Fermilab Fermilab Core Computing Division

Library Home |  Ask a Librarian library@fnal.gov |  Book Catalog |  Library Journals |  Requests |  SPIRES |  Fermilab Documents |

Fermilab Library
SPIRES-BOOKS: FIND KEYWORD SYSTEMS AND DATA SECURITY *END*INIT* use /tmp/qspiwww.webspi1/4264.4 QRY 131.225.70.96 . find keyword systems and data security ( in books using www Cover
Image
Call number:9783319510347:ONLINE Show nearby items on shelf
Title:Network Games, Control, and Optimization Proceedings of NETGCOOP 2016, Avignon, France
Author(s):
Date:2017
Size:1 online resource (XIV, 234 p. 49 illus., 38 illus. in color p.)
Contents:Altman, E., Jain, A., Hayel, Y., Finite Improvement Property in a Stochastic Game Arising in Competition over Popularity in Social Networks -- Altman, E., Jain, A., Shimkin, N., Touati, C., Overview on Dynamic Games for Analyzing
Competition in the Internet and in Online Social Networks -- Altman, E., Touati, C., Load Balancing Congestion Games and their Asymptotic Behavior -- Bachmann, I., Morales, F., Silva, A., Bustos-Jimenez, J., Go-Index: Applying Supply
Networks Principles as Internet Robustness Metrics -- Belhadj Amor, S., Perlaza, S., Decentralized K-User Gaussian Multiple Access Channels -- Berri, S., Varma, V., Lasaulce, S., Radjef, M., Correlated Equilibria in Wireless Power
Control Games -- Chorppath, A., Zappone, A., Jorswieck, E., Alpcan, T., An Energy-Efficiency Game in Relay-Assisted D2D Networks with Malicious Devices -- Courcoubetis, C., Dimakis, A., Kanakakis, M., Minimally Intrusive Server
Policies for Background Data Transfers -- De Pellegrini, F., Massaro, A., Goratti, L., Rachid, E., Bounded Generalized Kelly Mechanism for Multi-Tenant Caching in Mobile Edge Clouds -- Douros, V., Toumpis, S., Polyzos, G., Power
Control and Bargaining for Cellular Operator Revenue Increase under Licensed Spectrum Sharing -- Grammatico, S., An Incentive Mechanism for Agents Playing Competitive Aggregative Games -- Hamidouche, K., Saad, W., Debbah, M.,
Multi-Games for LTE and WiFi Coexistence over Unlicensed Channels -- Hasan, C., Marina, M., Energy-Efficient User Association in Broadcast Transmission -- Ju, M., Zhou, F., Xiao, S., Torres-Moreno, J., Spectrum Shared p-Cycle Design in
Elastic Optical Networks with/without Spectrum Conversion Capabilities -- Chaitanya, A., Mukherji, U., Sharma, V., Learning Equilibria of a Stochastic Game on Gaussian Interference Channels with Incomplete Information -- Legenvre, F.,
Altman, E., Hayal, Y., Potential Game Approach to Virus Attack in Network General Topology -- Marcastel, A., Belmega, E., Mertikopoulos, P., Fijalkow, I., Interfernce Mitigation via Pricing in Time-Varying Cognitive Radio Systems --
Silva, A., Opinion Manipulation in Social Networks -- Taynitskiy, V., Gubar, E., Zhu, Q., Optimal Security Policy for Protection against Heterogeneous Malware -- Wu, H., Zhou, F., Zhu, Z., Chen, Y., An Experimental Comparison of
Routing and Spectrum Assignment Algorithms in Elastic Optical Networks -- Zhang, C., Varma, V., Lasaulce, S., Robust Power Modulation for Channel State Information Exchange
ISBN:9783319510347
Series:eBooks
Series:Springer eBooks
Series:Springer 2017 package
Keywords: Mathematics , Computer science , Game theory , System theory , Computer mathematics , Applied mathematics , Engineering mathematics , Mathematics , Game Theory, Economics, Social and Behav. Sciences , Systems Theory, Control , Mathematical Applications in Computer Science , Math Applications in Computer Science , Appl.Mathematics/Computational Methods of Engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2016-9783319279145:ONLINE Show nearby items on shelf
Title:Exploring the Security Landscape: Non-Traditional Security Challenges
Author(s):
Date:2016
Edition:1st ed. 2016
Size:1 online resource (16 p.)
Note:10.1007/978-3-319-27914-5
Contents:Non-traditional Transnational Security Challenges in Serbian, British and Dutch Security Discourses: A Cross Country Comparison -- National Security in a Hyper-Connected World -- Is Maritime Security a Traditional Security Challenge
-- Pandemic Influenza Planning for the Mental Health Security of Survivors of Mass Deaths -- An evaluation of the Police Response to Gang-related Violence and Future Security Threat -- The Demographic horizon of the emerging security
environment -- Economic Security: An emerging security issue -- Critical Infrastructure vulnerabilities: embracing a network mindset.-Supply Chain Information Security: emerging challenges in the telecommunications industry.-Disrupting
terrorist and criminal networks: Crime script analysis through DODAF applications -- Beyond the Castle Model of Cyber-risk and cyber-security -- Food Security as Critical Infrastructure: the importance of safeguarding the food supply
for civil security -- The role of Social Network Sites in security risks and crises: The information warfare of terrorism -- Manufactured Risk, complexity and non-traditional security: from world risk society to a networked risk model
ISBN:9783319279145
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Physics , Energy policy , Energy and state , Natural disasters , Health promotion , Computer security , System safety , Physics , Security Science and Technology , Complex Networks , Health Promotion and Disease Prevention , Energy Policy, Economics and Management , Systems and Data Security , Natural Hazards
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2014-9783319047201:ONLINE Show nearby items on shelf
Title:Applications of Mathematics and Informatics in Science and Engineering [electronic resource]
Author(s): Nicholas J Daras
Date:2014
Publisher:Cham : Springer International Publishing : Imprint: Springer
Size:1 online resource
Note:Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference heldin April 2013 at the He llenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineeringsciences. It is also presents the theoretical backgr ound required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted. This bookwill appeal to operations research analysts, engineers, community decision m akers, academics, the military community, practitioners sharing the current state-of-the-art, and analysts from coalition partners. Topics coveredinclude Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis
Contents:Parametric Design and Optimization of Multi
Rotor Aerial Vehicles (C. Ampatis, E. Papadopoulos)
Scattering Relations for a Multi
Layered Chiral Scatterer in an Achiral Environment (C. Athanasiadis, E. Athanasiadou, S. Dimitroula, E. Kikeri)
Almost Periodic Solutions of NavierStokesOhm Type Equations in Megneto
Hydrodynamics (E.S. Athanasiadou, V.F. Dionysatos, P.N. Koumantos, P.K. Pavlakos)
Admission Control Policies in a Finite Capacity Geo/Geo/1 Queue under Partial State Observations (A. Burnetas, Ch. Kokaliaris)
Error Bounds for Trapezoid Type Quadrature Rules with Applica
ISBN:9783319047201
Series:eBooks
Series:SpringerLink
Series:Springer Optimization and Its Applications, 1931-6828 : v91
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Number theory , Mathematical optimization , Distribution (Probability theory)
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2014-9783319041476:ONLINE Show nearby items on shelf
Title:Networks and Network Analysis for Defence and Security [electronic resource]
Author(s): Anthony J Masys
Date:2014
Publisher:Cham : Springer International Publishing : Imprint: Springer
Size:1 online resource
Note:Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications ofnetwork analysis to supp ort defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and securityimplications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructuresnot only stem from man-made acts but also from natural hazards. Katr ina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the cripplingeffect they have on the social and economic well-being of a community and a nation. With th is dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent ofbig data and increasing processing power, network analysis can reveal insights with regards to structural and dyna mic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies,vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence pro fessionals and researchers with regards to leading methodologies and approaches
Contents:Network Analysis in Criminal Intelligence
Identifying mafia Bosses from Meeting Attendance
Macrosocial Network Analysis: the Case of Transnational Drug Trafficking
Policing the Hackers by Hacking them: Studying Online Deviants in IRC Chat Rooms
Why Terror Networks are Dissimilar: How Structure Relates to Functions
Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement
The Networked Mind
Collective Identities and the Cognitive
Affective Nature of Conflict
Conflict Cessation and the Emergence of Weapons Supermarkets
A Conspirac
ISBN:9783319041476
Series:eBooks
Series:SpringerLink
Series:Lecture Notes in Social Networks, 2190-5428
Series:Physics and Astronomy (Springer-11651)
