close
1.

電子ブック

EB
John Daniel Aycock
出版情報: Springer eBooks Computer Science , Springer US, 2011
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Definitions and History / 1.1:
Motivation / 1.2:
Getting There / 2:
Installation / 2.1:
Explicit, Voluntary Installation / 2.1.1:
Drive-by Downloads, User Involvement / 2.1.2:
Drive-by Downloads, No User Involvement / 2.1.3:
Installation via Malware / 2.1.4:
Startup / 2.2:
Application-Specific Startup / 2.2.1:
GUI Startup / 2.2.2:
System Startup / 2.2.3:
Kernel Startup / 2.2.4:
Defenses / 2.2.5:
Staying There / 3:
Avoiding Detection / 3.1:
Basic Detection Avoidance / 3.1.1:
Anti-Spyware / 3.1.2:
Advanced Detection Avoidance: Rootkits / 3.1.3:
Avoiding Uninstall / 3.2:
Passive Avoidance / 3.2.1:
Active Avoidance / 3.2.2:
Keylogging / 4:
User Space Keylogging / 4.1:
Polling / 4.1.1:
Event Copying / 4.1.2:
Event Monitoring / 4.1.3:
User Space Keylogging Defenses / 4.2:
Authentication / 4.3:
Phoning Home / 5:
Push vs. Pull / 5.1:
Finding Home / 5.2:
Steganography / 5.3:
Information Leaking Defenses / 5.4:
Advertising / 6:
Types of Advertisement / 6.1:
Banner Advertisement / 6.1.1:
Banner Advertisement with Pull-down Menu / 6.1.2:
Expandable Banner Advertisement / 6.1.3:
Pushdown Banner Advertisement / 6.1.4:
Pop-up Advertisement / 6.1.5:
Pop-under Advertisement / 6.1.6:
Floating Advertisement / 6.1.7:
Tear-back Advertisement / 6.1.8:
In-text Advertisement / 6.1.9:
Transition Advertisement / 6.1.10:
Video Advertisements / 6.1.11:
Intent and Content / 6.2:
Advertisement Implementation / 7:
Implementation Location / 7.1:
Implementation on the User Machine / 7.1.1:
Implementation in the Network / 7.1.2:
Implementation near the User Machine / 7.1.3:
Implementation on the Server / 7.1.4:
Choosing Keywords / 7.2:
Blocking Advertisements / 7.3:
Pop-up Blocking / 7.3.1:
General Advertisement Blocking / 7.3.2:
Blocker Evasion and Blocker Blocking / 7.3.3:
Tracking Users
Cookies / 8.1:
Other Browser-Related Tracking Methods / 8.1.1:
User Profiling / 8.2:
Cognitive Styles, Mood, and Personality / 8.2.1:
Future Actions / 8.2.2:
Demographic Information / 8.2.3:
Social Networks / 8.2.4:
Real World Activities / 8.2.5:
Physical of Location / 8.2.6:
Search Terms and keywords / 8.2.7:
Disinterests / 8.2.8:
Conclusion / 9:
References
Index
Introduction / 1:
Definitions and History / 1.1:
Motivation / 1.2:
2.

電子ブック

EB
Massimo Cafaro, Giovanni Aloisio, Massimo Cafaro
出版情報: Springer eBooks Computer Science , Springer London, 2011
所蔵情報: loading…
3.

