Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Computer Science  (2,022)
  • Biology  (1,495)
Language
Region
Subjects(RVK)
Access
  • 1
    UID:
    almafu_BV010983272
    Format: XIV, 468 S. : graph. Darst. , 1 Diskette (9 cm)
    ISBN: 0-387-94518-0
    Note: Bd. 1 u.d.T.: Economic and financial modeling with Mathematica. - Systemvoraussetzungen: files can be read on DOS/Windows, Macintosh, NeXT, and UNIX computers; Mathematica 2.2 or later is recommended for maximum use of the diskette files
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    Keywords: Ökonometrisches Modell ; Mathematica ; Finanzplanungsmodell ; Mathematica ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Lehrbuch
    Author information: Varian, Hal R. 1947-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    London :Imperial College Press,
    UID:
    almahu_BV035778814
    Format: XIII, 257 Seiten.
    ISBN: 978-1-84816-310-2 , 978-1-84816-309-6 , 1-84816-309-6 , 1-84816-310-X
    Content: This book is designed to enable non-native English speakers to write science research for publication in English. It can also be used by English speakers and is a practical, user-friendly book intended as a fast, do-it-yourself guide for those whose English language proficiency is above intermediate. The approach is based on material developed from teaching graduate students at Imperial College London and has been extensively piloted. The book guides the reader through the process of writing science research and will also help with writing a Master’s or Doctoral thesis in English. Science writing is much easier than it looks because the structure and language are conventional. The aim of this book is to help the reader discover a template or model for science research writing and then to provide the grammar and vocabulary tools needed to operate that model. There are five units: Introduction, Methodology, Results, Discussion/Conclusion and Abstract. The reader develops a model for each section of the research article through sample texts and exercises; this is followed by a Grammar and Writing Skills section designed to respond to frequently-asked questions as well as a Vocabulary list including examples of how the words and phrases are to be used.
    Note: Hier auch später erschienene, unveränderte Nachdrucke
    Language: English
    Subjects: Chemistry/Pharmacy , Economics , Natural Sciences , Biology , General works , English Studies
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Naturwissenschaften ; Forschungsergebnis ; Wissenschaftliches Manuskript ; Englisch ; Wissenschaftliches Manuskript ; Textproduktion ; Wissenschaft ; Englisch ; Handbooks and manuals ; Ratgeber
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949301314402882
    Format: 1 online resource (270 pages)
    ISBN: 9783319916897
    Series Statement: Fascinating Life Sciences Ser.
    Note: Intro -- Foreword -- References -- Contents -- Chapter 1: Introduction: Studying Birds in Time and Space -- 1.1 Why and How to Study Bird Species -- 1.2 Physical and Behavioral Aspects of Birds -- 1.3 The Spatial Component -- 1.4 Ecology Matters: Bird Species in the Anthropocene -- References -- Chapter 2: Integrative Taxonomy of Birds: The Nature and Delimitation of Species -- 2.1 The Centrality of Species -- 2.2 Why Is There a Species Problem? -- 2.2.1 Monism vs. Pluralism -- 2.2.2 Realism vs. Anti-realism -- 2.2.3 Theoretical vs. Operational -- 2.2.4 Pattern vs. Process -- 2.2.5 Prospective vs. Historical -- 2.2.6 Concerns by End Users -- 2.3 The Lineage Concept -- 2.4 Corollaries of the Lineage Concept -- 2.5 Integrative Taxonomy -- 2.5.1 Why Multiple Data? -- 2.5.2 Why Integrate? -- 2.6 Strengths of Integrative Taxonomy -- 2.7 What Is Not Integrative Taxonomy? -- 2.7.1 Falsification by a ``Defining ́́Species Criterion -- 2.7.2 Standardization of Species Criteria -- 2.8 The Dynamics of Taxonomic Change -- 2.9 The Drivers of Taxonomic Change -- 2.10 Benefits of Integrative Taxonomy to Other Fields -- 2.10.1 Speciation Studies -- 2.10.2 Biogeography -- 2.10.3 Conservation -- 2.11 Remaining Issues -- References -- Suggestion for Further Reading -- Chapter 3: Studying Speciation: Genomic Essentials and Approaches -- 3.1 What Is an Avian Genome? -- 3.1.1 Structure of the Genetic Material -- 3.1.1.1 Noncoding and Coding Regions -- 3.1.1.2 Autosomes Versus Sex Chromosomes -- 3.1.1.3 Nuclear Genome and Mitochondrial Genome -- 3.1.2 The Chicken Model: History and Overview -- 3.2 How Does the Genome ``Work?