Keywords: Social sciences Data processing , Mathematics , Criminology
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2011-9789400716797:ONLINE Show nearby items on shelf
Title:Energy-Aware System Design [electronic resource] : Algorithms and Architectures
Author(s): Chong-Min Kyung
Sungjoo Yoo
Date:2011
Publisher:Dordrecht : Springer Netherlands
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Power consumption becomes the most important design goal in a wide range of electronic systems. There are two driving forces towards this trend: continuing device scaling and ever increasing demand of higher computing power.First, device scaling cont inues to satisfy Moores law via a conventional way of scaling (More Moore) and a new way of exploiting the vertical integration (More than Moore). Second, mobile and IT convergence requires more computingpower on the silicon chip than ever. Cell phones ar e now evolving towards mobile PC. PCs and data centers are becoming commodities in house and a must in industry. Both supply enabled by device scaling and demand triggered by theconvergence trend realize more computation on chip (via multi-core, integrati on of diverse functionalities on mobile SoCs, etc.) and finally more power consumption incurring power-related issues and constraints. Energy-Aware SystemDesign: Algorithms and Architectures provides state-of-the-art ideas for low power design methods fro m circuit, architecture to software level andoffers design case studies in three fast growing areas of mobile storage, biomedicaland security. Important topics and features: - Describes very recent advanced issues and methods for energy-aware design at ea ch design level from circuit andarchitecture toalgorithm level, and also covering important blocksincluding low power main memory subsystem and on-chip network at architecture level - Explains efficient power conversion and delivery which is becoming impo rtant as heterogeneous power sources are adopted for digital and non-digitalparts - Investigates 3D die stacking emphasizing temperature awareness for better perspective on energy efficiency - Presents three practical energy-aware design case studies nove l storage device (e.g., solid state disk), biomedicalelectronics (e.g., cochlear and retina implants), and wireless surveillance camera systems. Researchers and engineers in the field of h
Note:Springer eBooks
Contents:Foreword
1. Introduction
2.Low
Power Circuits: fromSystem
Level Perspective
3.Energy
awareness in Processor/Multi
processors Design
4.Energy
awareness in Contemporary Memory Systems
5.Energy
awareness On
Chip Networks
6. Energy
awareness in Video Codec Design
7.Energy Generation and Conversion for Portable Electronic Systems
8.3D IC for Low Power/Energy
9. Low Power Mobile Storage: SSD Case Study
10.Energy
aware Surveillance Camera
11. IC Design in Biomedical Implantable Electronics
ISBN:9789400716797
Series:e-books
Series:SpringerLink (Online service)
Series:Physics and Astronomy (Springer-11651)
Keywords: Electronic data processing , Systems engineering , Electric engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2010-9783642048319:ONLINE Show nearby items on shelf
Title:Applied Quantum Cryptography [electronic resource]
Author(s): Christian Kollmitzer
Mario Pivk
Date:2010
Publisher:Berlin, Heidelberg : Springer Berlin Heidelberg
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel technology. Only a few years ago quantum cryptography or better:quantum key distribution was the domain of basic research laboratories at universities. But during the last few years things changed. QKD left the laboratories and was picked up by more practical oriented teams that worked hard todevelop a practically applicable technology out of th e astonishing results of basic research. One major milestone towards a QKD technology was a large research and development project funded by the European Commission that aimed atcombining quantum physics with complementary technologies that are necessary to create a technical solution: electronics, software, and network components were added within the project SECOQC (Development of a Global Network for SecureCommunication based on Quantum Cryptography) that teamed up all expertise on European level to ge t a technology for future encryption. The practical application of QKD in a standard optical fibre network was demonstrated October 2008in Vienna, giving a glimpse of the future of secure communication. Although many steps have still to be done in order t o achieve a real mature technology, the corner stone for future secure communication is already laid. QKD will notbe the Holy Grail of security, it will not be able to solve all problems for evermore. But QKD has the potential to replace one of the weakes t parts of symmetric encryption: the exchange of the key. It can be proven that the keyexchange process cannot be corrupted and that keys that are generated and exchanged quantum cryptographically will be secure for ever (as long as some additional condit ions are kept). This book will show the state of the art of QuantumCryptography and it will sketch how it can be implemented in standard communication infrastructure. The growing vulnerability of
Note:Springer eBooks
Contents:Introduction
Preliminaries
Quantum Key Distribution
Real
life QKD Systems
Attack Strategies on QKD Protocols
Access to QKD Networks with PDAs
Security Requirements for Future Medical Information Systems
Adaptive Cascade
Statistical Analysis of QKD Networks in Real
life Environment
QKD Networks Based on Q3P
Ring of Trust
ISBN:9783642048319
Series:e-books
Series:SpringerLink (Online service)
Series:Lecture Notes in Physics, 0075-8450 : v797
Series:Physics and Astronomy (Springer-11651)
Keywords: Quantum theory , Engineering mathematics
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2010-9781441964663:ONLINE Show nearby items on shelf
Title:Handbook of Modern Sensors [electronic resource] : Physics, Designs, and Applications
Author(s): Jacob Fraden
Date:2010
Edition:4th
Publisher:New York, NY : Springer New York : Imprint: Springer
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:This book is about devices commonly called sensors. Digital systems, however complex and intelligent they might be, must receive information from the outside world that is generally analog and not electrical. Sensors areinterface devices between vari ous physical values and the electronic circuits who understand only a language of moving electrical charges. In other words, sensors are the eyes, ears, and noses of silicon chips. Unlike other bookson sensors, this book is organized according to the meas ured variables (temperature, pressure, position, etc.) that make it much more practical and easier to read. In this new edition recent ideas and developments have been added whileless important and non-essential designs were dropped. Sections on practical designs and use of the modern micro-machining technologies have been revised substantially. This book is a reference text that can be used by students,researchers interested in modern instrumentation (applied physicists and engineers), sensor designers, application engineers and technicians whose job it is to understand, select and/or design sensors for practical systems. The scopeof this book is rather broad covering many different designs. Some are well known, but describing them is still useful for st udents and those who look for a convenient reference. It is the authors intention to present acomprehensive and up-to-date account of the theory (physical principles), design, and practical implementations of various sensors for scientific, industrial, an d consumer applications. About the Author: Jacob Fraden holds a Ph. D. inmedical electronics and is the CEO of Advanced Monitors Corp., a company that produces medical and veterinary temperature sensors and monitors. He holds over 30 patents in the areas of sensing, medical instrumentation, consumerelectronics, security, and others
Note:Springer eBooks
Contents:Preface
Data Acquisition
Sensor Characteristics
Physical Principles of Sensing
Optical Components of Sensors
Interface Electronic Circuits
Occupancy and Motion Detectors
Position, Displacement, and Level
Velocity and Acceleration
Force, Strain and Tactile Sensors
Pressure Sensors
Flow Sensors
Acoustic Sensors
Humidity and Moisture Sensors
Light Detectors
Radiation Detectors
Temperature Sensors
Chemical Sensors
Sensor Materials and Technologies
Appendix
Index
ISBN:9781441964663
Series:e-books
Series:SpringerLink (Online service)
Series:Physics and Astronomy (Springer-11651)
Keywords: Analytical biochemistry , Electronics
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2010-9781441916365:ONLINE Show nearby items on shelf
Title:Complex Intelligent Systems and Their Applications [electronic resource]
Author(s): Fatos Xhafa
Leonard Barolli
Petraq J Papajorgji
Date:2010
Publisher:New York, NY : Springer New York
