close
1.

電子ブック

EB
David R. Brooks
出版情報: Springer eBooks Computer Science , London : Springer London, 2007
所蔵情報: loading…
2.

電子ブック

EB
Jan Olhager, Fredrik Persson
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
3.

電子ブック

EB
Eugen Lamers
出版情報: Springer eBooks Computer Science , Vieweg+Teubner, 2008
所蔵情報: loading…
4.

電子ブック

EB
Thorsten Staake, Elgar Fleisch
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Methodology
Acknowledgements
Organization of the Book
Knowing the Enemy - The Mechanisms of Counterfeit Trade / Part A:
An Introduction to Counterfeit Markets / 1:
The changing nature of counterfeit trade / 1.1:
A global problem - Frequently discussed, little understood / 1.2:
Counterfeiting is not parallel trade is not overproduction - Why a clear problem definition is needed / 1.3:
Academic publications on counterfeit trade / 1.4:
Understanding Counterfeit Supply / 2:
Strategies and production settings of counterfeit producers / 2.1:
Distribution channels and shipment strategies for illicit goods / 2.2:
Exploring the counterfeiters' business case / 2.3:
Research on counterfeit supply / 2.4:
Counterfeit Demand and the Role of the Consumer / 3:
Consumer behavior in counterfeit markets / 3.1:
Developing brand- and product-specific consumer studies / 3.2:
Research in counterfeit demand / 3.3:
Countermeasures - Best Practices and Strategy Development / Part B:
Established Anti-counterfeiting Approaches - Best Practices / 4:
State-of-the-art in anti-counterfeiting / 4.1:
The characteristics of successful practices / 4.2:
Research on managerial and legal countermeasures / 4.3:
Implementing Anti-counterfeiting Measures / 5:
Monitoring processes / 5.1:
Reaction processes / 5.2:
Preventive measures / 5.3:
Organizational structure of anti-counterfeiting units / 5.4:
Management Tools - Towards a Fact-based Managerial Approach / Part C:
Determining the Market Share of Counterfeit Articles / 6:
A critique of existing statistics / 6.1:
Macroeconomic calculations / 6.2:
Microeconomic calculations / 6.3:
Implications for Affected Enterprises / 7:
Quantifying the loss of revenue / 7.1:
A model to assess the impact on brand value / 7.2:
Implications for quality costs, liability claims, and future competition / 7.3:
Positive effects of counterfeit trade / 7.4:
Research on the impact of counterfeit trade / 7.5:
Product-protection Technologies / Part D:
Principles of Product Security Features / 8:
Classification of protection technologies / 8.1:
Attack scenarios and their implications / 8.2:
Requirements for security features / 8.3:
The Potential of RFID for Brand- and Product-protection / 9:
An introduction to the Internet of Things / 9.1:
Technical principles of RFID technology / 9.2:
Solution concepts / 9.3:
Application scenarios / 9.4:
Managerial Guidelines and Conclusions / Part E:
Guidelines / 10:
Concluding Remarks / 11:
Appendix
List of References
List of Abbreviations
Index
About the Authors
Foreword
Methodology
Acknowledgements
5.

電子ブック

EB
Eric Goetz, Sujeet Shenoi, J?rg Siekmann
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
6.