́́ -- 3.2.1 Replication of the DNA -- 3.2.2 Transcription: RNA Synthesis -- 3.2.3 Translation -- 3.2.4 One Gene: One Function? -- 3.2.5 Categorical vs. Quantitative Traits -- 3.2.6 Phenotypic Plasticity -- 3.3 How Does the Genome Evolve?. , 3.3.1 Modification of the DNA -- 3.3.2 Mutation -- 3.3.3 Selection -- 3.3.4 Genetic Drift -- 3.3.5 Geographic Variation and Dispersal -- 3.3.6 Recombination and Migration -- 3.3.7 Gene Duplication -- 3.4 How to Study Speciation Using Genomic Features? -- 3.4.1 PCR-Based Molecular Markers -- 3.4.1.1 Ribosomal Genes -- 3.4.1.2 Mitochondrial DNA Markers -- 3.4.1.3 Microsatellites -- 3.4.2 Expressed Sequence Tags -- 3.4.3 Single Nucleotide Polymorphisms -- 3.4.4 Restriction-site-associated DNA sequencing -- 3.4.5 Genotyping by sequencing -- 3.4.6 Transcriptomics -- 3.4.7 ``Whole ́́Genome Sequencing -- 3.4.7.1 Different Strategies for Sequencing Genomes -- 3.4.7.2 Limitations of Analyzing Genomes -- 3.4.8 Epigenome -- 3.5 Closing Words -- References -- Chapter 4: Morphological Variation in Birds: Plasticity, Adaptation, and Speciation -- 4.1 General Aspects of Phenotypic Variation in Birds -- 4.2 The Historical Role of Morphological Criteria for Species Delimitation -- 4.3 Phenotypic Variation and Plasticity of Characters -- 4.4 Assessing Morphological Variation -- 4.5 Disentangling Phylogenetic and Adaptive Constraints -- 4.6 A Contemporary Perspective on Morphological Variation -- References -- Chapter 5: Song: The Learned Language of Three Major Bird Clades -- 5.1 Eager Birds: The Advanced Learners -- 5.2 Passerine Song -- 5.3 The Best Singer Takes It All: Female Preference and Sexual Selection -- 5.4 How It All Began: A Brief History of Bioacoustic Studies -- 5.5 Telltale Songs: Evolution and Phylogenetic Information of Vocalizations -- 5.6 Vocal Learning as a Pacemaker of Evolution -- 5.7 Dialects: Spatial Variation -- 5.8 Competition for Acoustic Space: The Role of Ecology -- 5.9 Dialects as a Language Barrier and Isolating Mechanism -- 5.10 Sympathy in Sympatry: Bilingual Birds in a Hybrid Zone -- References. , Chapter 6: Timing Matters: Allochronic Contributions to Population Divergence -- 6.1 Timing Is Everything! -- 6.2 Clockworks -- 6.3 Allochrony: Differences in Timing Between Individuals, Populations, and Species -- 6.4 Isolation by the Clock -- 6.5 Conclusions -- Further Reading -- References -- Chapter 7: (Micro)evolutionary Changes and the Evolutionary Potential of Bird Migration -- 7.1 History and Geographic Origins -- 7.2 Regulation -- 7.2.1 Variation in Migratory Strategy -- 7.2.2 Migratory Traits Are Inherited -- 7.2.3 Underlying Genetic Architecture: Simple and Common? -- 7.2.4 Marker-Based Approaches: Candidate Genes for Migration -- 7.2.5 Enhancing Scale and Resolution: Genome-Wide Approaches -- 7.3 Population Differentiation and Speciation -- References -- Chapter 8: Avian Diversity and Distributions and Their Evolution Through Space and Time -- 8.1 Spatiotemporal Diversification of Modern Birds -- 8.2 Global Distribution and Diversity Patterns -- 8.3 Geography of Speciation -- 8.4 Vicariance vs. Dispersal and the Dynamics of Range Evolution in Birds -- References -- Chapter 9: Modeling Avian Distributions and Niches: Insights into Invasions and Speciation in Birds -- 9.1 Introduction -- 9.2 The Conceptual Background of SDMs or What Is a Niche? -- 9.3 How to Build a Species Distribution Model? -- 9.3.1 Occurrence Data -- 9.3.2 Predictor Variables -- 9.3.3 Algorithms -- 9.3.4 Niche Comparisons -- 9.4 Niche Conservatism -- 9.5 Evaluating Avian Invasions -- 9.6 Speciation and Niche Evolution -- 9.7 Assisting Taxonomy -- References -- Chapter 10: Phylogeography and the Role of Hybridization in Speciation -- 10.1 Introduction -- 10.2 Some General Observations from Avian Phylogeography: Historical Population Size Changes and Introgression -- 10.3 Phylogeography, Sex Chromosomes, and Speciation. , 10.4 Bird Species with No Known or Very Few Genetic Differences -- 10.5 Hybrid Zones: A Closer Look -- 10.5.1 Suture Zones and Multiple Hybrid Zones -- 10.5.2 Detail Emerging from Single Species and Hybrid Zones: Three Case Studies -- 10.6 Mitonuclear Incompatibility, Hybridization, and