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Complex Intelligent Systems and Their Applications presents the most up-to-date advances in complex, software intensive and intelligent systems. Each self-contained chapter is the contribution of distinguished experts inareas of research relevant to the study of complex, intelligent and software intensive systems. These contributions focus on the resolution of complex problems from areas of networking, optimization and artificial intelligence. Thisbook is divided into three parts focusing on complex intelligent network systems, efficient resource management in complex systems, and artificial data mining systems. Through the presentation of these diverse areas of application, thevolume provides insights into the multidisciplinary nature of complex pro blems. Throughout the entire book, special emphasis is placed on optimization and efficiency in resource management, network interaction, and intelligent systemdesign. Key Features of Complex Intelligent Systems and Their Applications include: - Considers the multi-disciplinary nature of complex problems in intelligent systems and a range of state-of-the-art techniques used to resolvethese problems. - Graduate students as well as researchers will find this a useful guide to the most up-to-date techniques available to resolve complex problems in networking, optimization, and artificial intelligence. - Real lifeexamples presented throughout the book extend the texts suitability to practitioners. This book presents the most recent interdisciplinary results i n this area of research and can serve as a valuable tool for researchers interestedin defining and resolving the types of complex problems that arise in networking, optimization, and artificial intelligence
Note:Springer eBooks
Contents:Efficient Integration of Complex Information Systems in the ATM Domain with Explicit Expert Knowledge Models
An Ontology
Based Approach for Supporting Business
IT Alignment
EPCIS
Based Supply Chain Event Management
Cost
Benefit Analysis to Hedge with Third
Party Producers in Demand
Driven Production
A Security Assurance Model to Holistically Assess the Information Security Posture
Risk
Aware Business Process ManagementEstablishing the Link Between Business and Security
Self
Optimised Tree Overlays Using Proximity
Driven Self
Organised Agents
Filtering Order Adaptation B
ISBN:9781441916365
Series:e-books
Series:SpringerLink (Online service)
Series:Springer Optimization and Its Applications, 1931-6828 : v41
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Computer network architectures , Computer system performance , Computer science , Artificial intelligence , Operations research
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2009-9783540770749:ONLINE Show nearby items on shelf
Title:Traffic and Granular Flow 07 [electronic resource]
Author(s): Ccile Appert-Rolland
Franois Chevoir
Philippe Gondret
Sylvain Lassarre
Jean-Patrick Lebacque
Michael Schreckenberg
Date:2009
Publisher:Berlin, Heidelberg : Springer Berlin Heidelberg
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:This book covers several research fields, all of which deal with transport. Three main topics are treated: road traffic, granular matter, and biological transport. Different points of view, i.e. modelling, simulations,experiments, and phenomenologica l observations, are considered. Sub-topics include: highway or urban vehicular traffic (dynamics of traffic, macro/micro modelling, measurements, data analysis, security issues, psychological issues),pedestrian traffic, animal traffic (e.g. social insects ), collective motion in biological systems (molecular motors...), granular flow (dense flows, intermittent flows, solid/liquid transition, jamming, force networks, fluid and solidfriction), networks (biological networks, urban traffic, the internet, vulne rability of networks, optimal transport networks) and cellular automata applied to the various aforementioned fields
Note:Springer eBooks
ISBN:9783540770749
Series:e-books
Series:SpringerLink (Online service)
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Mathematical physics , Engineering mathematics , Engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2006-9781402040580:ONLINE Show nearby items on shelf
Title:Biosensing [electronic resource]
Author(s): Jerome Schultz
Milan Mrksich
Sangeeta N Bhatia
David J Brady
Antonio J Ricco
David R Walt
Charles L Wilkins
Date:2006
Publisher:Dordrecht : Springer Netherlands
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:The goal of this book is to disseminate information on the worldwide status and trends in biosensing R&D to government decisionmakers and the research community. The contributors critically analyze and compare biosensing researchin the United States with that being pursued in Japan, Europe and other major industrialized countries. Biosensing includes systems that incorporate a variety of means, including electrical, electronic, and photonic devices biologicalmaterials (e.g., tissue, enzymes, nucleic acids, etc.) and chemical analysis to produce detectable signals for the monitoring or identification of biological phenomena. In a broader sense, the study of biosensing includes any approachto detection of biological elements and the associated software or computer identification technologies (e.g., imaging) that identify biological characteristics. Biosensing is finding a growing number of applications in a wide varietyof areas, including biomedicine, food production and processing, and detection of ba cteria, viruses, and biological toxins for biowarfare defense. Subtopics likely to be covered in this study include the following: Nucleic acid sensorsand DNA chips and arrays, organism- and cell-based biosensors, bioelectronics and biometrics, biointerfa ces and biomaterials biocompatibility and biofouling, integrated, multi-modality sensors and sensor networks, system issues,including signal transduction, data interpretation, and validation, novel sensing algorithms, e.g., non-enzyme-based sensors for gl ucose, mechanical sensors for prosthetics, related issues in bio-MEMS and NEMS (microelectromechanicaland nanoelectromechanical systems), possibly including actuators, applications in biomedicine, the environment, food industry, security and defense. Part icular emphasis will be on technologies that may lead to portable or fieldabledevices/instruments. Important consideration will be given to an integrated approach to detection, storage, analysis, val
Note:Springer eBooks
Contents:Executive summary
Infrastructure overview
Optical biosensing
Electro
based sensors and surface engineering
Cell and tissue
based sensors
Mass spectrometry and biosensing research
Microfabricated biosensing devices: MEMS, microfluidics, mass sensors
Information systems for biosensing
Appendices
ISBN:9781402040580
Series:e-books
Series:SpringerLink (Online service)
Series:Physics and Astronomy (Springer-11651)
Keywords: Animal Physiology , Neurobiology
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2006-9780387352091:ONLINE Show nearby items on shelf
Title:Statistical Methods in Counterterrorism [electronic resource] : Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
Author(s): Alyson G Wilson
Gregory D Wilson
David H Olwell
Date:2006
Publisher:New York, NY : Springer New York
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:All the data was out there to warn us of this impending attack, why didn't we see it? This was a frequently asked question in the weeks and months after the terrorist attacks on the World Trade Center and the Pentagon onSeptember 11, 2001. In the wak e of the attacks, statisticians moved quickly to become part of the national response to the global war on terror. This book is an overview of the emerging research program at the intersection of nationalsecurity and statistical sciences. A wide range of talented researchers address issues in . Syndromic Surveillance---How do we detect and recognize bioterrorist events? . Modeling and Simulation---How do we better understand andexplain complex processes so that decision makers can take the best course of action? . Biometric Authentication---How do we pick the terrorist out of the crowd of faces or better match the passport to the traveler? . Game Theory---Howdo we understand the rules that terrorists are playing by? This book includes technical treatments of statistical issues that will be of use to quantitative researchers as well as more general examinations of quantitative approaches tocounterterrorism that will be accessible to decision makers with stronger policy backgrounds. Dr. Alyson G. Wilson is a statistician and the technical lead for DoD programs in the Statistical Sciences Group at Los Alamos NationalLaboratory. Dr. Gregory D. Wilson is a rhetorician and ethnographer in the Statistical Sciences Group at Los Alamos National Laboratory. Dr. Dav id H. Olwell is chair of the Department of Systems Engineering at the Naval PostgraduateSchool in Monterey, California
Note:Springer eBooks
Contents:Game Theory
Game Theory in an Age of Terrorism: How Can Statisticians Contribute?