電子ブック

EB
Chryssis Georgiou, Alex A. Shvartsman, Alex Allister Shvartsman
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
List of Figures
List of Symbols
Foreword / Michel Raynal
Authors' Preface
Introduction / 1:
Do-All Computing / 1.1:
Do-All and Adversity / 1.2:
Solving Do-All: Fault-Tolerance with Efficiency / 1.3:
Chapter Notes / 1.4:
Distributed Cooperation Problems: Models and Definitions / 2:
Model of Computation / 2.1:
Distributed Setting / 2.1.1:
Communication / 2.1.2:
Models of Adversity / 2.2:
Processor Failure Types / 2.2.1:
Network Partitions / 2.2.2:
Adversaries and their Behavior / 2.2.3:
Tasks and Do-All Computing / 2.3:
The Do-All Problem / 2.3.1:
The Omni-Do Problem / 2.3.2:
Measures of Efficiency / 2.4:
Synchronous Do-All with Crashes: Using Perfect Knowledge and Reliable Multicast / 2.5:
Adversarial Model / 3.1:
Lower and Upper Bounds for Abstract Models / 3.2:
Modeling Knowledge / 3.2.1:
Lower Bounds / 3.2.2:
Upper Bounds / 3.2.3:
Solving Do-All Using Reliable Multicast / 3.3:
Algorithm AN / 3.3.1:
Correctness of algorithm AN / 3.3.2:
Analysis of Algorithm AN / 3.3.3:
Analysis of Message-Passing Iterative Do-All / 3.3.4:
Open Problems / 3.4:
Synchronous Do-All with Crashes and Point-to-Point Messaging / 3.5:
The Gossip Problem / 4.1:
Combinatorial Tools / 4.2:
Communication Graphs / 4.2.1:
Sets of Permutations / 4.2.2:
The Gossip Algorithm / 4.3:
Description of Algorithm Gossip[subscript epsilon] / 4.3.1:
Correctness of Algorithm Gossip[subscript epsilon] / 4.3.2:
Analysis of Algorithm Gossip[subscript epsilon] / 4.3.3:
The Do-All Algorithm / 4.4:
Description of Algorithm Doall[subscript epsilon] / 4.4.1:
Correctness of Algorithm Doall[subscript epsilon] / 4.4.2:
Analysis of Algorithm Doall[subscript epsilon] / 4.4.3:
Synchronous Do-All with Crashes and Restarts / 4.5:
A Lower Bound on Work for Restartable Processors / 5.1:
Algorithm AR for Restartable Processors / 5.3:
Description of Algorithm AR / 5.3.1:
Correctness of Algorithm AR / 5.3.2:
Complexity Analysis of Algorithm AR / 5.3.3:
Synchronous Do-All with Byzantine Failures / 5.4:
Task Execution without Verification / 6.1:
Known Maximum Number of Failures / 6.2.1:
Unknown Maximum Number of Failures / 6.2.2:
Task Execution with Verification / 6.3:
Asynchrony and Delay-Sensitive Bounds / 6.3.1:
Adversarial Model and Complexity / 7.1:
Delay-Sensitive Lower Bounds on Work / 7.2:
Deterministic Delay-Sensitive Lower Bound / 7.2.1:
Delay-sensitive Lower Bound for Randomized Algorithms / 7.2.2:
Contention of Permutations / 7.3:
Contention and Oblivious Tasks Scheduling / 7.3.1:
Generalized Contention / 7.3.2:
Deterministic Algorithms Family DA / 7.4:
Construction and Correctness of Algorithm DA(q) / 7.4.1:
Complexity Analysis of Algorithm DA(q) / 7.4.2:
Permutation Algorithms Family PA / 7.5:
Algorithm Specification / 7.5.1:
Complexity Analysis / 7.5.2:
Analysis of Omni-Do in Asynchronous Partitionable Networks / 7.6:
A Group Communication Service and Notation / 8.1:
View-Graphs / 8.3:
Algorithm AX / 8.4:
Description of the Algorithm / 8.4.1:
Correctness of the Algorithm / 8.4.2:
Analysis of Algorithm AX / 8.5:
Work Complexity / 8.5.1:
Message Complexity / 8.5.2:
Analysis Under Adversary A[subscript F] / 8.5.3:
Competitive Analysis of Omni-Do in Partitionable Networks / 8.6:
Model of Adversity, Competitiveness and Definitions / 9.1:
Adversary A[subscript GR] / 9.1.1:
Measuring Competitiveness / 9.1.2:
Formalizing Computation Width / 9.1.3:
Algorithm RS and its Analysis / 9.2:
Description of Algorithm RS / 9.2.1:
Analysis of Algorithm RS / 9.2.2:
Deterministic Algorithms / 9.2.3:
Cooperation in the Absence of Communication / 9.3:
Adversity, Schedules, Waste, and Designs / 10.1:
Redundancy without Communication: a Lower Bound / 10.2:
Random Schedules / 10.3:
Derandomization via Finite Geometries / 10.4:
Related Cooperation Problems and Models / 10.5:
Do-All in Shared-Memory / 11.1:
Do-All with Broadcast Channels / 11.2:
Consensus and its Connection to Do-All / 11.3:
References
Index
List of Figures
List of Symbols
Foreword / Michel Raynal
7.

