morphological Diversity / 7.8:
Dictionary and Fast Transformation / 8.1:
Combined Denoising / 8.3:
Combined Deconvolution / 8.4:
Morphological Component Analysis / 8.5:
Texture-Cartoon Separation / 8.6:
Inpainting / 8.7:
Sparse Blind Source Separation / 8.8:
Independent Component Analysis / 9.1:
Sparsity and Multichannel Data / 9.3:
Morphological Diversity and Blind Source Separation / 9.4:
Illustrative Experiments / 9.5:
Multiscale Geometric Analysis on the Sphere / 9.6:
Data on the Sphere / 10.1:
Orthogonal Haar Wavelets on the Sphere / 10.3:
Continuous Wavelets on the Sphere / 10.4:
Redundant Wavelet Transform on the Sphere with Exact Reconstruction / 10.5:
Curvelet Transform on the Sphere / 10.6:
Restoration and Decomposition on the Sphere / 10.7:
Applications / 10.8:
Compressed Sensing / 10.9:
Incoherence and Sparsity / 11.1:
The Sensing Protocol / 11.3:
Stable Compressed Sensing / 11.4:
Designing Good Matrices: Random Sensing / 11.5:
Sensing with Redundant Dictionaries / 11.6:
Compressed Sensing in Space Science / 11.7:
References / 11.8:
List of Algorithms
Index
Acronyms
Notation
Preface
8.

電子ブック

EB
Gautam Shroff
出版情報: Cambridge University Press Online Books , Leiden : Cambridge University Press, 2010
所蔵情報: loading…
目次情報: 続きを見る
Preface
Computing Platforms / Part I:
Enterprise computing: a retrospective / 1:
The internet as a platform / 2:
Software as a service and cloud computing / 3:
Enterprise architecture: role and evolution / 4:
Cloud Platforms / Part II:
Cloud computing platforms / 5:
Cloud computing economics / 6:
Cloud Technologies / Part III:
Web services, AJAX and mashups / 7:
Virtualization technology / 8:
Multi-tenant software / 9:
Cloud Development / Part IV:
Data in the cloud / 10:
MapReduce and extensions / 11:
Dev 2.0 platforms / 12:
Software Architecture / Part V:
Enterprise software: ERP, SCM, CRM / 13:
Custom enterprise applications and Dev 2.0 / 14:
Workflow and business processes / 15:
Enterprise analytics and search / 16:
Enterprise Cloud Computing / Part VI:
Enterprise cloud computing ecosystem / 17:
Roadmap for enterprise cloud computing / 18:
List of abbreviations
References
Index
Preface
Computing Platforms / Part I:
Enterprise computing: a retrospective / 1:
9.

電子ブック

EB
Richard Keith Johnson
出版情報: Cambridge University Press Online Books , Leiden : Cambridge University Press, 2010
所蔵情報: loading…
目次情報: 続きを見る
General principles / 1:
Formatting / 2:
Naming / 3:
Documentation / 4:
Programming / 5:
Files and organization / 6:
Development / 7:
General principles / 1:
Formatting / 2:
Naming / 3:
10.

電子ブック

EB
Krzysztof R. Apt, Erich Grädel, Erich Grädel
出版情報: Cambridge University Press Online Books , Leiden : Cambridge University Press, 2011
所蔵情報: loading…
目次情報: 続きを見る
List of contributors
Preface
A Primer on Strategic Games / Krzysztof R. Apt1:
Introduction / 1.1:
Basic concepts / 1.2:
Iterated elimination of strategies I / 1.3:
Mixed extension / 1.4:
Iterated elimination of strategies II / 1.5:
Variations on the definition of strategic games / 1.6:
Mechanism design / 1.7:
Pre-Bayesian games / 1.8:
Conclusions / 1.9:
Infinite Games and Automata Theory / Christof Löding2:
Basic notations and definitions / 2.1:
Transformation of winning conditions / 2.3:
Tree automata / 2.4:
Beyond finite automata / 2.5:
Conclusion / 2.6:
Algorithms for Solving Parity Games / Marcin Jurdzinski3:
Games on graphs / 3.1:
Solving repeated reachability and eventual safety games / 3.2:
Solving parity games / 3.3:
Related work / 3.4:
Back and Forth Between Logic and Games / Erich Grädel4:
Reachability games and parity games / 4.1:
Reachability games and logic / 4.3:
Logics with least and greatest fixed-points / 4.4:
Definability of winning regions in parity games / 4.5:
Inflationary fixed-point logic and backtracking games / 4.6:
Logic and games in a quantitative setting / 4.7:
Turn-Based Stochastic Games / Antonín Kucera5:
Winning objectives in stochastic games / 5.1:
Reachability objectives in games with finitely and infinitely many vertices / 5.3:
Some directions of future research / 5.4:
Games with Imperfect Information: Theory and Algorithms / Laurent Doyen ; Jean-François Raskin6:
Games with perfect information / 6.1:
Games with imperfect information: surely-winning / 6.3:
Games with imperfect information: almost-surely-winning / 6.4:
Graph Searching Games / Stephan Kreutzer7:
Classifying graph searching games / 7.1:
Variants of graph searching games / 7.3:
Monotonicity of graph searching / 7.4:
Obstructions / 7.5:
An application to graph-decompositions / 7.6:
Complexity of graph searching / 7.7:
Beyond Nash Equilibrium: Solution Concepts for the 21st Century / Joseph Y. Halpern7.8:
Robust and resilient equilibrium / 8.1:
Taking computation into account / 8.3:
Taking (lack of) awareness into account / 8.4:
Iterated regret minimisation / 8.5:
Index / 8.6:
List of contributors
Preface
A Primer on Strategic Games / Krzysztof R. Apt1:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