Combining Game Theory and Risk Analysis in Counterterrorism: A Smallpox Example
Game
Theoretic and Reliability Methods in Counterterrorism and Security
Biometric Authentication
Biometric Authentication
Towards Statistically Rigorous Biometric Authentication Using Facial Images
Recognition Problem of Biometrics: Nonparametric Dependence Measures and Aggregated Algorithms
Syndromic Surveillance
Data Analysis Research Issues and Emerging Public Health Biosurveillance Directions
Current
ISBN:9780387352091
Series:e-books
Series:SpringerLink (Online service)
Series:Mathematics and Statistics (Springer-11649)
Keywords: Statistics , Optical pattern recognition , Mathematics , Operations research , Mathematical statistics , Economics, Mathematical
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2006-9780387280011:ONLINE Show nearby items on shelf
Title:Optical Imaging Sensors and Systems for Homeland Security Applications [electronic resource]
Author(s): Bahram Javidi
Date:2006
Publisher:New York, NY : Springer New York
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems for Homeland Security Applications presents original and significant technical contributions fromleaders of industry, gover nment, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters haverecent and technically significant results, ample il lustrations, figures, and key references. This book is intended for engineers and scientists in the relevant fields, graduate students, industry managers, university professors,government managers, and policy makers. Advanced Sciences and Technologies for Security Applications focuses on research monographs in the areas of -Recognition and identification (including optical imaging, biometrics, authentication,verification, and smart surveillance systems) -Biological and chemical threat detection (including biosensors, aerosols, materials detection and forensics), and -Secure information systems (including encryption, and optical andphotonic systems). The series is intended to give an overview at the highest research level of the frontier of research in the physical sciences
Note:Springer eBooks
Contents:Three
Dimensional Object Reconstruction and Recognition Techniques Based on Digital Holography
Compression of Encrypted Digital Holograms using Artificial Neural Networks
Digital Hoplography: Recent Advancements and Prospective Improvements for Applications in Microscopy
Hybrid Optical Encryption of a 3D Object by Use of a Digital Holographic Technique
3D Object Recognition using Gabor Feature Extraction and PCA
FLD Projections of Holographically Sensed Data
Distortion
tolerant 3D Volume Recognition Using X
ray Imaging
Three
dimensional Imaging and Recognition of Bacteria usi
ISBN:9780387280011
Series:e-books
Series:SpringerLink (Online service)
Series:Advanced Sciences and Technologies for Security Applications, 1613-5113 : v2
Series:Physics and Astronomy (Springer-11651)
Keywords: Laser physics , Physical optics , Microwaves
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2004-9783034878654:ONLINE Show nearby items on shelf
Title:Coding, Cryptography and Combinatorics
Author(s):
Date:2004
Size:1 online resource (405 p.)
Note:10.1007/978-3-0348-7865-4
Contents:On the Secondary Constructions of Resilient and Bent Functions -- Adaptive Recursive MLD Algorithm Based on Parallel Concatenation Decomposition for Binary Linear Codes -- Modularity of Asymptotically Optimal Towers of Function Fields
-- A New Correlation Attack on LFSR Sequences with High Error Tolerance -- LDPC Codes: An Introduction -- The New Implementation Schemes of the TTM Cryptosystem Are Not Secure -- The Capacity Region of Broadcast Networks with Two
Receivers -- Constructions of Nonbinary Codes Correcting t- Symmetric Errors and Detecting All Unidirectional Errors: Magnitude Error Criterion -- On the Propagation Criterion of Boolean Functions -- On Certain Equations over Finite
Fields and Cross-Correlations of m-Sequences -- A Polly Cracker System Based on Satisfiability -- Combinatorially Designed LDPC Codes Using Zech Logarithms and Congruential Sequences -- New Constructions of Constant-Weight Codes --
Good Self-Dual Quasi-Cyclic Codes over Fq, q Odd -- Linear Complexity and k-Error Linear Complexity for pn-Periodic Sequences -- HFE and BDDs: A Practical Attempt at Cryptanalysis -- Digital Nets and Coding Theory -- Constructive
Asymptotic Codes with an Improvement on the Tsfasman-Vlá,dut-Zink and Xing Bounds -- Malleability Attacks on Multi-Party Key Agreement Protocols -- Combinatorial Tableaux in Isoperimetry -- On the Error Exponents of
Reliability-Order-Based Decoding Algorithms for Linear Block Codes -- A Construction of Authentication Codes with Secrecy -- Selection Method of Test Patterns in Soft-Input and Output Iterative Bounded Distance Decoding Algorithm --
Deletion Correcting Using Generalised Reed-Solomon Codes -- A Note on the Linear Complexity Profile of the Discrete Logarithm in Finite Fields -- Speeding Up RSA and Elliptic Curve Systems by Choosing Suitable Moduli -- Security
Analysis of Three Oblivious Transfer Protocols -- An Improved Identification Scheme
ISBN:9783034878654
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:Progress in Computer Science and Applied Logic : 23
Keywords: Computer science , Data structures (Computer science) , Coding theory , Combinatorics , Computer Science , Coding and Information Theory , Data Structures, Cryptology and Information Theory , Combinatorics
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2003-9780387217123:ONLINE Show nearby items on shelf
Title:Beyond Fear Thinking Sensibly About Security in an Uncertain World
Author(s): Bruce Schneier
Date:2003
Size:1 online resource (296 p.)
Note:10.1007/b97547
Contents:Sensible Security -- All Security Involves Trade-offs -- Security Trade-offs Are Subjective -- Security Trade-offs Depend on Power and Agenda -- How Security Works -- Systems and How They Fail -- Knowing the Attackers -- Attackers
Never Change Their Tunes, Just Their Instruments -- Technology Creates Security Imbalances -- Security Is a Weakest-Link Problem -- Brittleness Makes for Bad Security -- Security Revolves Around People -- Detection Works Where
Prevention Fails -- Detection Is Useless Without Response -- Identification, Authentication, and Authorization -- All Countermeasures Have Some Value, But No Countermeasure Is Perfect -- Fighting Terrorism -- The Game of Security --
Negotiating for Security -- Security Demystified
ISBN:9780387217123
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Physics , Data encryption (Computer science) , Coding theory , System safety , Popular works , Medicine , Health , Social work , Physics , Security Science and Technology , Social Work , Popular Science in Medicine and Health , Popular Science, general , Data Encryption , Coding and Information Theory
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2001-9781468404968:ONLINE Show nearby items on shelf
Title:Introduction to Cryptography
Author(s): Johannes A Buchmann
Date:2001
Size:1 online resource (7 p.)