電子ブック

EB
Erik Champion
出版情報: Springer eBooks Computer Science , Springer London, 2011
所蔵情報: loading…
目次情報: 続きを見る
Introducing Virtual Travel / 1:
Virtual Environments / 1.1:
Moving Past the Picture Frame / 1.2:
Being Not-There May Be More Achievable / 1.3:
Being Not-There May Safeguard the Place / 1.4:
Share by Being Not-There / 1.5:
The Implications for Virtual Travel / 1.6:
Learning via Virtual Travel / 1.7:
The Thorny Issue of Engagement / 1.8:
Four Major Problems / 1.9:
Virtual Reality and Cultural Significance / 1.10:
References
Technological Limitations / 2:
Lack of Widely Distributed Technology / 2.2:
Size, Speed and Rendering Issues / 2.3:
Lack of Meaningful Content / 2.4:
We Experience More than Tangible Objects / 2.5:
The World Is More than Visual Stimuli / 2.6:
Different People See Different Things / 2.7:
Personalization Is Missing / 2.8:
Lack of Contextual Evaluation / 2.9:
Summary of Implications for Virtual Environments / 2.10:
Virtual Places / 3:
Place in a Virtual Space / 3.1:
Experiential Types of Place / 3.2:
Place as Unique Experience / 3.2.1:
Sublime Places of Terror and Awe / 3.2.2:
Evocative and Atmospheric Place / 3.2.3:
Place as Stage and Playground / 3.2.4:
Place as Trace and Palimpsest / 3.2.5:
Requirements for Creating a Sense of Place / 3.3:
Place Requires Embodiment / 3.3.1:
Place Requires Paths and Centers / 3.3.2:
Response to Place Requires Ongoing Feedback / 3.3.3:
Place Requires Social 'Embeddedness' / 3.3.4:
Place Is Mark-Able / 3.3.5:
Evoking Place via Arts and Sciences / 3.4:
Architecture / 3.4.1:
Art and Artifacts / 3.4.2:
Literature / 3.4.3:
Film / 3.4.4:
Cultural Geography in Place and Culture / 3.4.5:
Cyberspace Critics and Criteria / 3.5:
Cyberspaces Lack Limits / 3.5.1:
Cyberspaces Lack 'Play' Through Objects / 3.5.2:
Cyberspaces Lack Life History / 3.5.3:
Cyberspace Concepts and Terminology / 3.6:
Suggestions for Creating Cyberplace / 3.6.1:
Three Types of Virtual Environments / 3.7:
Inert 'Explorative' Environments / 3.7.1:
Activity-Based Environments / 3.7.2:
Cultural or 'Hermeneutic' Environments / 3.7.3:
Matching Virtual Environments and Technologies / 3.8:
Terms / 3.9:
Summary of Place Theory / 3.10:
Cultural and Social Presence / 4:
Why Photorealism Does Not Convey Cultural Significance / 4.1:
Virtual Heritage Is Not Realism / 4.1.1:
Phobic Triggers and Experiential Realism / 4.1.2:
Archaeology and History Is Not Set in Concrete / 4.1.3:
Confusion over Cultural Presence / 4.2:
What Is Culture? / 4.3:
What Is a Culturally Significant Place? / 4.3.1:
How Culture Is Learnt / 4.3.2:
Social and Cultural Presence / 4.3.3:
Hermeneutic Richness, Cultural Agency / 4.4:
Culture in Virtual Worlds / 4.5:
Useful Cultural Presence / 4.6:
Summary of Cultural Presence Theory / 4.7:
Game-Style Interaction / 5:
Defining Games / 5.1:
Defining Game-Style Interaction / 5.2:
Useful Features of Games / 5.2.1:
Engaging Features of Games / 5.2.2:
Case Study: Heretic II / 5.3:
Dynamic Places / 5.4:
Dynamic Place Design: Unreal Palenque and Xibalba / 5.4.1:
Racing in a Tent: Spatial and Haptic Immersion / 5.4.2:
Constrained Tasks and Goals / 5.5:
Interaction Modes in Palenque Using Adobe Atmosphere / 5.5.1:
Constrained Tasks in Journey to the West / 5.5.2:
Social Agency: Avatars Agents and Actors / 5.6:
Agency in a Marco Polo Game / 5.6.1:
Artifacts / 5.7:
Mapping to Aid Navigation for Egyptian Mythology / 5.7.1:
Mapping Through Drawing / 5.7.2:
Game-Based Learning / 5.8:
Procedural Versus Prescriptive Learning / 5.8.1:
Game Genres and Cultural Learning / 5.9:
Snakes and Ladders / 5.9.1:
Different Perspectives per Player / 5.9.2:
Role Playing / 5.9.3:
The Spy Game / 5.9.4:
Issues of Time: Interaction Versus Historical Authenticity / 5.10:
Ancillary Non-celebrity Characters / 5.10.1:
Autonomous Action, Immutable Results / 5.10.2:
Groundhog Day / 5.10.3:
Possible Worlds / 5.10.4:
Diary of Emotional Development / 5.10.5:
Surfing Memetic Drift / 5.10.6:
Augment History with Real World / 5.10.7:
Augmented Cultural Exchange / 5.10.8:
Game-Based Evaluation / 5.10.9:
Summary of Games-Style Interaction / 5.12:
Playing with the Past / 6:
What Is Virtual Heritage? / 6.1:
The Problem of Culture / 6.2:
Virtual Heritage Case Studies / 6.3:
Art History in Online Worlds: Santa Maria, Italy / 6.3.1:
Virtual Forbidden City, China / 6.3.2:
Dordrecht Monastery, The Netherlands / 6.3.3:
Urban Design and Virtual Sambor, Cambodia / 6.3.4:
FAS Palace, Mesopotamia / 6.3.5:
Culture and History Inside a Game: Palestine and Italy / 6.3.6:
Virtual Egyptian Temple / 6.3.7:
Dome Visualization: Mawson's Hut, Antarctica / 6.3.8:
Heritage Tour: Macquarie Lighthouse, Australia / 6.3.9:
Panoramic Explorations: PLACE-Hampi, India / 6.3.10:
Performance and Archaeology: Spaces of Mjalnar, Malta / 6.3.11:
Summary / 6.4:
Augmenting the Present With the Past / 7:
What Is Augmented Reality? / 7.1:
Blends of Augmented Reality and Augmented Virtuality / 7.2:
Inserted Walk-About Reality, University of South Australia / 7.2.1:
Overlaid Walk-About Reality, Columbia University / 7.2.2:
Bubbled Reality Example 3: Mawson's Huts, Antarctica / 7.2.3:
Other Types of Mixed Reality / 7.3:
Data-Streamed Virtual Reality / 7.3.1:
Augmented Virtuality / 7.3.2:
Audio Augmented Reality / 7.3.3:
Participant and Audience-Augmented Virtuality / 7.3.4:
Augmented Reality and Virtual Heritage / 7.4:
Evaluating Virtual Heritage / 7.5:
Testing That Which Is Not Yet Fully Tested / 8.1:
Evaluating Cultural Learning / 8.2:
Virtual Heritage Evaluation / 8.3:
What Types of Evaluation Are There? / 8.4:
Expert Testing / 8.4.1:
Content and Media Comparison Studies / 8.4.2:
Physiological Testing / 8.4.3:
Task Performance / 8.4.4:
Surveys/Questionnaires / 8.4.5:
Ethnographic Evaluation / 8.4.6:
Evaluating Virtual Heritage Environments / 8.5:
Task Performance and Game Evaluation / 8.5.1:
Statistical Methods Suitable for Virtual Heritage Projects / 8.5.2:
Evaluation Case Study: Palenque / 8.6:
Pilot Study / 8.6.1:
Evaluation / 8.6.2:
Evaluation Questions / 8.6.3:
Schedule of Evaluation / 8.6.4:
Observations / 8.6.5:
Summary of Evaluation for Virtual Heritage / 8.7:
Conclusion / 9:
Cultural Understanding Through Digital Interactivity / 9.1:
Future Research / 9.2:
Index
Introducing Virtual Travel / 1:
Virtual Environments / 1.1:
Moving Past the Picture Frame / 1.2:
4.