電子ブック

EB
Workshop on Emerging Web Services Technology, Stefan Brantschen, Christoph Bussler, Monique Calisti, Cesare Pautasso, Marius Walliser
出版情報: Springer eBooks Computer Science , Birkh?user Basel, 2007
所蔵情報: loading…
8.

電子ブック

EB
Torsten; Diaz, Michel; Gabeiras, Jos? Enr?quez Braun, Torsten Braun, Thomas Staub
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Acronyms
Motivation and Basics / Torsten Braun ; Thomas Staub1:
Quality of Service and its Parameters / 1.1:
Delay and Delay Variations in End-to-End Packet Delivery / 1.1.1:
Bandwidth and Packet Loss Ratio / 1.1.2:
Applications' QoS Requirements / 1.2:
Types of Network Applications / 1.2.1:
QoS Requirements of Applications / 1.2.2:
Packet Scheduling in Network Elements / 1.3:
(Non)Work-Conserving Scheduling Disciplines / 1.3.1:
Fairness / 1.3.2:
Scheduling Disciplines / 1.3.3:
Packet Dropping / 1.3.4:
Quality-of-Service Architectures / 1.4:
Integrated Services / 1.4.1:
Differentiated Services / 1.4.2:
End-to-End QoS Mechanisms / 1.4.3:
Implementation and Performance of QoS-aware Applications / 1.5:
Prerequisites for Successful QoS Applications / 1.5.1:
Media Scaling / 1.5.2:
Applications' Performance Gain Due to QoS / 1.5.3:
Summary / 1.5.4:
Structure of the Book / 1.6:
QoS Measurements in IP-based Networks / Rene Serral-Gracia ; Jordi Domingo-Pascual ; Andrzej Beben ; Philippe Owezarski2:
Introduction / 2.1:
Measurement Metrics / 2.2:
Network Level / 2.2.1:
Call level / 2.2.2:
User Level / 2.2.3:
Measurement Techniques / 2.3:
Previous Considerations / 2.3.1:
Base Techniques / 2.3.2:
Active Measurements / 2.3.3:
Passive Measurements / 2.3.4:
Conclusions / 2.4:
Traffic Engineering / Luciano Lenzini ; Enzo Mingozzi ; Giovanni Stea3:
A Motivating Example / 3.1:
Multi-Protocol Label Switching Architecture / 3.3:
The Forwarding Component / 3.3.1:
The Control Component / 3.3.2:
MPLS Optimisation / 3.3.3:
MPLS-Based Traffic Engineering / 3.4:
Constraint-Based Routing / 3.4.1:
Explicit Route Signalling / 3.4.2:
Traffic Engineering Practices / 3.4.3:
Traffic Engineering and Quality of Service / 3.5:
QoS Support over MPLS / 3.5.1:
Traffic Engineering Extensions for DiffServ / 3.5.2:
Signalling / Ilaria Marchetti ; Antonio Pietrabissa ; Massimiliano Rossi ; Fernando Boavida ; Luis Cordeiro ; Edmundo Monteiro ; Marilia Curado3.6:
Session Initiation Protocol (SIP) / 4.1:
SIP and Its Value Propositions / 4.2.1:
Protocol Components / 4.2.2:
SIP Messages / 4.2.3:
Session Description / 4.2.4:
Establishment of an SIP Session / 4.2.5:
SIP's Extension / 4.2.6:
The Next Steps In Signalling (NSIS) / 4.3:
Background and Main Characteristics / 4.3.1:
Overview of Signalling Scenarios and Protocol Structure / 4.3.2:
The NSIS Layer Transport Protocol / 4.3.3:
Common Open Policy Service (COPS) / 4.4:
COPS Overview / 4.4.1:
Basic Model / 4.4.2:
COPS Protocol / 4.4.3:
COPS Messages / 4.4.4:
Common Operation / 4.4.5:
Using Examples: COPS for RSVP / 4.4.6:
Enhanced Transport Protocols / Nicolas Wambeke ; Ernesto Exposito ; Guillaume Jourjon ; Emmanuel Lochin4.5:
State of the Art of Transport Protocols / 5.1:
TCP and UDP / 5.2.1:
TCP Evolution / 5.2.2:
SCTP / 5.2.3:
DCCP / 5.2.4:
Discussion / 5.2.5:
Transport Mechanisms / 5.3:
Overview / 5.3.1:
Congestion-Control Mechanisms / 5.3.2:
Reliability Mechanisms / 5.3.3:
Enhanced Transport Protocol Mechanisms / 5.3.4:
TFRC and gTFRC, a QoS-Aware Congestion Control / 5.4.1:
Application-Aware Transport Mechanisms / 5.4.2:
The EuQoS System / Michel Diaz ; Jose Enriquez-Gabeiras ; Laurent Baresse ; Wojciech Burakowski ; Maria Angeles Callejo-Rodriguez ; Jorge Carapinha ; Olivier Dugeon ; Mathieu Gineste ; Florin Racaru ; Jaroslaw Sliwinski ; Halina Tarasiuk ; Markus Wulff5.5:
Architecture / 6.1:
Goals and Requirements / 6.2.1:
Functional Blocks and their Main Functions / 6.2.2:
Control Plane Elements: RM and RA / 6.2.3:
Provisioning, Invocation, and Operation, Administration and Management / 6.3:
Provisioning Process / 6.3.1:
Invocation Process / 6.3.2:
Operation, Administration and Management / 6.3.3:
End-to-End Classes of Service in Heterogeneous Networks / 6.4:
End-to-end Classes of Service in EuQoS / 6.4.1:
QoS Mechanisms and Algorithms for Specification of e2e Classes of Service / 6.4.2:
Implementation of e2e Classes of Service in Underlying Technologies / 6.4.3:
EuQoS Enhanced Transport Protocol / 6.5:
Enhanced Transport Protocol Services for EuQoS / 6.5.1:
Services for Streaming/Nonstreaming Applications / 6.5.3:
Multicast / 6.6:
Application Layer Multicast / 6.6.1:
Application Layer Multicast in the EuQoS System / 6.6.2:
Multicast Middleware / 6.6.3:
Introducing QoS to Multicast Middleware / 6.6.4:
Telemedicine Application / 6.7:
Telemedicine-the Case for Application-Driven QoS / 6.7.1:
Overview of Medigraf / 6.7.2:
Medigraf Adaptation to EuQoS / 6.7.3:
Summary and Outlook / 6.8:
Implementing Protocols on Network Simulators / Jana KrahenbuhlAppendix A:
Main Simulation Terms and Concepts / A.1:
Simulation Process / A.1.1:
Simulation Types / A.1.2:
Network Simulation / A.2:
Parallel/Distributed versus Serial Execution of Simulations / A.2.1:
Packet-Level, Fluid-Based and Hybrid Model Simulation / A.2.2:
Simulation Speedup / A.2.3:
Network Simulation in Research / A.2.4:
Simulation for Education Purposes / A.2.5:
Network Simulators / A.3:
GloMoSim and Qualnet / A.3.1:
JiST/SWANS / A.3.2:
Scalable Simulation Framework (SSF) and SSFNet / A.3.3:
OMNeT++ and OMNEST / A.3.4:
The Network Simulator ns-2 / A.4:
The Language Concept / A.4.1:
Hierarchical Structure / A.4.2:
First Steps-Simulation Script Template / A.4.3:
Nodes, Links and Traffic / A.4.4:
Wireless Networks / A.4.5:
Implementing Protocols with ns-2 / A.4.6:
Advice for Running ns-2 Simulations / A.4.7:
Analysing Methods / A.4.8:
Network Emulation Focusing on QoS-Oriented Satellite Communication / Laurent Dairaine ; Herve ThalmensyAppendix B:
Network Emulation Basics / B.1:
Introduction to Network Emulation / B.1.1:
What is Network Emulation? / B.1.2:
Why Use Network Emulation? / B.1.3:
Requirements for Emulation Systems / B.1.4:
Network Emulation System Approaches / B.1.5:
Case Study: Emulation of QoS-oriented Satellite Communication / B.2:
DVB Satellite Communications / B.2.1:
QoS Support for Satellite Network Systems / B.2.3:
Emulation of a DVB-S, DVB-RCS Satellite System / B.2.4:
References / B.3:
Index
Preface
Acknowledgements
Acronyms
9.

電子ブック

EB
CoreGRID Symposium, Thierry Priol, Marco Vanneschi
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
10.

電子ブック

EB
Simone Fischer-H?bner, Penny Duquenoy, Leonardo Martucci, Albin Zuccato
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