Note:10.1007/978-1-4684-0496-8
Contents:1 Integers -- 1.1 Basics -- 1.2 Divisibility -- 1.3 Representation of Integers -- 1.4 O- and ?-Notation -- 1.5 Cost of Addition, Multiplication, and Division with Remainder -- 1.6 Polynomial Time -- 1.7 Greatest Common Divisor -- 1.8
Euclidean Algorithm -- 1.9 Extended Euclidean Algorithm -- 1.10 Analysis of the Extended Euclidean Algorithm -- 1.11 Factoring into Primes -- 1.12 Exercises -- 2 Congruences and Residue Class Rings -- 2.1 Congruences -- 2.2 Semigroups
-- 2.3 Groups -- 2.4 Residue Class Rings -- 2.5 Fields -- 2.6 Division in the Residue Class Ring -- 2.7 Analysis of Operations in the Residue Class Ring -- 2.8 Multiplicative Group of Residues -- 2.9 Order of Group Elements -- 2.10
Subgroups -- 2.11 Fermat’s Little Theorem -- 2.12 Fast Exponentiation -- 2.13 Fast Evaluation of Power Products -- 2.14 Computation of Element Orders -- 2.15 The Chinese Remainder Theorem -- 2.16 Decomposition of the Residue Class Ring
-- 2.17 A Formula for the Euler ?-Function -- 2.18 Polynomials -- 2.19 Polynomials over Fields -- 2.20 Structure of the Unit Group of Finite Fields -- 2.21 Structure of the Multiplicative Group of Residues mod a Prime Number -- 2.22
Exercises -- 3 Encryption -- 3.1 Encryption Schemes -- 3.2 Symmetric and Asymmetric Cryptosystems -- 3.3 Cryptanalysis -- 3.4 Alphabets and Words -- 3.5 Permutations -- 3.6 Block Ciphers -- 3.7 Multiple Encryption -- 3.8 Use of Block
Ciphers -- 3.9 Stream Ciphers -- 3.10 Affine Cipher -- 3.11 Matrices and Linear Maps -- 3.12 Affine Linear Block Ciphers -- 3.13 Vigenère, Hill, and Permutation Ciphers -- 3.14 Cryptanalysis of Affine Linear Block Ciphers -- 3.15
Exercises -- 4 Probability and Perfect Secrecy -- 4.1 Probability -- 4.2 Conditional Probability -- 4.3 Birthday Paradox -- 4.4 Perfect Secrecy -- 4.5 Vernam One-Time Pad -- 4.6 Random Numbers -- 4.7 Pseudorandom Numbers -- 4.8
Exercises -- 5 DES -- 5.1 Feistel Ciphers -- 5.2 DES Algorithm -- 5.3 An Example -- 5.4 Security of DES -- 5.5 Exercises -- 6 Prime Number Generation -- 6.1 Trial Division -- 6.2 Fermat Test -- 6.3 Carmichael Numbers -- 6.4
Miller-Rabin Test -- 6.5 Random Primes -- 6.6 Exercises -- 7 Public-Key Encryption -- 7.1 Idea -- 7.2 RSA Cryptosystem -- 7.3 Rabin Encryption -- 7.4 Diffie-Hellman Key Exchange -- 7.5 ElGamal Encryption -- 7.6 Exercises -- 8 Factoring
-- 8.1 Trial Division -- 8.2 p — 1 Method -- 8.3 Quadratic Sieve -- 8.4 Analysis of the Quadratic Sieve -- 8.5 Efficiency of Other Factoring Algorithms -- 8.6 Exercises -- 9 Discrete Logarithms -- 9.1 DL Problem -- 9.2 Enumeration --
9.3 Shanks Baby-Step Giant-Step Algorithm -- 9.4 Pollard ?-Algorithm -- 9.5 Pohlig-Hellman Algorithm -- 9.6 Index Calculus -- 9.7 Other Algorithms -- 9.8 Generalization of the Index Calculus Algorithm -- 9.9 Exercises -- 10
Cryptographic Hash Functions -- 10.1 Hash Functions and Compression Functions -- 10.2 Birthday Attack -- 10.3 Compression Functions from Encryption Functions -- 10.4 Hash Functions from Compression Functions -- 10.5 Efficient Hash
Functions -- 10.6 An Arithmetic Compression Function -- 10.7 Message Authentication Codes -- 10.8 Exercises -- 11 Digital Signatures -- 11.1 Idea -- 11.2 RSA Signatures -- 11.3 Signatures from Public-Key Systems -- 11.4 ElGamal
Signature -- 11.5 Digital Signature Algorithm (DSA) -- 11.6 Exercises -- 12 Other Groups -- 12.1 Finite Fields -- 12.2 Elliptic Curves -- 12.3 Quadratic Forms -- 12.4 Exercises -- 13 Identification -- 13.1 Passwords -- 13.2 One-Time
Passwords -- 13.3 Challenge-Response Identification -- 13.4 Exercises -- 14 Public-Key Infrastructures -- 14.1 Personal Security Environments -- 14.2 Certification Authorities -- 14.3 Certificate Chains -- References -- Solutions to
the Exercises
ISBN:9781468404968
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Mathematics , Data structures (Computer science) , Number theory , Mathematics , Number Theory , Data Structures, Cryptology and Information Theory
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1996-9781461313199:ONLINE Show nearby items on shelf
Title:Fuzzy Databases Principles and Applications
Author(s): Frederick E Petry
Date:1996
Size:1 online resource (226 p.)
Note:10.1007/978-1-4613-1319-9
Contents:1 Database Fundamentals -- Database Principles -- Database Design -- Database Models -- Imprecision in Conventional Databases -- References -- 2 Relational Databases and Fuzzy Sets Background -- Relational Database Concepts -- Fuzzy
Set Theory -- References -- 3 Similarity-Based Models -- Basic Fuzzy Databases Approaches -- Similarity-Based Models -- Proximity-Based Models -- Distinguishability Data Model -- Querying Fuzzy Relational Databases -- Fuzzy Functional
Dependencies -- Information-Theoretic Measures -- Fuzzy Database Security -- References -- 4 Possibility-Based Models -- Weighted Tuples -- Possibility-Based Fuzzy Relational Databases -- Query Languages -- Related Database Issues --
Implementation Issues -- References -- 5 Alternative Database Models and Approaches -- Entity-Relationship Models -- Network Data Models -- Object-Oriented Models -- Rough Sets Approach -- Geographical Information Systems -- References
-- 6 Commerical and Industrial Applications -- Fuzzy Querying Front End Interfaces -- Special Purpose Systems -- Commerically Available Products -- Summary -- References
ISBN:9781461313199
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:International Series in Intelligent Technologies: 5
Keywords: Mathematics , Data structures (Computer science) , Artificial intelligence , Mathematical logic , Mathematics , Mathematical Logic and Foundations , Data Structures, Cryptology and Information Theory , Artificial Intelligence (incl. Robotics)
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1990-9781461233527:ONLINE Show nearby items on shelf
Title:Sequences Combinatorics, Compression, Security, and Transmission
Author(s):
Date:1990
Size:1 online resource (549 p.)