Speciation -- 10.7 Ring Species as a Special Case of Divergence with Gene Flow: Are There Any Surviving Examples? -- 10.8 Hybrid Species -- 10.8.1 Hybrid Zones Sometimes Move -- 10.9 A View to the Future -- References -- Chapter 11: Ecological Speciation: When and How Variation Among Environments Can Drive Population Divergence -- 11.1 Approaches Toward the Study of Speciation -- 11.2 Four Ways to Increase Ecological Performance: Which May Each Drive Speciation -- 11.3 Ecological Speciation Driven by Natural Selection -- 11.4 Ecological Speciation Driven by Phenotypic Plasticity -- 11.5 Ecological Speciation Driven by Adjustment of the Environment -- 11.6 Ecological Speciation Driven by Selection of the Environment -- 11.7 Feedbacks Between Plasticity, Adjusting the Environment, Selection of the Environment, and Natural Selection -- References -- Chapter 12: Climate Change Impacts on Bird Species -- 12.1 Introduction -- 12.2 Birds and Climate Change: Is There an Impact? -- 12.2.1 Climate Change Indicators -- 12.3 What Are the Consequences of Climate Change for Birds? -- 12.4 Projections of Potential Climate Change Impacts: What Else Is Waiting for Us? -- 12.5 Do Niches and Interactions with Abiotic and Biotic Environment ``Evolve?́́ -- 12.6 Conservation Implications -- References -- Chapter 13: Impact of Urbanization on Birds -- 13.1 A Brief History of Urbanization -- 13.2 Birds and the City -- 13.2.1 Species Vanish from the City -- 13.2.2 Species Flourish or Persist in the City -- 13.2.3 Species Change -- 13.3 Urban Environment as a Barrier for Movement. , 13.4 The Urban Drivers -- 13.5 Phenotypic Changes and Responses as a Result of Urban Life -- 13.5.1 Physiology -- 13.5.1.1 Stress Physiology and Its Implications -- 13.5.1.2 Nutritional Physiology and Its Implications -- 13.5.2 Behavior -- 13.5.2.1 Behavioral Responses to Chemical Pollution -- 13.5.2.2 Behavioral Responses to Noise -- 13.5.2.3 Behavioral Responses to ALAN -- 13.6 Concluding Remarks -- References -- Glossary.
    Additional Edition: Print version: Tietze, Dieter Thomas Bird Species Cham : Springer International Publishing AG,c2018 ISBN 9783319916880
    Language: English
    Subjects: Biology
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books. ; Electronic books. ; Hochschulschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949301320202882
    Format: 1 online resource (126 pages)
    ISBN: 9783030108229
    Series Statement: SpringerBriefs in Earth System Sciences Ser.
    Note: Intro -- Preface -- Contents -- Symbols -- 1 Introduction -- 1.1 From Geochemistry and Microbial Ecology to Biogeochemistry -- 1.2 Focus on Carbon Processing in the Sea -- 1.3 A 101 Budget for Organic Carbon in the Ocean -- References -- 2 Primary Production: From Inorganic to Organic Carbon -- 2.1 Primary Producers -- 2.2 The Basics (For Individuals and Populations) -- 2.2.1 Maximum Growth Rate (µ) -- 2.2.2 Temperature Effect on Primary Production -- 2.2.3 Light -- 2.2.4 Nutrient Limitation -- 2.3 From Theory and Axenic Mono-Cultures to Mixed Communities in the Field -- 2.3.1 Does Diversity Matter or Not? -- 2.3.2 Chl the Biomass Proxy -- 2.3.3 Light Distribution -- 2.4 Factors Governing Primary Production -- 2.4.1 Depth Distribution of Primary Production -- 2.4.2 Depth-Integrated Production -- 2.4.3 Critical Depths -- References -- 3 The Return from Organic to Inorganic Carbon -- 3.1 Carbon Consumption Pathway in the Euphotic Zone -- 3.2 Factors Governing Export of Organic Matter -- 3.3 Particulate Organic Carbon Fluxes in Ocean Interior -- References -- 4 Carbon Processing at the Seafloor -- 4.1 Organic Matter Supply to Sediments -- 4.2 The Consumers -- 4.3 Organic Carbon Degradation in Sediments -- 4.4 Consequences for Sediment Biogeochemistry -- 4.5 Factors Governing Organic Carbon Burial -- References -- 5 Biogeochemical Processes and Inorganic Carbon Dynamics -- 5.1 The Basics -- 5.2 The Thermodynamic Basis -- 5.3 Analytical Parameters of the CO2 System -- 5.4 Buffering -- 5.5 Carbonate Mineral Equilibria -- 5.6 Dissolved Inorganic Carbon Systematics -- 5.7 The Impact of Biogeochemical Processes -- References -- 6 Organic Matter is more than CH2O -- 6.1 Redfield Organic Matter -- 6.2 Non-redfield Organic Matter -- 6.3 Organic Matter is Food -- 6.4 Compositional Changes During Organic Matter Degradation -- References.
