Author: National Library of Medicine (U.S.)
Publisher:
ISBN:
Category : Medicine
Languages : en
Pages : 1712
Book Description
First multi-year cumulation covers six years: 1965-70.
Current Catalog
Author: National Library of Medicine (U.S.)
Publisher:
ISBN:
Category : Medicine
Languages : en
Pages : 1712
Book Description
First multi-year cumulation covers six years: 1965-70.
Publisher:
ISBN:
Category : Medicine
Languages : en
Pages : 1712
Book Description
First multi-year cumulation covers six years: 1965-70.
National Library of Medicine Current Catalog
Author: National Library of Medicine (U.S.)
Publisher:
ISBN:
Category : Medicine
Languages : en
Pages : 1728
Book Description
Publisher:
ISBN:
Category : Medicine
Languages : en
Pages : 1728
Book Description
Hardware Protection through Obfuscation
Author: Domenic Forte
Publisher: Springer
ISBN: 3319490192
Category : Technology & Engineering
Languages : en
Pages : 352
Book Description
This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.
Publisher: Springer
ISBN: 3319490192
Category : Technology & Engineering
Languages : en
Pages : 352
Book Description
This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.
Mobile Ad Hoc Networks
Author: Jonathan Loo
Publisher: CRC Press
ISBN: 1439856516
Category : Computers
Languages : en
Pages : 538
Book Description
Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, this book examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Leading researchers, industry professionals, and academics provide an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service.
Publisher: CRC Press
ISBN: 1439856516
Category : Computers
Languages : en
Pages : 538
Book Description
Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, this book examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Leading researchers, industry professionals, and academics provide an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service.
QoE Management in Wireless Networks
Author: Ying Wang
Publisher: Springer
ISBN: 3319424548
Category : Technology & Engineering
Languages : en
Pages : 70
Book Description
This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.
Publisher: Springer
ISBN: 3319424548
Category : Technology & Engineering
Languages : en
Pages : 70
Book Description
This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.
Advances in Statistical Control, Algebraic Systems Theory, and Dynamic Systems Characteristics
Author: Chang-Hee Won
Publisher: Springer Science & Business Media
ISBN: 0817647953
Category : Mathematics
Languages : en
Pages : 368
Book Description
This volume is a collection of chapters covering recent advances in stochastic optimal control theory and algebraic systems theory. The book will be a useful reference for researchers and graduate students in systems and control, algebraic systems theory, and applied mathematics. Requiring only knowledge of undergraduate-level control and systems theory, the work may be used as a supplementary textbook in a graduate course on optimal control or algebraic systems theory.
Publisher: Springer Science & Business Media
ISBN: 0817647953
Category : Mathematics
Languages : en
Pages : 368
Book Description
This volume is a collection of chapters covering recent advances in stochastic optimal control theory and algebraic systems theory. The book will be a useful reference for researchers and graduate students in systems and control, algebraic systems theory, and applied mathematics. Requiring only knowledge of undergraduate-level control and systems theory, the work may be used as a supplementary textbook in a graduate course on optimal control or algebraic systems theory.
Nature-Inspired Algorithms for Optimisation
Author: Raymond Chiong
Publisher: Springer
ISBN: 3642002676
Category : Technology & Engineering
Languages : en
Pages : 524
Book Description
Nature-Inspired Algorithms have been gaining much popularity in recent years due to the fact that many real-world optimisation problems have become increasingly large, complex and dynamic. The size and complexity of the problems nowadays require the development of methods and solutions whose efficiency is measured by their ability to find acceptable results within a reasonable amount of time, rather than an ability to guarantee the optimal solution. This volume 'Nature-Inspired Algorithms for Optimisation' is a collection of the latest state-of-the-art algorithms and important studies for tackling various kinds of optimisation problems. It comprises 18 chapters, including two introductory chapters which address the fundamental issues that have made optimisation problems difficult to solve and explain the rationale for seeking inspiration from nature. The contributions stand out through their novelty and clarity of the algorithmic descriptions and analyses, and lead the way to interesting and varied new applications.
Publisher: Springer
ISBN: 3642002676
Category : Technology & Engineering
Languages : en
Pages : 524
Book Description
Nature-Inspired Algorithms have been gaining much popularity in recent years due to the fact that many real-world optimisation problems have become increasingly large, complex and dynamic. The size and complexity of the problems nowadays require the development of methods and solutions whose efficiency is measured by their ability to find acceptable results within a reasonable amount of time, rather than an ability to guarantee the optimal solution. This volume 'Nature-Inspired Algorithms for Optimisation' is a collection of the latest state-of-the-art algorithms and important studies for tackling various kinds of optimisation problems. It comprises 18 chapters, including two introductory chapters which address the fundamental issues that have made optimisation problems difficult to solve and explain the rationale for seeking inspiration from nature. The contributions stand out through their novelty and clarity of the algorithmic descriptions and analyses, and lead the way to interesting and varied new applications.
Cyber Security
Author: John G. Voeller
Publisher: John Wiley & Sons
ISBN: 1118651685
Category : Technology & Engineering
Languages : en
Pages : 190
Book Description
Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.
Publisher: John Wiley & Sons
ISBN: 1118651685
Category : Technology & Engineering
Languages : en
Pages : 190
Book Description
Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.
Data Mining and Data Visualization
Author:
Publisher: Elsevier
ISBN: 0080459404
Category : Mathematics
Languages : en
Pages : 660
Book Description
Data Mining and Data Visualization focuses on dealing with large-scale data, a field commonly referred to as data mining. The book is divided into three sections. The first deals with an introduction to statistical aspects of data mining and machine learning and includes applications to text analysis, computer intrusion detection, and hiding of information in digital files. The second section focuses on a variety of statistical methodologies that have proven to be effective in data mining applications. These include clustering, classification, multivariate density estimation, tree-based methods, pattern recognition, outlier detection, genetic algorithms, and dimensionality reduction. The third section focuses on data visualization and covers issues of visualization of high-dimensional data, novel graphical techniques with a focus on human factors, interactive graphics, and data visualization using virtual reality. This book represents a thorough cross section of internationally renowned thinkers who are inventing methods for dealing with a new data paradigm. - Distinguished contributors who are international experts in aspects of data mining - Includes data mining approaches to non-numerical data mining including text data, Internet traffic data, and geographic data - Highly topical discussions reflecting current thinking on contemporary technical issues, e.g. streaming data - Discusses taxonomy of dataset sizes, computational complexity, and scalability usually ignored in most discussions - Thorough discussion of data visualization issues blending statistical, human factors, and computational insights
Publisher: Elsevier
ISBN: 0080459404
Category : Mathematics
Languages : en
Pages : 660
Book Description
Data Mining and Data Visualization focuses on dealing with large-scale data, a field commonly referred to as data mining. The book is divided into three sections. The first deals with an introduction to statistical aspects of data mining and machine learning and includes applications to text analysis, computer intrusion detection, and hiding of information in digital files. The second section focuses on a variety of statistical methodologies that have proven to be effective in data mining applications. These include clustering, classification, multivariate density estimation, tree-based methods, pattern recognition, outlier detection, genetic algorithms, and dimensionality reduction. The third section focuses on data visualization and covers issues of visualization of high-dimensional data, novel graphical techniques with a focus on human factors, interactive graphics, and data visualization using virtual reality. This book represents a thorough cross section of internationally renowned thinkers who are inventing methods for dealing with a new data paradigm. - Distinguished contributors who are international experts in aspects of data mining - Includes data mining approaches to non-numerical data mining including text data, Internet traffic data, and geographic data - Highly topical discussions reflecting current thinking on contemporary technical issues, e.g. streaming data - Discusses taxonomy of dataset sizes, computational complexity, and scalability usually ignored in most discussions - Thorough discussion of data visualization issues blending statistical, human factors, and computational insights
Engineering Safety: Fundamentals, Techniques, And Applications
Author: B S Dhillon
Publisher: World Scientific Publishing Company
ISBN: 9813102365
Category : Technology & Engineering
Languages : en
Pages : 241
Book Description
Safety has become very important because each year a vast number of people die due to workplace and other accidents. For example, in the United States for the year 1996 as per the National Safety Council, there were 93,400 deaths and 20,700,000 disabling injuries due to workplace accidents, with a total loss of $121 billion. Today there are a large number of books available on safety, but to the best of the author's knowledge none covers both general and systems safety (i.e., at a significant depth) and application or specialized areas such as software safety, robot safety, health care safety, and maintenance safety. This book has been written to satisfy that vital need.
Publisher: World Scientific Publishing Company
ISBN: 9813102365
Category : Technology & Engineering
Languages : en
Pages : 241
Book Description
Safety has become very important because each year a vast number of people die due to workplace and other accidents. For example, in the United States for the year 1996 as per the National Safety Council, there were 93,400 deaths and 20,700,000 disabling injuries due to workplace accidents, with a total loss of $121 billion. Today there are a large number of books available on safety, but to the best of the author's knowledge none covers both general and systems safety (i.e., at a significant depth) and application or specialized areas such as software safety, robot safety, health care safety, and maintenance safety. This book has been written to satisfy that vital need.