電子ブック

EB
Damith C.; Sheng, Quan Z.; Zeadally, Sherali Ranasinghe, Damith C. Ranasinghe, Quan Z. Sheng, Sherali Zeadally
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Future of RFID / Part I:
The Next Generation of RFID Technology / Peter H. Cole ; Leigh H. Turner ; Zhonghao Hu ; Damith C. Ranasinghe
Breakthrough Towards the Internet of Things / Leonardo W. F. Chaves ; Zoltán Nochta
Threats to Networked RFID Systems / Aikaterini Mitrokotsa ; Michael Beye ; Pedro Peris-Lopez
Data Management / Part II:
Temporal and Location Based RFID Event Data Management and Processing / Fusheng Wang ; Peiya Liu
Event Management of RFID Data Streams: Fast Moving Consumer Goods Supply Chains / John P. T. Mo ; Xue Li
Semantic-Based RFID Data Management / Roberto De Virgilio ; Eugenio Di Sciascio ; Michele Ruta ; Floriano Scioscia ; Riccardo Torlone
RFID Data Cleaning for Shop Floor Applications / Holger Ziekow ; Lenka Ivantysynova ; Oliver Günter
Global Information Architectures and Systems / Part III:
Autonomous Control and the Internet of Things: Increasing Robustness, Scalability and Agility in Logistic Networks / Dieter Uckelmann ; M.-A. Isenberg ; M. Teucke ; H. Halfar ; B. Scholz-Reiter
A Design for Secure Discovery Services in the EPCglobal Architecture / José J. Cantero ; Miguel A. Guijarro ; Antonio Plaza ; Guillermo Arrebola ; Janie Baños
Evaluating Discovery Services Architectures in the Context of the Internet of Things / Elias Polytarchos ; Stelios Eliakis ; Dimitris Bochtis ; Katerina Pramatari
RFID-Enhanced Ubiquitous Knowledge Bases: Framework and Approach
RFID Middleware Systems: A Comparative Analysis / Nova Ahmed ; Umakishore Ramachandran
Innovative Applications / Part IV:
RFID in the Apparel Retail Industry: A Case Study from Galeria Kaufhof / Jasser Al-Kassab ; Philipp Blome ; Gerd Wolfram ; Frédéric Thiesse ; Elgar Fleisch
The Potential of RFID Technology in the Textile and Clothing Industry: Opportunities, Requirements and Challenges / Elena Legnani ; Sergio Cavalieri ; Roberto Pinto ; Stefano Dotti
A New Security Paradigm for Anti-Counterfeiting: Guidelines and an Implementation Roadmap / Mikko Lehtonen
Green Logistics Management / Yoon S. Chang ; Chang H. Oh
Object Oriented Business Process Modelling in RFID Applied Computing Environments / Xiaohui Zhao ; Chengfei Liu ; Tao Lin
Business and Investment / Part V:
Legal Regulation and Consumers: The RFID Industry's Perspective / Daniel Ronzani
Investment Evaluation of RFID Technology Applications: An Evolution Perspective / Andriana Dimakopoulou ; Angeliki Karagiannaki ; George Papadopoulos ; Antonis Paraskevopoulos
An Analysis of the Impact of RFID Technology on Inventory Systems / Yacine Rekik
Index
Future of RFID / Part I:
The Next Generation of RFID Technology / Peter H. Cole ; Leigh H. Turner ; Zhonghao Hu ; Damith C. Ranasinghe
Breakthrough Towards the Internet of Things / Leonardo W. F. Chaves ; Zoltán Nochta
5.