    Additional Edition: Print version: Middelburg, Jack J. Marine Carbon Biogeochemistry Cham : Springer International Publishing AG,c2019 ISBN 9783030108212
    Language: English
    Subjects: Biology
    RVK:
    Keywords: Electronic books. ; Electronic books. ; Electronic books.
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949301188302882
    Format: 1 online resource (223 pages)
    ISBN: 9783030053185
    Series Statement: The Springer Series on Challenges in Machine Learning Ser.
    Note: Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- Part I AutoML Methods -- 1 Hyperparameter Optimization -- 1.1 Introduction -- 1.2 Problem Statement -- 1.2.1 Alternatives to Optimization: Ensembling and Marginalization -- 1.2.2 Optimizing for Multiple Objectives -- 1.3 Blackbox Hyperparameter Optimization -- 1.3.1 Model-Free Blackbox Optimization Methods -- 1.3.2 Bayesian Optimization -- 1.3.2.1 Bayesian Optimization in a Nutshell -- 1.3.2.2 Surrogate Models -- 1.3.2.3 Configuration Space Description -- 1.3.2.4 Constrained Bayesian Optimization -- 1.4 Multi-fidelity Optimization -- 1.4.1 Learning Curve-Based Prediction for Early Stopping -- 1.4.2 Bandit-Based Algorithm Selection Methods -- 1.4.3 Adaptive Choices of Fidelities -- 1.5 Applications to AutoML -- 1.6 Open Problems and Future Research Directions -- 1.6.1 Benchmarks and Comparability -- 1.6.2 Gradient-Based Optimization -- 1.6.3 Scalability -- 1.6.4 Overfitting and Generalization -- 1.6.5 Arbitrary-Size Pipeline Construction -- Bibliography -- 2 Meta-Learning -- 2.1 Introduction -- 2.2 Learning from Model Evaluations -- 2.2.1 Task-Independent Recommendations -- 2.2.2 Configuration Space Design -- 2.2.3 Configuration Transfer -- 2.2.3.1 Relative Landmarks -- 2.2.3.2 Surrogate Models -- 2.2.3.3 Warm-Started Multi-task Learning -- 2.2.3.4 Other Techniques -- 2.2.4 Learning Curves -- 2.3 Learning from Task Properties -- 2.3.1 Meta-Features -- 2.3.2 Learning Meta-Features -- 2.3.3 Warm-Starting Optimization from Similar Tasks -- 2.3.4 Meta-Models -- 2.3.4.1 Ranking -- 2.3.4.2 Performance Prediction -- 2.3.5 Pipeline Synthesis -- 2.3.6 To Tune or Not to Tune? -- 2.4 Learning from Prior Models -- 2.4.1 Transfer Learning -- 2.4.2 Meta-Learning in Neural Networks -- 2.4.3 Few-Shot Learning -- 2.4.4 Beyond Supervised Learning -- 2.5 Conclusion -- Bibliography. , 3 Neural Architecture Search -- 3.1 Introduction -- 3.2 Search Space -- 3.3 Search Strategy -- 3.4 Performance Estimation Strategy -- 3.5 Future Directions -- Bibliography -- Part II AutoML Systems -- 4 Auto-WEKA: Automatic Model Selection and Hyperparameter Optimization in WEKA -- 4.1 Introduction -- 4.2 Preliminaries -- 4.2.1 Model Selection -- 4.2.2 Hyperparameter Optimization -- 4.3 CASH -- 4.3.1 Sequential Model-Based Algorithm Configuration (SMAC) -- 4.4 Auto-WEKA -- 4.5 Experimental Evaluation -- 4.5.1 Baseline Methods -- 4.5.2 Results for Cross-Validation Performance -- 4.5.3 Results for Test Performance -- 4.6 Conclusion -- 4.6.1 Community Adoption -- Bibliography -- 5 Hyperopt-Sklearn -- 5.1 Introduction -- 5.2 Background: Hyperopt for Optimization -- 5.3 Scikit-Learn Model Selection as a Search Problem -- 5.4 Example Usage -- 5.5 Experiments -- 5.6 Discussion and Future Work -- 5.7 Conclusions -- Bibliography -- 6 Auto-sklearn: Efficient and Robust Automated MachineLearning -- 6.1 Introduction -- 6.2 AutoML as a CASH Problem -- 6.3 New Methods for Increasing Efficiency and Robustness of AutoML -- 6.3.1 Meta-learning for Finding Good Instantiations of Machine Learning Frameworks -- 6.3.2 Automated Ensemble Construction of Models Evaluated During Optimization -- 6.4 A Practical Automated Machine Learning System -- 6.5 Comparing Auto-sklearn to Auto-WEKA and Hyperopt-Sklearn -- 6.6 Evaluation of the Proposed AutoML Improvements -- 6.7 Detailed Analysis of Auto-sklearn Components -- 6.8 Discussion and Conclusion -- 6.8.1 Discussion -- 6.8.2 Usage -- 6.8.3 Extensions in PoSH Auto-sklearn -- 6.8.4 Conclusion and Future Work -- Bibliography -- 7 Towards Automatically-Tuned Deep Neural Networks -- 7.1 Introduction -- 7.2 Auto-Net 1.0 -- 7.3 Auto-Net 2.0 -- 7.4 Experiments -- 7.4.1 Baseline Evaluation of Auto-Net 1.0 and Auto-sklearn. , 7.4.2 Results for AutoML Competition Datasets -- 7.4.3 Comparing AutoNet 1.0 and 2.0 -- 7.5 Conclusion -- Bibliography -- 8 TPOT: A Tree-Based Pipeline Optimization Toolfor Automating Machine Learning -- 8.1 Introduction -- 8.2 Methods -- 8.2.1 Machine Learning Pipeline Operators -- 8.2.2 Constructing Tree-Based Pipelines -- 8.2.3 Optimizing Tree-Based Pipelines -- 8.2.4 Benchmark Data -- 8.3 Results -- 8.4 Conclusions and Future Work -- Bibliography -- 9 The Automatic Statistician -- 9.1 Introduction -- 9.2 Basic Anatomy of an Automatic Statistician -- 9.2.1 Related Work -- 9.3 An Automatic Statistician for Time Series Data -- 9.3.1 The Grammar over Kernels -- 9.3.2 The Search and Evaluation Procedure -- 9.3.3 Generating Descriptions in Natural Language -- 9.3.4 Comparison with Humans -- 9.4 Other Automatic Statistician Systems -- 9.4.1 Core Components -- 9.4.2 Design Challenges -- 9.4.2.1 User Interaction -- 9.4.2.2 Missing and Messy Data -- 9.4.2.3 Resource Allocation -- 9.5 Conclusion -- Bibliography -- Part III AutoML Challenges -- 10 Analysis of the AutoML Challenge Series 2015-2018 -- 10.1 Introduction -- 10.2 Problem Formalization and Overview -- 10.2.1 Scope of the Problem -- 10.2.2 Full Model Selection -- 10.2.3 Optimization of Hyper-parameters -- 10.2.4 Strategies of Model Search -- 10.3 Data -- 10.4 Challenge Protocol -- 10.4.1 Time Budget and Computational Resources -- 10.4.2 Scoring Metrics -- 10.4.3 Rounds and Phases in the 2015/2016 Challenge -- 10.4.4 Phases in the 2018 Challenge -- 10.5 Results -- 10.5.1 Scores Obtained in the 2015/2016 Challenge -- 10.5.2 Scores Obtained in the 2018 Challenge -- 10.5.3 Difficulty of Datasets/Tasks -- 10.5.4 Hyper-parameter Optimization -- 10.5.5 Meta-learning -- 10.5.6 Methods Used in the Challenges -- 10.6 Discussion -- 10.7 Conclusion -- Bibliography -- Correction to: Neural Architecture Search.