Note:10.1007/978-1-4612-3352-7
Contents:Combinatorial Algorithms -- Fast Parallel and Serial Multidimensional Approximate Array Matching -- Context-Dependent String Matching -- Constant-Space String-Matching -- Matching Patterns in Strings Subject to Multi-Linear
Transformations -- Efficient Algorithms with Applications to Molecular Biology -- A Survey of Approximation Algorithms for the Permanent -- On Optimal Parallel Computations for Sequences of Brackets -- Combinatorics -- Universal
Sequences and Graph Cover Times: A Short Survey -- Fibonacci Facts and Formulas -- On the Influence of Single Participant in Coin Flipping Schemes -- Zero-Error Capacities and Very Different Sequences -- Sequences of Lyndon Words -- A
Note on Addition Chains and Some Related Conjectures -- Some Applications of Probability Methods to Number Theory. Successes and Limitations -- On Pseudo-Random Arrays Constructed from Patterns with Distinct Differences --
Combinatorial Designs Derived from Costas Arrays -- Algorithms for Determining Relative Star-Height and Star-Height -- Eigenwords and Periodic Behaviors -- Infinite Words and a Problem in Semigroup Theory -- Some Combinatorial
Properties of Factorial Languages -- A Conjecture on Rational Sequences -- Sequences Defined by Iterated Morphisms -- Encoding the Vertices of a Graph with Binary Edge Labels -- Compression -- Applications of DAWGs to Data Compression
-- Coding and Complexity -- Compression of Pictures by Finite State Encoders -- Lossy On-Line Dynamic Data Compression -- A Comparison of Text Compression Algorithms -- Compression, Tests for Randomness and Estimating the Statistical
Model of an Individual Sequence -- Security -- Removing Interaction from Zero-Knowledge Proofs -- Protecting Against Abuses of Cryptosystems in Particular in the Context of Verification of Peace Treaties -- The Information Dispersal
Algorithm and Its Applications -- Three Types of Perfection in Shannon-Theoretic Cryptography -- Transmission -- Codes for Certain Sofic Systems -- Simple Combinatorial Decoding of the [23,12,7] Golay Code -- Flag Encodings Related to
the Zeckendorf Representation of Integers -- Immutable Codes -- Unison in Distributed Networks -- Sequence Transmission: Coding in the Frequency Domain -- On the Maximality of the Group Theoretic Single Error Correcting and All
Unidirectional Error Detecting (SEC-AUED) Codes -- Coding Sequences with Constraints -- Robust Error Control Sequences for Efficient Software Implementation -- Author Index
ISBN:9781461233527
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Mathematics , Coding theory , Computers , Numerical analysis , Mathematical models , Combinatorics , Applied mathematics , Engineering mathematics , Mathematics , Mathematical Modeling and Industrial Mathematics , Numerical Analysis , Theory of Computation , Coding and Information Theory , Combinatorics , Appl.Mathematics/Computational Methods of Engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1989-9789400924468:ONLINE Show nearby items on shelf
Title:Climate and Geo-Sciences A Challenge for Science and Society in the 21st Century
Author(s):
Date:1989
Size:1 online resource (724 p.)
Note:10.1007/978-94-009-2446-8
Contents:Section 1 — Climate Record / What can We Learn from Data ? -- Pre-Pleistocene climates : data and models -- Archaean atmosphere-biosphere interactions -- Dating proxy data -- The spectral characteristics of pre-Quaternary climatic
records, an example of the relationship between the astronomical theory and Geo-Sciences -- Polar ice cores and climate -- Intermediate and deep water characteristics during the last glacial maximum -- Oceanic response to orbital
forcing in the late Quaternary : observational and experimental strategies -- Recent developments in Quaternary paleoclimatology -- Paleoclimate data for studies of global climate change and earth system science -- Paleoclimate
perspectives on a greenhouse warming -- Section 2 — Understanding Climate and Climatic Changes -- Deceptively-simple models of climatic change -- Climate predictability : a dynamical view -- Coupled ocean and sea-ice models : review
and perspectives -- Atmospheric chemistry — climate interactions -- Ice and climate studies -- Volcanoes and climate -- Global climatic effects of a nuclear war: an interdisciplinary problem -- Land surface processes in climate models
: status and prospects -- Tropical deforestation and climatic change -- The role of the hydrological cycle in climate -- Changes in ocean temperature and the scientific strategy for international climate research -- Section 3 —
Simulation of the Greenhouse Warming -- Model projections of the climatic changes induced by increased atmospheric CO2 -- Climate sensitivity : model dependence of results -- Climate response to greenhouse warming : the role of the
ocean -- Unresolved issues and research needs pertaining to the transient climatic response to a CO2 increase -- Global biogeochemical cycles and climate -- Anthropogenic and natural perturbations of the carbon cycle -- Modelling
biospheric control of carbon fluxes between atmosphere, ocean and land in view of climatic change -- Section 4 — Technology for Climate Studies -- Supercomputing and massive parallelism -- Data management methods data for Europe --
Satellites and climate -- Radiation budget and clouds -- Section 5 — Climate Environment and International Security -- The global commons and national security -- The global environmental issues — an approach to their solution -- Human
impact on the environment -- Society and future climate change -- Global climatic changes and geopolitics: pressures on developed and developing countries -- Climate change in the context of multiple threats -- Climate and public
policy in the United States Congress -- Climatic changes and water resources development -- Hydrological impacts — What if we are right ? -- Climate change : effects on biological systems -- Forest productivity and health in a changing
atmospheric environment -- Climate environment in international security: the case of deforestation in the brazilian amazon -- Section 6 — Conference Overview and Recommendations -- Where is climate research going ? -- Authors Index --
Subjects Index
ISBN:9789400924468
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:NATO ASI Series, Series C: Mathematical and Physical Sciences: 285
Keywords: Earth sciences , Hydrogeology , Atmospheric sciences , Ecology , Environmental management , Earth Sciences , Atmospheric Sciences , Environmental Management , Hydrogeology , Ecology
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1986-9783642468902:ONLINE Show nearby items on shelf
Title:COMPSTAT Proceedings in Computational Statistics, 7th Symposium held in Rome 1986
Author(s):
Date:1986
Size:1 online resource (513 p.)
Note:10.1007/978-3-642-46890-2
Contents:1. Information Science and Statistics -- Information Science and Statistics -- Catastrophe Theory as a Tool for Statistical Analysis of Systems -- New Procedures for Generating Optimal Experimental Designs -- 2. Probabilistic Models
in Exploratory Data Analysis -- Some Guidelines for Principal Component Analysis -- Comparison of Least Squares with Least Absolute Deviation Forecasting Using Simulation Techniques -- Modeling the Reliability of Fault-Tolerant
Software Systems -- Computerized Exploratory Screening of Large-Dimensional Contingency Tables -- A Fast Algorithm for Some Exploratory Methods in Categorical Data Problems -- Easy to Generate Metrics for Use with Sampled Functions --
3. Computational Approach of Inference -- Sequential Inference Processes in Computational Aspects -- Variance Components as a Method for Routine Regression Analysis of Survey Data -- On the Assessment of Case Influence in Generalized
Linear Models -- 4. Numerical Aspects of Statistical Computations -- Algoritmic Development in Variable Selection Procedures -- Linear Models of Categorical Variables -- A Fast Algorithm for Curve Fitting -- Generalized Multiplicative
Models -- A Convenient Way of Computing ML-Estimates: Use of Automatic Differentiation -- On the Numerical Solutions of Bounded Influence Regression Problems -- Testing of Statistical Algorithms and Programs with the Help of the
Multivariate Sample, Having Described Values of Empirical Parameters -- 5. Three-Mode Data Matrices -- Analysis of Three-Way Data Matrices Based on Pairwise Relation Measures -- Factor Analysis of Evolution and Cluster Methods on
Trajectories -- 6. Cluster Analysis Methods and Algorithms -- Links Between Clustering and Assignment Procedures -- Identification of Linear Regression Models by a Clustering Algorithm -- Validity Tests in Cluster Analysis Using a