電子ブック

EB
Alexander Dinghas, Cabiria Andreian Cazacu, Lenwood S. Heath, Rolf Herman Nevanlinna, Naren Ramakrishnan
出版情報: Springer eBooks Computer Science , Springer US, 2011
所蔵情報: loading…
目次情報: 続きを見る
Sequences / Part I:
Modern BLAST Programs / Jian Ma ; Louxin Zhang
Introduction / 1:
Available Implementations / 2:
Algorithm Description / 3:
BLAST Statistics / 4:
Examples / 5:
Advanced Topics / 6:
Exercises / 7:
Further Reading / 8:
References
Practical Multiple Sequence Alignment / Tobias Rausch ; Knut Reinert
History of the Problem
Sequence Alignment Statistics / John L. Spouge
Dynamic Programming with Independent Random Inputs
The Extreme-Value Distributions for Maxima
The Poisson Approximation for Counting Rare Events
Pairwise Sequence Alignment
Islands in Local Alignment
The Finite-Size Correction in Gapped Local Alignment
The Independent Diagonals Approximation
The Combinatorial Approximation / 9:
Phylogenetics / Part II:
Practical Implications of Coalescent Theory / Paul Marjoram ; Paul Joyce
Introduction - What is the coalescent?
Motivating Problems
Implications of the Coalescent
Software Review
Exercises for the reader
Graph Model of Coalescence with Recombinations / Laxmi Parida
Random Graph Framework: Pedigree Graph
Pedigree Subgraphs
Unilinear Transmission: Monochromatic Subgraphs
Genetic Exchange Model: Mixed Subgraph
Topological definition of GMRCA: Least Common Ancestor with Ancestry (LCAA)
Discussion
Phylogenetic Trees From Sequences / Paul Ryvkin ; Li-San Wang
Basics
Sequence evolution
Distance-based phylogeny reconstruction
Maximum parsimony
Maximum likelihood
Multiple phylogenies: comparison, consensus, and confidence
Software
Further reading
Exercise
Evolutionary Phylogenetic Networks: Models and Issues / Luay Nakhleh
Phylogenetic Networks and the Trees Within
Optimization Criteria for Inferring and Evaluating Phylogenetic Networks
To Network, or Not to Network, That Is the Question
Genome Wide Association Studies / Paola Sebastiani ; Nadia Solovieff
An overview of population genetics
Genome-Wide Association Studies
Resources
Proteins: Structure, Function, and Biochemistry / Part III:
Novel Perspectives on Protein Structure Prediction / Bonnie Berger ; Jérôme Waldispühl
Modeling transmembrane β-barrel structure
Energy model
Algorithms
Applications
Sampling the local neighborhood of 3D structures
Stochastic Simulation for Biochemical Systems / Yang Cao
Networks / Part IV:
Cellular Response Networks / Christopher D. Lasher ; Christopher L. Poirel ; T. M. Murali
Algorithm Descriptions
Advanced Topics: Comparing Response Networks
Outlook and Further Reading
Identification of Modules in Protein-Protein Interaction Networks / Sinan Erten ; Mehmet Koyutürk
Biological Data Management and Mining / Part V:
Designing Microarray Experiments / Jacqui Milton ; Ling Wang
Designed experiments versus observational studies
Discovery of Differentially Expressed Genes
Building prognostic models
Running the experiment
Advanced topics and further reading
Matrix and Tensor Decompositions / Karthik Devarajan
Non-negative Matrix Factorization
Singular Value Decomposition
Other Matrix Decompositions
Comparison of the Methods
Tensor Decompositions
Concluding Remarks
Practical Applications of the Gene Ontology Resource / Rachael P. Huntley ; Emily C. Dimmer ; Rolf Apweiler
GO Annotations
Viewing the GO and its annotations
Use of GO in the literature
Popular methods for supplementing and grouping GO annotations
The effective use of GO for large-scale analyses
Index
Sequences / Part I:
Modern BLAST Programs / Jian Ma ; Louxin Zhang
Introduction / 1:
6.

電子ブック

EB
Francesco Ricci, Paul B. Kantor, Lior Rokach, Bracha Shapira
出版情報: Springer eBooks Computer Science , Springer US, 2011
所蔵情報: loading…
7.