    Additional Edition: Print version: Hutter, Frank Automated Machine Learning Cham : Springer International Publishing AG,c2019 ISBN 9783030053178
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Electronic books. ; Electronic books. ; Electronic books. ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949602262502882
    Format: 1 online resource (515 pages)
    Edition: 1st ed.
    ISBN: 9781484228968
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Additional Edition: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949602254902882
    Format: 1 online resource (807 pages)
    Edition: 1st ed.
    ISBN: 9781484243985
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Preface -- Part 1 -- Chapter 1: Jumping Right In: "Hello, TBB!" -- Why Threading Building Blocks? -- Performance: Small Overhead, Big Benefits for C++ -- Evolving Support for Parallelism in TBB and C++ -- Recent C++ Additions for Parallelism -- The Threading Building Blocks (TBB) Library -- Parallel Execution Interfaces -- Interfaces That Are Independent of the Execution Model -- Using the Building Blocks in TBB -- Let's Get Started Already! -- Getting the Threading Building Blocks (TBB) Library -- Getting a Copy of the Examples -- Writing a First "Hello, TBB!" Example -- Building the Simple Examples -- Steps to Set Up an Environment -- Building on Windows Using Microsoft Visual Studio -- Building on a Linux Platform from a Terminal -- Using the Intel Compiler -- tbbvars and pstlvars Scripts -- Setting Up Variables Manually Without Using the tbbvars Script or the Intel Compiler -- A More Complete Example -- Starting with a Serial Implementation -- Adding a Message-Driven Layer Using a Flow Graph -- Adding a Fork-Join Layer Using a parallel_for -- Adding a SIMD Layer Using a Parallel STL Transform -- Summary -- Chapter 2: Generic Parallel Algorithms -- Functional / Task Parallelism -- A Slightly More Complicated Example: A Parallel Implementation of Quicksort -- Loops: parallel_for, parallel_reduce, and parallel_scan -- parallel_for: Applying a Body to Each Element in a Range -- A Slightly More Complicated Example: Parallel Matrix Multiplication -- parallel_reduce: Calculating a Single Result Across a Range -- A Slightly More Complicated Example: Calculating π by Numerical Integration -- parallel_scan: A Reduction with Intermediate Values -- How Does This Work? -- A Slightly More Complicated Example: Line of Sight -- Cook Until Done: parallel_do and parallel_pipeline. , parallel_do: Apply a Body Until There Are No More Items Left -- A Slightly More Complicated Example: Forward Substitution -- parallel_pipeline: Streaming Items Through a Series of Filters -- A Slightly More Complicated Example: Creating 3D Stereoscopic Images -- Summary -- For More Information -- Chapter 3: Flow Graphs -- Why Use Graphs to Express Parallelism? -- The Basics of the TBB Flow Graph Interface -- Step 1: Create the Graph Object -- Step 2: Make the Nodes -- Step 3: Add Edges -- Step 4: Start the Graph -- Step 5: Wait for the Graph to Complete Executing -- A More Complicated Example of a Data Flow Graph -- Implementing the Example as a TBB Flow Graph -- Understanding the Performance of a Data Flow Graph -- The Special Case of Dependency Graphs -- Implementing a Dependency Graph -- Estimating the Scalability of a Dependency Graph -- Advanced Topics in TBB Flow Graphs -- Summary -- Chapter 4: TBB and the Parallel Algorithms of the C++ Standard Template Library -- Does the C++ STL Library Belong in This Book? -- A Parallel STL Execution Policy Analogy -- A Simple Example Using std::for_each -- What Algorithms Are Provided in a Parallel STL Implementation? -- How to Get and Use a Copy of Parallel STL That Uses TBB -- Algorithms in Intel's Parallel STL -- Capturing More Use Cases with Custom Iterators -- Highlighting Some of the Most Useful Algorithms -- std::for_each, std::for_each_n -- std::transform -- std::reduce -- std::transform_reduce -- A Deeper Dive into the Execution Policies -- The sequenced_policy -- The parallel_policy -- The unsequenced_policy -- The parallel_unsequenced_policy -- Which Execution Policy Should We Use? -- Other Ways to Introduce SIMD Parallelism -- Summary -- For More Information -- Chapter 5: Synchronization: Why and How to Avoid It -- A Running Example: Histogram of an Image -- An Unsafe Parallel Implementation. , A First Safe Parallel Implementation: Coarse-Grained Locking -- Mutex Flavors -- A Second Safe Parallel Implementation: Fine-Grained Locking -- A Third Safe Parallel Implementation: Atomics -- A Better Parallel Implementation: Privatization and Reduction -- Thread Local Storage, TLS -- enumerable_thread_specific, ETS -- combinable -- The Easiest Parallel Implementation: Reduction Template -- Recap of Our Options -- Summary -- For More Information -- Chapter 6: Data Structures for Concurrency -- Key Data Structures Basics -- Unordered Associative Containers -- Map vs. Set -- Multiple Values -- Hashing -- Unordered -- Concurrent Containers -- Concurrent Unordered Associative Containers -- concurrent_hash_map -- Concurrent Support for map/multimap and set/multiset Interfaces -- Built-In Locking vs. No Visible Locking -- Iterating Through These Structures Is Asking for Trouble -- Concurrent Queues: Regular, Bounded, and Priority -- Bounding Size -- Priority Ordering -- Staying Thread-Safe: Try to Forget About Top, Size, Empty, Front, Back -- Iterators -- Why to Use This Concurrent Queue: The A-B-A Problem -- When to NOT Use Queues: Think Algorithms! -- Concurrent Vector -- When to Use tbb::concurrent_vector Instead of std::vector -- Elements Never Move -- Concurrent Growth of concurrent_vectors -- Summary -- Chapter 7: Scalable Memory Allocation -- Modern C++ Memory Allocation -- Scalable Memory Allocation: What -- Scalable Memory Allocation: Why -- Avoiding False Sharing with Padding -- Scalable Memory Allocation Alternatives: Which -- Compilation Considerations -- Most Popular Usage (C/C++ Proxy Library): How -- Linux: malloc/new Proxy Library Usage -- macOS: malloc/new Proxy Library Usage -- Windows: malloc/new Proxy Library Usage -- Testing our Proxy Library Usage -- C Functions: Scalable Memory Allocators for C. , C++ Classes: Scalable Memory Allocators for C++ -- Allocators with std::allocator< -- T> -- Signature -- scalable_allocator -- tbb_allocator -- zero_allocator -- cached_aligned_allocator -- Memory Pool Support: memory_pool_allocator -- Array Allocation Support: aligned_space -- Replacing new and delete Selectively -- Performance Tuning: Some Control Knobs -- What Are Huge Pages? -- TBB Support for Huge Pages -- scalable_allocation_mode(int mode, intptr_t value) -- TBBMALLOC_USE_HUGE_PAGES -- TBBMALLOC_SET_SOFT_HEAP_LIMIT -- int scalable_allocation_command(int cmd, void ∗param) -- TBBMALLOC_CLEAN_ALL_BUFFERS -- TBBMALLOC_CLEAN_THREAD_BUFFERS -- Summary -- Chapter 8: Mapping Parallel Patterns to TBB -- Parallel Patterns vs. Parallel Algorithms -- Patterns Categorize Algorithms, Designs, etc. -- Patterns That Work -- Data Parallelism Wins -- Nesting Pattern -- Map Pattern -- Workpile Pattern -- Reduction Patterns (Reduce and Scan) -- Fork-Join Pattern -- Divide-and-Conquer Pattern -- Branch-and-Bound Pattern -- Pipeline Pattern -- Event-Based Coordination Pattern (Reactive Streams) -- Summary -- For More Information -- Part 2 -- Chapter 9: The Pillars of Composability -- What Is Composability? -- Nested Composition -- Concurrent Composition -- Serial Composition -- The Features That Make TBB a Composable Library -- The TBB Thread Pool (the Market) and Task Arenas -- The TBB Task Dispatcher: Work Stealing and More -- Putting It All Together -- Looking Forward -- Controlling the Number of Threads -- Work Isolation -- Task-to-Thread and Thread-to-Core Affinity -- Task Priorities -- Summary -- For More Information -- Chapter 10: Using Tasks to Create Your Own Algorithms -- A Running Example: The Sequence -- The High-Level Approach: parallel_invoke -- The Highest Among the Lower: task_group -- The Low-Level Task Interface: Part One - Task Blocking. , The Low-Level Task Interface: Part Two - Task Continuation -- Bypassing the Scheduler -- The Low-Level Task Interface: Part Three - Task Recycling -- Task Interface Checklist -- One More Thing: FIFO (aka Fire-and-Forget) Tasks -- Putting These Low-Level Features to Work -- Summary -- For More Information -- Chapter 11: Controlling the Number of Threads Used for Execution -- A Brief Recap of the TBB Scheduler Architecture -- Interfaces for Controlling the Number of Threads -- Controlling Thread Count with task_scheduler_init -- Controlling Thread Count with task_arena -- Controlling Thread Count with global_control -- Summary of Concepts and Classes -- The Best Approaches for Setting the Number of Threads -- Using a Single task_scheduler_init Object for a Simple Application -- Using More Than One task_scheduler_init Object in a Simple Application -- Using Multiple Arenas with Different Numbers of Slots to Influence Where TBB Places Its Worker Threads -- Using global_control to Control How Many Threads Are Available to Fill Arena Slots -- Using global_control to Temporarily Restrict the Number of Available Threads -- When NOT to Control the Number of Threads -- Figuring Out What's Gone Wrong -- Summary -- Chapter 12: Using Work Isolation for Correctness and Performance -- Work Isolation for Correctness -- Creating an Isolated Region with  this_task_arena::isolate -- Oh No! Work Isolation Can Cause Its Own Correctness Issues! -- Even When It Is Safe, Work Isolation Is Not Free -- Using Task Arenas for Isolation: A Double-Edged Sword -- Don't Be Tempted to Use task_arenas to Create Work Isolation for Correctness -- Summary -- For More Information -- Chapter 13: Creating Thread-to-Core and Task-to-Thread Affinity -- Creating Thread-to-Core Affinity -- Creating Task-to-Thread Affinity -- When and How Should We Use the TBB Affinity Features? -- Summary. , For More Information.