Probabilistic Teacher Algorithm -- New Kinds of Graphical Representation in Clustering -- Projection of an Acute Symmetrical Simplicial Closed Convex Cone and its Application to Star Graphs -- Design of a Command Language for
Interactive or Batch Use in a Statistical Package -- Cross Association Measures and Optimal Clustering -- 7. Robustness in Multivariate Analysis -- Multivariate Data Analysis, Contributions and Shortcomings of Robustness in Practice --
On the Use of Bootstrap and Jackknife in Covariance Structure Analysis -- On a Class of Robust Methods for Multivariate Data Analysis -- Robust Recursive Estimation and Detection of Shifts in Regression -- How Robust is One Way Anova
with Respect to within Group Correlation -- Algorithms for the Beta Distribution Function -- 8. Computer Graphics and Data Presentation -- An Interactive Graphic System for Designing and Accessing Statistical Data Bases -- Non-Standard
Graphical Presentation -- Computer Graphics and Data Presentation, a First Step Toward a Cognitive and Ergonomic Analysis -- 9. Expert Systems -- Expert Systems and Data Analysis Package Management -- Developing Intelligent Software
for Non-Linear Model Fitting as an Expert System -- Express — An Expert System Utilizing Standard Statistical Packages -- Muse: An Expert System in Statistics -- Building Expert Systems with the Help of Existing Statistical Software:
An Example -- Statistical Data Validation and Expert Systems -- Knowledge Base Supported Analysis of Longitudinal Data -- How to Assist an Inexperienced User in the Preliminary Analysis of Time Series: First Version of the Estes Expert
System -- Object-Oriented Data Representations for Statistical Data Analysis -- 10. Statistical Software -- Algorithms for the Beta Distribution Function -- Interactive User-Friendly Package for Design and Analysis of Experiments --
NL: A Statistical Package for General Nonlinear Regression Problems -- Statistical Software for Personal Computers -- Recursive Techniques in Statistical Programming -- Design Criteria for a Flexible Statistical Language -- Statistical
Software SAM — Sensitivity Analysis in Multivariate Methods -- 11. Data Handling and Computational Methods of Clinical Trials -- Data Handling and Computational Methods in Clinical Trials -- Database Assisted Conduct of Clinical Trials
-- An APL-System for Analysing Multivariate Data -- AMS — A Computer Program for Survival Analysis, General Linear Models and a Stochastic Survival Model -- 12. Econometric Computing -- A Multilingual Specification System for
Statistical Software -- An Efficient Algorithm for Time Series Decomposition -- 13. Statistical Data Base Management Systems -- Database Management and Statistical Data Analysis: The Need for Integration and for Becoming More
Intelligent -- Privacy, Informatics and Statistics -- Italian Statistical Data Dictionary System Prototype Developed with a 4th Generation Language -- A Methodology for Conceptual Design of Statistical Databases -- Towards Natural
Integration of Database Management System and Statistical Software -- Easy-Link: An Expert Natural Language Interface to a Statistical Data Bank -- Farandole: A RDBMS for Statistical Data Analysis -- Model- and Method Banks (MMB) as a
Supplement to Statistical Data Banks -- A Security Mechanism Based on Uniform Rounding to prevent Tracker Techniques -- 14. Teaching of Computational Statistics -- A Data Analysis Course in a Computer Science Faculty -- Teaching
Computational Statistics on Workstations -- Teaching Regression Analysis Using MIMOSA — an Interactive Computer System for Matrix Calculus -- Late Arrivals -- Practical Use of Color Imagin in Automatic Classification -- Algorithm and
Software of Multivariate Statistical Analysis of Heterogeneous Data -- Adress-List of Authors
ISBN:9783642468902
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Statistics , Business , Management science , Operations research , Decision making , Business mathematics , Statistics , Statistics for Business/Economics/Mathematical Finance/Insurance , Business Mathematics , Operation Research/Decision Theory , Business and Management, general
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1985-9783642824562:ONLINE Show nearby items on shelf
Title:Combinatorial Algorithms on Words
Author(s):
Date:1985
Size:1 online resource (363 p.)
Note:10.1007/978-3-642-82456-2
Contents:Open Problems in Stringology -- 1 — String Matching -- Efficient String Matching with Don’t-care Patterns -- Optimal Factor Transducers -- Relating the Average-case Cost of the Brute force and the Knuth-Morris-Pratt String Matching
Algorithm -- Algorithms for Factorizing and Testing Subsemigroups -- 2 — Subword Trees -- The Myriad Virtues of Subword Trees -- Efficient and Elegant Subword Tree Construction -- 3 — Data Compression -- Textual Substitution Techniques
for Data Compression -- Variations on a Theme by Ziv and Lempel -- Compression of Two-dimensional Images -- Optimal Parsing of Strings -- Novel Compression of Sparse Bit Strings -- 4 — Counting -- The Use and Usefulness of Numeration
Systems -- Enumeration of Strings -- Two Counting Problems Solved via String Encodings -- Some Uses of the Mellin integral Transform in the Analysis of Algorithms -- 5 — Periods and Other Regularities -- Periodicities in Strings --
Linear Time Recognition of Square free Strings -- Discovering Repetitions in Strings -- Some Decision Results on Nonrepetitive Words -- 6 — Miscellaneous -- On the Complexity of some Word Problems Which Arise in Testing the Security of
Protocols -- Code Properties and Derivatives of DOL Systems -- Words over a Partially Commutative Alphabet -- The Complexity of Two-way Pushdown Automata and Recursive Programs -- On Context Free Grammars and Random Number Generation
ISBN:9783642824562
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:NATO ASI Series, Series F: Computer and Systems Sciences : 12
Keywords: Mathematics , Mathematical logic , Combinatorics , Mathematics , Mathematical Logic and Foundations , Combinatorics
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1982-9789400977600:ONLINE Show nearby items on shelf
Title:New Advances in Distributed Computer Systems Proceedings of the NATO Advanced Study Institute held at Bonas,France, June 15–26, 1981
Author(s):
Date:1982
Size:1 online resource (415 p.)
Note:10.1007/978-94-009-7760-0
Contents:1. Network Development -- Introductory Survey -- Data Communication in Israel — Present and Future -- Datanet 1 of the Netherlands’ PTT -- of Radio-based Air/Ground Data Links into the SITA Network -- Presentation of the NADIR
Pilot-Project -- AUTOFLOOD — A Flexible Test System for Packet Switched Networks -- Integrated Non-voice Services in the Electronic Office -- 2. Network Design -- Open System Interconnection and the Integrated Services Digital Network
-- Design Issues for High Speed Local Network Protocols -- Directory Systems for Computer Mail in Internetworking Environments -- Modeling and Verification of End-to-End Protocols -- Why Usual Transmission Protocols are not appropriate
for High Speed Satellite Transmission -- 3. Local Area Networks -- RESER, A Local Area Network Using a Fiber-Optic Ring -- SESNET — Local Area Networks for Software Engineering Development -- The Interconnection of Local Area Networks
via a Satellite Network -- Report on the Local Area Networks FFM-MCS and MICON -- The Cambridge Ring -- Distributed System Activities at the Institute of Cybernetics of the University of Milan -- 4. Mathematical Development -- An
Introduction to a Calculus of Communicating Systems -- Modelling of Distributed Computing Systems -- 5. Security and Encryption -- Data Security in Distributed Computing Systems -- The Data Encryption Standard and its Modes of Use --
Standardisation and Implementation of Data Encryption -- Public Key Cryptosystems, Authentication and Signatures -- 6. Parallel Computing Architecture -- Synchronization of Concurrent Processes without Globality Assumptions -- Parallel
Processing Architecture and Parallel Algorithms -- Parallel Non-Linear Algorithms -- Microcomputer Networks for Process Control -- List of Participants
ISBN:9789400977600
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:Nato Advanced Study Institutes Series, Series C - Mathematical and Physical Sciences: 80
Keywords: Engineering , Automotive engineering , Engineering , Automotive Engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1979-9789400994317:ONLINE Show nearby items on shelf
Title:Interlinking of Computer Networks Proceedings of the NATO Advanced Study Institute held at Bonas, France, August 28 – September 8, 1978
Author(s):
Date:1979
Size:1 online resource (475 p.)