電子ブック

EB
Guanghui Wang, Q. M. Jonathan Wu
出版情報: Springer eBooks Computer Science , Springer London, 2011
所蔵情報: loading…
目次情報: 続きを見る
Introduction to 3D Computer Vision / 1:
Introduction / 1.1:
Imaging Geometry and Camera Models / 1.2:
Camera Models / 1.2.1:
Single View Imaging Geometry / 1.2.2:
Single View Metrology and Reconstruction / 1.3:
Measurement on Space Planes / 1.3.1:
Camera Calibration from a Single View / 1.3.2:
Measurement in 3D Space / 1.3.3:
Examples of Single View Reconstruction / 1.3.4:
Two-View Geometry and 3D Reconstruction / 1.4:
Epipolar Geometry and Fundamental Matrix / 1.4.1:
Three Dimensional Reconstruction / 1.4.2:
Reconstruction of Structured Scenes from Two Images / 1.5:
Plane Detection Strategy / 1.5.1:
Camera Calibration and Reconstruction / 1.5.2:
Closure Remarks / 1.6:
Conclusion / 1.6.1:
Review Questions / 1.6.2:
References
Simplified Camera Projection Models / 2:
Affine Projection Model / 2.1:
Quasi-Perspective Projection / 2.3:
Error Analysis of Different Models / 2.3.1:
Experimental Evaluations / 2.4:
Imaging Errors / 2.4.1:
Influence of Imaging Conditions / 2.4.2:
Geometrical Properties of Quasi-Perspective Projection / 2.5:
One-View Geometrical Property / 3.1:
Two-View Geometrical Property / 3.3:
Fundamental Matrix / 3.3.1:
Plane Induced Homography / 3.3.2:
Computation with Outliers / 3.3.3:
3D Structure Reconstruction / 3.4:
Evaluations on Synthetic Data / 3.5:
Fundamental Matrix and Homography / 3.5.1:
Outlier Removal / 3.5.2:
Reconstruction Result / 3.5.3:
Evaluations on Real Images / 3.6:
Test on Stone Dragon Images / 3.6.1:
Test on Medusa Head Images / 3.6.2:
Introduction to Structure and Motion Factorization / 3.7:
Problem Definition / 4.1:
Structure and Motion Factorization of Rigid Objects / 4.3:
Rigid Factorization Under Orthographic Projection / 4.3.1:
Rigid Factorization Under Perspective Projection / 4.3.2:
Structure and Motion Factorization of Nonrigid Objects / 4.4:
Bregler's Deformation Model / 4.4.1:
Nonrigid Factorization Under Affine Models / 4.4.2:
Nonrigid Factorization Under Perspective Projection / 4.4.3:
Factorization of Multi-Body and Articulated Objects / 4.5:
Multi-Body Factorization / 4.5.1:
Articulated Factorization / 4.5.2:
Perspective 3D Reconstruction of Rigid Objects / 4.6:
Previous Works on Projective Depths Recovery / 5.1:
Epipolar Geometry Based Algorithm / 5.2.1:
Iteration Based Algorithm / 5.2.2:
Hybrid Projective Depths Recovery / 5.3:
Initialization and Optimization / 5.3.1:
Selection of Reference Frames / 5.3.2:
Camera Calibration and Euclidean Reconstruction / 5.4:
Camera Self-calibration / 5.4.1:
Euclidean Reconstruction / 5.4.2:
Outline of the Algorithm / 5.4.3:
Projective Depths Recovery / 5.5:
Calibration and Reconstruction / 5.5.2:
Evaluations on Real Sequences / 5.6:
Test on Model House Sequence / 5.6.1:
Test on Stone Post Sequence / 5.6.2:
Test on Medusa Head Sequence / 5.6.3:
Perspective 3D Reconstruction of Nonrigid Objects / 5.7:
Perspective Depth Scales and Nonrigid Factorization / 6.1:
Perspective Depth Scales / 6.2.1:
Nonrigid Affine Factorization / 6.2.2:
Perspective Stratification / 6.3:
Linear Recursive Estimation / 6.3.1:
Nonlinear Optimization Algorithm / 6.3.2:
Reconstruction Results / 6.4:
Convergence and Performance Comparisons / 6.4.2:
Experiments with Real Sequences / 6.5:
Test on Franck Sequence / 6.5.1:
Test on Scarf Sequence / 6.5.2:
Rotation Constrained Power Factorization / 6.6:
Power Factorization for Rigid Objects / 7.1:
Power Factorization for Nonrigid Objects / 7.3:
Initialization and Convergence Determination / 7.3.1:
Sequential Factorization / 7.3.3:
Reconstruction Results and Evaluations / 7.4:
Convergence Property / 7.4.2:
Test on Grid Sequence / 7.4.3:
Test on Quilt Sequence / 7.5.2:
Stratified Euclidean Reconstruction / 7.6:
Deformation Weight Constraint / 8.1:
Nonrigid Factorization / 8.2.1:
Geometrical Explanation / 8.2.2:
Affine Structure and Motion Recovery / 8.3:
Constrained Power Factorization / 8.3.1:
Initalization and Convergence Determination / 8.3.2:
Segmentation and Stratification / 8.4:
Deformation Detection Strategy / 8.4.1:
Stratification to Euclidean Space / 8.4.2:
Implementation Outline / 8.4.3:
Convergence Property and Segmentation / 8.5:
Test on Toy Sequence / 8.6:
Quasi-Perspective Factorization / 8.7:
Background on Factorization / 9.1:
Quasi-Perspective Rigid Factorization / 9.3:
Euclidean Upgrading Matrix / 9.3.1:
Algorithm Outline / 9.3.2:
Quasi-Perspective Nonrigid Factorization / 9.4:
Problem Formulation / 9.4.1:
Evaluation on Rigid Factorization / 9.4.2:
Evaluation on Nonrigid Factorization / 9.5.2:
Evaluations on Real Image Sequences / 9.6:
Test on Fountain Base Sequence / 9.6.1:
Projective Geometry for Computer Vision / 9.6.2:
2D Projective Geometry / A.1:
Points and Lines / A.1.1:
Conics and Duel Conics / A.1.2:
2D Projective Transformation / A.1.3:
3D Projective Geometry / A.2:
Points, Lines, and Planes / A.2.1:
Projective Transformation and Quadrics / A.2.2:
Matrix Decomposition / Appendix B:
Singular Value Decomposition / B.1:
Properties of SVD Decomposition / B.1.1:
Low-Rank Matrix Approximation / B.1.2:
QR and RQ Decompositions / B.2:
Symmetric and Skew-Symmetric Matrix / B.3:
Cross Product / B.3.1:
Cholesky Decomposition / B.3.2:
Extended Cholesky Decomposition / B.3.3:
Numerical Computation Method / Appendix C:
Linear Least Squares / C.1:
Full Rank System / C.1.1:
Deficient Rank System / C.1.2:
Nonlinear Estimation Methods / C.2:
Bundle Adjustment / C.2.1:
Newton Iteration / C.2.2:
Levenberg-Marquardt Algorithm / C.2.3:
Glossary
Index
Introduction to 3D Computer Vision / 1:
Introduction / 1.1:
Imaging Geometry and Camera Models / 1.2:
8.

電子ブック

EB
Radhika Ranjan Roy
出版情報: Springer eBooks Computer Science , Springer US, 2011
所蔵情報: loading…
9.

電子ブック

EB
Paul Fieguth
出版情報: Springer eBooks Computer Science , Springer New York, 2011
所蔵情報: loading…
10.

電子ブック

EB
Sara Foresti
出版情報: Springer eBooks Computer Science , Springer US, 2011
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Motivation / 1.1:
Contribution of the Book / 1.2:
Access Control Enforcement / 1.2.1:
Privacy Protection / 1.2.2:
Safe Data Integration / 1.2.3:
Organization of the Book / 1.3:
Overview of the State of the Art / 2:
Chapter Outline / 2.1:
Basic Scenario and Data Organization / 2.2:
Parties Involved / 2.2.1:
Data Organization / 2.2.2:
Interactions / 2.2.3:
Querying Encrypted Data / 2.3:
Bucket-Based Approach / 2.3.1:
Hash-Based Approach / 2.3.2:
B+ Tree Approach / 2.3.3:
Order Preserving Encryption Approaches / 2.3.4:
Other Approaches / 2.3.5:
Evaluation of Inference Exposure / 2.4:
Integrity of Outsourced Data / 2.5:
Privacy Protection of Databases / 2.6:
Access Control Enforcement in the Outsourcing Scenario / 2.7:
Chapter Summary / 2.8:
Selective Encryption to Enforce Access Control / 3:
Relational Model / 3.1:
Basic Concepts and Notation / 3.2.1:
Access Control and Encryption Policies / 3.3:
Access Control Policy / 3.3.1:
Encryption Policy / 3.3.2:
Token Management / 3.3.3:
Minimal Encryption Policy / 3.4:
Vertices and Edges Selection / 3.4.1:
Vertices Factorization / 3.4.2:
A2E Algorithm / 3.5:
Correctness and Complexity / 3.5.1:
Policy Updates / 3.6:
Grant and Revoke / 3.6.1:
Correctness / 3.6.2:
Two-Layer Encryption for Policy Outsourcing / 3.7:
Two-Layer Encryption / 3.7.1:
Policy Updates in Two-Layer Encryption / 3.8:
Over-encrypt / 3.8.1:
Protection Evaluation / 3.8.2:
Exposure Risk: Full_SEL / 3.9.1:
Exposure Risk: Delta_SEL / 3.9.2:
Design Considerations / 3.9.3:
Experimental Results / 3.10:
Combining Fragmentation and Encryption to Protect Data Privacy / 3.11:
Confidentiality Constraints / 4.1:
Fragmentation and Encryption for Constraint Satisfaction / 4.3:
Minimal Fragmentation / 4.4:
Maximal Visibility / 4.4.1:
Minimum Number of Fragments / 4.4.3:
Fragmentation Lattice / 4.4.4:
A Complete Search Approach to Minimal Fragmentation / 4.5:
Computing a Minimal Fragmentation / 4.5.1:
A Heuristic Approach to Minimize Fragmentation / 4.5.2:
Computing a Vector-minimal Fragmentation / 4.6.1:
Taking Attribute Affinity into Account / 4.6.2:
A Heuristic Approach to Maximize Affinity / 4.8:
Computing a Vector-minimal Fragmentation with the Affinity Matrix / 4.8.1:
Query Cost Model / 4.8.2:
A Heuristic Approach to Minimize Query Cost Execution / 4.10:
Computing a Vector-minimal Fragmentation with the Cost Function / 4.10.1:
Query Execution / 4.10.2:
Indexes / 4.12:
Distributed Query Processing under Safely Composed Permissions / 4.13:
Preliminary Concepts / 5.1:
Data Model / 5.2.1:
Distributed Query Execution / 5.2.2:
Security Model / 5.3:
Permissions / 5.3.1:
Relation Profiles / 5.3.2:
Graph-based Model / 5.4:
Authorized Views / 5.5:
Authorizing Permissions / 5.5.1:
Composition of Permissions / 5.5.2:
Algorithm / 5.5.3:
Safe Query Planning / 5.6:
Third Party Involvement / 5.6.1:
Build a Safe Query Plan / 5.7:
Conclusions / 5.8:
Summary of the Contributions / 6.1:
Future Work / 6.2:
References / 6.2.1:
Introduction / 1:
Motivation / 1.1:
Contribution of the Book / 1.2:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