    Additional Edition: Print version: Voss, Michael Pro TBB Berkeley, CA : Apress L. P.,c2019 ISBN 9781484243978
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Book
    Book
    Indianapolis :Wiley,
    UID:
    almafu_BV035032357
    Format: XXIII, 412 S. ; , 24 cm.
    ISBN: 0-471-45380-3 , 978-0-471-45380-2 , 0-471-25311-1 , 978-0-470-22626-1
    Content: A primer in practical computer security aimed at those shopping, communication, or doing business online. -- almost everyone, in other words. -- P. 4 of cover.
    Note: Hier auch später erschienene, unveränderte Nachdrucke
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Datensicherung ; Rechnernetz ; Kryptologie ; Informationssystem ; Computersicherheit ; Informationssystem ; Datenübertragung ; Datensicherung ; Informationssystem ; Kryptologie ; Rechnernetz ; Computersicherheit
    Author information: Schneier, Bruce 1963-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    München, Wien, Zürich :BLV-Verlagsgesellschaft,
    UID:
    almafu_BV000639857
    Format: 195 Seiten : , Illustrationen, Karten.
    ISBN: 3-405-13256-8
    Content: Documents the deleterious or undesirable effects of dumping, development, etc., on various natural habitats (moors, woods, meadowland). Includes photographs of identical habitats taken 3-50 years apart and analyses the results.
    Note: Literaturverzeichnis Seite 188 - 191
    Language: German
    Subjects: Geography , Biology , General works
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Lebensraum ; Naturschutz ; Landschaftszerstörung ; Landschaftsschutz ; Landschaftsökologie ; Lebensraum ; Gefährdung ; Bildband ; Bildband
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_BV036069141
    Format: 1 Online-Ressource (IX, 214 Seiten) : , Diagramme.
    ISBN: 978-3-318-00578-3
    Series Statement: Bibliotheca Nutritio et dieta No. 55
    Content: It is generally accepted that the basic needs of vitamins are covered by the so-called Recommended Dietary Allowances, which were originally established mainly to prevent deficiencies. However, there is more and more scientific evidence accumulating that several vitamins have additional functions, each requiring a different, but usually higher amount than the one set for the prevention of the respective classical vitamin deficiency. Such additional functions include the radical scavenging effect of various antioxidant vitamins or the role of folate in the prevention of neural tube defects. This publication wants to substantiate the relations between the scientific evidence for selected functions and the respective vitamin intake; moreover, as some of the functions in question require several vitamins due to synergistic interactions, attention will also be paid to this aspect.Special measures could in the future contribute to lower public health costs by helping to decrease the incidence of costly chronic diseases: Guidelines advising a much higher intake of fruits and vegetables have already been established to reduce the risk for certain diseases such as some types of cancer and coronary heart disease.Covering a wide spectrum of topics, this publication will not only be of interest to nutritionists, pathophysiologists and epidemiologists, but also to Public Health authorities and food and vitamin manufacturers
    Note: Exploring new ways to reduce the incidence of chronic diseases
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-8055-7073-2
    Language: English
    Subjects: Agriculture, Forestry, Horticulture, Fishery, Domestic Science , Biology
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Vitamin ; Ernährungsphysiologie ; Krankheit ; Prävention ; Vitamin ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages