Search Results - (((((((kant OR want) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 561

    IBM TotalStorage : SAN product, design, and optimization guide

    Published 2005
    Table of Contents: “…-- 3.7.6 What happens when there is more than one shortest path? -- 3.7.7 Can FSPF cause any problems? …”
    Full text (MFA users only)
    Electronic eBook
  2. 562

    The structure of amorphous materials using molecular dynamics by Massobrio, C. (Carlo)

    Published 2023
    Table of Contents: “…4.2.4 The beauty of the Verlet algorithm -- 4.3 Creating a computer glass via MD: the initial conditions -- 4.4 Production of trajectories and the setup of a thermal cycle -- 4.4.1 An essential summary before hitting the road -- 4.4.2 Starting to run carefully and cautiously: a mini guide -- 4.4.3 Handling adiabaticity: the gap issue -- 4.4.4 Some instructions to be effective when moving to high temperatures -- 4.4.5 Quenching down to the glassy state -- 4.5 Dealing with FPMD odds and ends (including non-adiabaticity): the case of SiN -- 4.5.1 State of the art and calculations…”
    Full text (MFA users only)
    Electronic eBook
  3. 563
  4. 564

    Handbook of safety principles

    Published 2018
    Table of Contents: “…Success or Failure / Ann Enander -- 30.8. Relations to Other Safety Principles / Ann Enander -- References / Ann Enander -- Further Reading / Ann Enander -- 31. …”
    Full text (MFA users only)
    Electronic eBook
  5. 565

    Advanced security solutions for multimedia

    Published 2021
    Full text (MFA users only)
    Electronic eBook
  6. 566
  7. 567
  8. 568

    IP multicast with applications to IPTV and mobile DVB-H by Minoli, Daniel, 1952-

    Published 2008
    Table of Contents: “…Cover -- TOC36;CONTENTS -- Preface -- About the Author -- CH36;1 INTRODUCTION TO IP MULTICAST -- 146;1 Introduction -- 146;2 Why Multicast Protocols are Wanted47;Needed -- 146;3 Basic Multicast Protocols and Concepts -- 146;4 IPTV and DVB45;H Applications -- 146;5 Course of Investigation -- Appendix 146;A58; Multicast IETF Request for Comments -- Appendix 146;B58; Multicast Bibliography -- References -- CH36;2 MULTICAST ADDRESSING FOR PAYLOAD -- 246;1 IP Multicast Addresses -- 246;146;1 Limited Scope Addresses -- 246;146;2 GLOP Addressing -- 246;146;3 Generic IPv4 Addressing -- 246;2 Layer 2 Multicast Addresses -- 246;246;1 Ethernet MAC Address Mapping -- 246;3 MPEG45;Layer Addresses -- References -- CH36;3 MULTICAST PAYLOAD FORWARDING -- 346;1 Multicasting on a LAN Segment -- 346;2 Multicasting between Network Segments -- 346;3 Multicast Distribution Trees -- 346;4 Multicast Forwarding58; Reverse Path Forwarding -- 346;5 Multicast Forwarding58; Center45;Based Tree Algorithm -- 346;6 Implementing IP Multicast in a Network -- References -- CH36;4 DYNAMIC HOST REGISTRATION8212;INTERNET GROUP MANAGEMENT PROTOCOL -- 446;1 IGMP Messages -- 446;2 IGMPv3 Messages -- 446;3 IGMP Operation -- Appendix 446;A58; Protocol Details for IGMPv2 -- 446;A46;1 Overview -- 446;A46;2 Protocol Description -- 446;A46;3 Receiver 40;Host41; State Diagram -- 446;A46;4 Router State Diagram -- Appendix 446;B58; IGMP Snooping Switches -- Appendix 446;C58; Example of Router Configurations -- References -- CH36;5 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; PROTOCOL INDEPENDENT MULTICAST -- 546;1 Introduction to PIM -- 546;2 PIM SM Details -- 546;246;1 Approach -- 546;246;2 PIM SM Protocol Overview -- 546;246;3 Detailed Protocol Description -- 546;246;4 Packet Formats -- References -- CH36;6 MULTICAST ROUTING8212;SPARSE45;MODE PROTOCOLS58; CORE45;BASED TREES -- 646;1 Motivation -- 646;2 Basic Operation -- 646;3 CBT Components and Functions -- 646;346;1 CBT Control Message Retransmission Strategy -- 646;346;2 Nonmember Sending -- 646;4 Core Router Discovery -- 646;5 Protocol Specification Details -- 646;546;1 CBT HELLO Protocol -- 646;546;2 JOIN_REQUEST Processing -- 646;546;3 JOIN_ACK Processing -- 646;546;4 QUIT_NOTIFICATION Processing -- 646;546;5 ECHO_REQUEST Processing -- 646;546;6 ECHO_REPLY Processing -- 646;546;7 FLUSH_TREE Processing -- 646;546;8 Nonmember Sending -- 646;546;9 Timers and Default Values -- 646;546;10 CBT Packet Formats and Message Types -- 646;546;11 Core Router Discovery -- 646;6 CBT Version 3 -- 646;646;1 The First Step58; Joining the Tree -- 646;646;2 Transient State -- 646;646;3 Getting 34;On Tree34; -- 646;646;4 Pruning and Prune State -- 646;646;5 The Forwarding Cache -- 646;646;6 Packet Forwarding -- 646;646;7 The 34;Keepalive34; Protocol -- 646;646;8 Control Message Precedence and Forwarding Criteria -- 646;646;9 Broadcast LANs -- 646;646;10 The 34;all45;cbt45;routers34; Group -- 646;646;11 Nonmember Sending -- References -- CH36;7 MULTICAST ROUTING8212;DENSE45;MODE PROTOCOLS58; PIM DM.…”
    Full text (MFA users only)
    Electronic eBook
  9. 569