Note:10.1007/978-94-009-9431-7
Contents:1 International Networking -- Some international Developments in Data Services -- Trends in European Network Developments -- Organization and Technical Problems of the European Informatics Network -- Satellite Communications Systems
and the European Project STELLA -- 2 Network Planning -- U.K. Post Office Current and Future Plans -- Current CCITT Standards -- Protocols Standardization versus Protocols Conversion in Computer Networks Interconnection -- EPSS
Developments -- Users’ View of a National Network -- Transfer of Cyclades Applications towards TRANSPAC Network -- 3 Network Design -- On Interconnection of Computer Networks -- A Model for Inter-process Communication -- Cryptography
and Crypto-Systems -- Protocol Design Considerations for Network Security -- Protocols and Network Interconnection -- Experience from Two Forms of Inter-network Connection -- 4 Network Application -- DARPA Activities in Packet Network
Interconnection -- Defense Packet Switching Networks in the United States -- Canadian Public-switched Data Networks — Infoswitch and Datapac -- The U.K. S.R.C. Computer Network -- The British Steel Corporation Network -- Networking
among U.K. Universities -- The North-West Universities Network -- 5 Network Management -- Message Services in Computer Networks -- Congestion Control in Hierarchical Networks -- Operation of the CYCLADES Network -- Some Service Aspects
of the X25 Interface -- Flow Control in the GMD Network -- List of Participants -- Index of Names
ISBN:9789400994317
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:NATO Advanced Study Institutes Series, Series C - Mathematical and Physical Sciences: 42
Keywords: Computer science , Microprocessors , Computer Science , Processor Architectures
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1977-9789401012140:ONLINE Show nearby items on shelf
Title:Compilation, Critical Evaluation and Distribution of Stellar Data Proceedings of the International Astronomical Union Colloquium No. 35, held at Strasbourg, France, 19–21 August, 1976
Author(s):
Date:1977
Size:1 online resource (330 p.)
Note:10.1007/978-94-010-1214-0
Contents:I. Standards For The Presentation of Data -- 1. (Invited paper) Standards, management and security of astronomical data sets -- 2. Principles of a coded numbering system and its application to open clusters -- 3. Thoughts on the form
of presentation of star catalogue data -- 4. A bibliography of astronomical catalogues and the organization of stellar designations -- 5. The catalogue of stellar identifications -- 6. Desiderata for the catalogue of nearby stars -- 7.
A proposal for non-ambiguous designation of stars and stellar objects -- 8. The use of SI units in astronomy -- II. Acquisition and Processing Techniques -- 9. (Invited paper) The influence of acquisition techniques on the compilation
of astronomical data -- 10. Data processing and analysis for space-based astronomy -- 11. The use of standardized data formats and with the Westerbork radio telescope -- 12. Data storage requirements in relation to radio interferometry
observations -- 13. Ultraviolet photometry from the S2/68 observations in the TD1 satellite -- 14. The University of Texas catalog of and ultraviolet and optical stellar data -- III. The Critical Evaluation of Data Chairman, Dr. G.A.
Wilkins -- 15. (Invited paper) The critical evaluation J.M. Mead and of stellar data -- 16. Critical evaluation of photometric data -- 17. Some thoughts on astronomical data files -- 18. Work on the general catalogue of P.N. Kholopov
variable stars -- 19. A catalogue of photometric sequences Supplement no. 2 -- 20.Catalogues of spectroscopic binaries -- 21. The Princeton-Pennsylvania-Florida card catalogue of eclipsing variables -- 22. Plans for a new edition of
the bright and star catalogue -- IV. The Distribution of Data -- 23. (Invited paper) Data distribution -- 24. Retrieval techniques and graphics displays using a computerized stellar data base -- 25. A master list of non-stellar objects
-- 26. Proposal for a data centre on galactic non-stellar objects -- 27. Main features of the stellar biblio-and F. Spite graphic file -- 28. The visual double star catalogues -- 29. Systematic differences in trigonometric, parallaxes
from different observatories -- 30. The astronomical data systems group in Japan -- 31. Stellar data and computing facilities at the Pulkovo Observatory -- 32. Astronomical data files at the U.S. Naval Observatory: star catalogues,
ephemerides, and observations -- V. Existing Facilities and Future Role of Data Centres -- 33. (Invited paper) Survey of existing facilities -- 34. Existing data centers and their future role -- 35. Third general catalogue of MK
spectral classifications -- 36. The future role of data centres in astronomy -- 37. Astronomical data coordination: a perpetual task -- 38. Concluding remarks -- Report of Discussions
ISBN:9789401012140
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:Astrophysics and Space Science Library, A Series of Books on the Recent Developments of Space Science and of General Geophysics and Astrophysics Published in Connection with the Journal Space Science Reviews: 64
Keywords: Physics , Observations, Astronomical , Astronomy , Physics , Astronomy, Observations and Techniques
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:QA76.9.D32.C53::2014 Show nearby items on shelf
Title:Big data : how data analytics is transforming the world
Author(s): Timothy P. Chartier
Date:2014
Publisher:Chantilly, Virginia: Teaching Company
Size:4 DVDs and 1 course guidebook (173 pages)
Note:Course consists of 24 lectures, Each lecture ca. 30 min.
Contents:disc 1. Data analytics -- what's the big idea?, Got data? What are you wondering about?, A mindset for mastering the data deluge, Looking for patterns -- and causes, Algorithms -- managing complexity, The cycle of data management -- disc 2. Getting graphic and seeing the data, Preparing data is training for success, How new statistics transform sports, Political polls -- how weighted averaging wins, When life is (almost) linear -- regression, Training computers to think like humans -- disc 3. Anoma lies and breaking trends, Simulation -- beyond data, beyond equations, Overfitting -- too good to be truly useful, Bracketology -- the math of March madness, Quantifying quality on the World Wide Web, Watching words -- sentiment and text analysis -- disc 4. Data compression and recommendation systems, Decision trees -- Jump-start an analysis, Clustering -- the many ways to create groups, Degrees of separation and social networks, Challenges of privacy and security, Getting analytical about the future.
ISBN:9781629970820
Series:The great courses. Science & mathematics. Mathematics
Keywords: Big data. , Database management. , Electronic data processing, Distributed processing. , Data mining.
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Location: DVD COLLECTION

Cover
Image
Call number:QA76.76.O63P63::2011 Show nearby items on shelf
Title:MAC OS X Lion : the missing manual
Author(s): David Pogue
Date:2011
Publisher:Sebastopol, CA : Pogue Press/O'Reilly
Size:909p.
Contents:Chapter 0. The New Lion Landscape, Chapter 1. Folders and Windows, Chapter 2. Organizing Your Stuff, Chapter 3. Spotlight, Chapter 4. Dock, Desktop and Toolbars, Chapter 5. Documents, Programs, and Mission Control, Chapter 6. Entering Data, Moving Data and Time Machine, Chapter 7. Services, Automator and AppleScript, Chapter 8. Windows on Macintosh, Chapter 9. System Prefrences, Chapter 10. The Free Programs, Chapter 11. CDs, DVDs and iTunes
Chapter 12. Accounts, Parental Controls and Security, Chapter 13. Networking, File Sharing and AirDrop, Chapter 14. Printing, Scanning, Fonts and Graphics, Chapter 15. Sound, Movies and Speech, Chapter 16. The Unix Crash Course, Chapter 17. Internet Setup and iCloud, Chapter 18. Mail and Contacts, Chapter 19. Safari, Chapter 20. iChat, Chapter 21. SSH, FTP, VPN and Web Sharing
ISBN:9781449397494
Series:Missing manual
Keywords: Operating systems (Computers) , Macintosh (Computer) Programming
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Location: MAIN

Return to the Fermilab Library catalog