    Security, Privacy and Reliability in Computer Communications and Networks. by Sha, Kewei

    Published 2016
    Table of Contents: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN INNOVATION AND CHANGE IN EDUCATION -- CROSS-CULTURAL PERSPECTIVE -- Title Page -- Security, Privacy and Reliability in Computer Communications and Networks -- Copyright Page -- Contents -- Preface -- Acknowledgments -- List of Contributors -- List of Figures -- List of Tables -- List of Algorithms -- List of Abbreviations -- PART I -- Privacy -- Chapter 1 -- Distributed Beamforming Relay Selection to Increase Base Station Anonymity in Wireless Ad Hoc Networks -- Abstract -- 1.1 Introduction -- 1.2 Anonymity Definition, Metrics, and Contemporary Measures -- 1.2.1 Anonymity Definition and Assessment -- 1.2.2 Antitraffic Analysis Measures -- 1.3 System Assumptions and Attack Model -- 1.3.1 Network Model -- 1.3.2 Adversary Model -- 1.3.3 Evidence Theory and Belief Metric -- 1.4 Distributed Beamforming to Increase the BS Anonymity -- 1.4.1 Overview of the DiBAN Protocol -- 1.4.2 DiBAN Illustrative Example -- 1.4.3 DiBAN Energy Analysis -- 1.5 Distributed Beamforming Relay Selection Approach -- 1.6 Validation Experiments -- 1.6.1 Simulation Environment -- 1.6.2 Simulation Results -- 1.7 Conclusions and FutureWork -- Appendix I: Numerical Evidence Theory Belief Calculation Example -- References -- Chapter 2 -- A Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication -- Abstract -- 2.1 Introduction -- 2.2 Related Works -- 2.3 System Model and Preliminaries -- 2.3.1 Network Model -- 2.3.2 Attack Model -- 2.3.3 Security Requirements -- 2.4 The Proposed PETS Scheme -- 2.4.1 Scheme Overview -- 2.4.2 System Initiation -- 2.4.3 Vehicle-RSU Key Agreement -- 2.4.4 Traffic Information Collection and Aggregation -- 2.4.5 Traffic Jam Message Propagation -- 2.5 Security Analysis -- 2.6 Performance Evaluation -- 2.6.1 Traffic Information Sending/Collection Overhead.…”
    Full text (MFA users only)
    Electronic eBook
  10. 570

    SCADA Security : Machine Learning Concepts for Intrusion Detection and Prevention. by Almalawi, Abdulmohsen

    Published 2020
    Table of Contents: “…6.3.1 Learning of Most-Representative Data Sets -- 6.3.2 Decision-Making Model -- 6.4 EXPERIMENTAL SETUP -- 6.4.1 Choice of Parameters -- 6.4.2 The Candidate Classifiers -- 6.5 RESULTS AND DISCUSSION -- 6.5.1 Integrating GATUD into SDAD -- 6.5.2 Integrating GATUD into the Clustering-based Method -- 6.6 CONCLUSION -- CHAPTER 7 Threshold Password-Authenticated Secret Sharing Protocolss -- 7.1 MOTIVATION -- 7.2 EXISTING SOLUTIONS -- 7.3 DEFINITION OF SECURITY -- 7.4 TPASS PROTOCOLS -- 7.4.1 Protocol-Based on Two-Phase Commitment -- 7.4.2 Protocol Based on Zero-Knowledge Proof -- 7.4.3 Correctness…”
    Full text (MFA users only)
    Electronic eBook
  11. 571

    NGN architectures, protocols, and services by Janevski, Toni

    Published 2014
    Table of Contents: “…1.7 The Convergence of the Two Worlds: Next Generation Networks1.7.1 NGN Perspective of Telecom Operators; 1.7.2 When Will NGN Emerge?; 1.8 The Structure of This Book; References; Chapter 2 Internet Fundamentals by IETF; 2.1 Internet Architecture and IETF Standardization; 2.2 Fundamental Internet Protocols; 2.2.1 Internet Protocol Version 4; 2.2.2 Internet Protocol Version 6; 2.2.3 User Datagram Protocol; 2.2.4 Transmission Control Protocol; 2.2.5 Stream Control Transmission Protocol; 2.3 Addressing and Numbering; 2.3.1 IPv4 Addressing; 2.3.2 Network Address Translation.…”
    Full text (MFA users only)
    Electronic eBook
  12. 572

    Qualitative Spatial and Temporal Reasoning. by Ligozat, Gérard

    Published 2012
    Table of Contents: “…Generalized Intervals; 3.1. "When they built the bridge."…”
    Full text (MFA users only)
    Electronic eBook
  13. 573

    Medicine Meets Virtual Reality 13 : the Magical Next Becomes the Medical Now

    Published 2005
    Table of Contents: “…Spherical mechanism analysis of a surgical robot for minimally invasive surgery -- analytical and experimental approaches -- Using an ontology of human anatomy to inform reasoning with geometric models -- Assessing surgical skill training under hazardous conditions in a virtual environment -- An automatic robust meshing algorithm for soft tissue modeling -- Visualizing volumetric data sets using a wireless handheld computer -- Quantifying risk behavior in surgical simulation -- Haptic herniorrhaphy simulation with robust and fast collision detection algorithm -- Affordable virtual environments: Buildinga virtual beach for clinical use -- Analysis of masticatory muscle condition using the 4-dimensional muscle model for a patient with square mandible -- Automated renderer for visual human and volumetric scan segmentations -- Distributed collaborative radiological visualization using access grid -- Development of a method for surface and subsurface modeling using force and position sensors -- The physiology and pharmacology of growing old, as shown in body simulation -- Physiologic and chemical simulation of cyanide and sarin toxicity and therapy.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  14. 574

    Anesthesia student survival guide : a case-based approach

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  15. 575
  16. 576

    CCNA Security Study Guide : Exam 210-260. by McMillan, Troy

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  17. 577
  18. 578

    The illustrated network : how TCP/IP works in a modern network by Goralski, Walter

    Published 2017
    Table of Contents: “…Example ARP Operation -- ARP Variations -- Proxy ARP -- Reverse ARP -- ARPs on WANs -- ARP and IPv6 -- Neighbor Discovery Protocol -- ND Address Resolution -- Questions for Readers -- 7 IPv4 and IPv6 Headers -- Packet Headers and Addresses -- The IPv4 Packet Header -- Fragmentation and IPv4 -- Fragmentation and MTU -- Fragmentation and Reassembly -- Path MTU Determination -- A Fragmentation Example -- Limitations of IPv4 -- The IPv6 Header Structure -- IPv4 and IPv6 Headers Compared -- IPv6 Header Changes -- IPv6 and Fragmentation -- Questions for Readers -- 8 Internet Control Message Protocol -- ICMP and Ping -- The ICMP Message Format -- ICMP Message Fields -- ICMP Types and Codes -- ICMP Error Messages -- ICMP Query Messages -- Other ICMP Messages -- Sending ICMP Messages -- When ICMP Must Be Sent -- When ICMP Must Not Be Sent -- Ping -- Traceroute -- Path MTU -- ICMPv6 -- Basic ICMPv6 Messages -- Destination Unreachable -- Packet Too Big -- Time Exceeded -- Parameter Problem -- Echo Request and Reply -- Neighbor Discovery and Autoconfiguration -- Routers and Neighbor Discovery -- Interface Addresses -- Neighbor Solicitation and Advertisement -- Questions for Readers -- 9 Routing -- Routers and Routing Tables -- Hosts and Routing Tables -- Direct and Indirect Delivery -- Routing -- Direct Delivery without Routing -- Indirect Delivery and the Router -- Questions for Readers -- 10 Forwarding IP Packets -- Router Architectures -- Basic Router Architectures -- Another Router Architecture -- Router Access -- The Console Port -- The Auxiliary Port -- The Network -- Forwarding Table Lookups -- Dual Stacks, Tunneling, and IPv6 -- Dual Protocol Stacks -- Tunneling -- Tunneling Mechanisms -- Transition Considerations -- Questions for Readers -- 11 User Datagram Protocol -- UDP Ports and Sockets -- What UDP Is For -- The UDP Header -- IPv4 and IPv6 Notes.…”
    Full text (MFA users only)
    Electronic eBook
  19. 579

    The Johns Hopkins guide to digital media

    Published 2014
    Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
    Book
  20. 580