Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Computer Science  (43)
Type of Medium
Language
Region
Access
  • 1
    UID:
    b3kat_BV048222697
    Format: 1 Online-Ressource (194 pages)
    ISBN: 9783030401429
    Series Statement: Management for Professionals Ser
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- Introduction to DLT: Build Your Own Blockchain -- Acknowledgements -- Contents -- Blockchain Fundamentals -- 1 Blockchain Foundations -- 1.1 Introduction -- 1.1.1 Terminology -- 1.1.2 The First Use Case -- 1.1.3 Currencies: Traditional and Crypto -- 1.1.4 Ownership -- 1.2 Cryptocurrencies -- 1.2.1 Control Mechanisms -- 1.2.2 Cryptography -- 1.2.3 Cryptographic Hashing -- 1.2.4 Asymmetric Cryptography -- 1.2.5 Digital Signatures -- 1.3 Network Architecture Basics -- 1.4 The Blockchain -- 1.4.1 Operations -- 1.4.2 Blocks -- 1.5 Data Integrity -- 1.5.1 Ledger Propagation -- 1.5.2 Transaction Validation -- 1.5.3 Merkle Trees -- 1.6 Types of Blockchains -- 1.6.1 Public Blockchains -- 1.6.2 Private Blockchains -- 1.6.3 Consortium-Controlled Blockchains -- 1.6.4 Selection Framework -- 1.7 Exercise -- 1.7.1 Introduction -- 1.7.2 Environment Setup -- 1.7.3 Build Your Own Blockchain -- References -- 2 Cryptocurrencies -- 2.1 Introduction -- 2.1.1 Overview -- 2.1.2 Crypto Properties -- 2.1.3 Transactions -- 2.1.4 Double Spending -- 2.2 Miners -- 2.2.1 Process Overview -- 2.2.2 Transaction Confirmation -- 2.2.3 Mining Process -- 2.2.4 The Nonce -- 2.3 Coins and Tokens -- 2.3.1 Introduction -- 2.3.2 Altcoins -- 2.3.3 Tokens -- 2.3.4 ERC-20 Standard -- 2.4 Market Makers/Exchanges -- 2.4.1 Introduction -- 2.4.2 Brokers -- 2.4.3 Traditional Exchanges -- 2.4.4 Decentralized Exchanges -- 2.4.5 Trading Platforms -- 2.4.6 Offline Exchanges -- 2.5 Wallets -- 2.5.1 Introduction -- 2.5.2 Hardware Wallets -- 2.5.3 Software Wallets -- 2.5.4 Exchange Wallets -- 2.6 Exercise -- 2.6.1 Introduction -- 2.6.2 Standard Transfer -- References -- 3 Consensus Mechanisms -- 3.1 Introduction -- 3.1.1 Definition -- 3.1.2 Objectives -- 3.1.3 Variations -- 3.2 The CAP Theorem -- 3.2.1 The Trilemma -- 3.2.2 CAP Theorem and Blockchains -- 3.2.3 CAP Theorem in Practice , 3.3 Byzantine Fault -- 3.3.1 Background -- 3.3.2 Byzantine Generals' Problem -- 3.3.3 An Example -- 3.4 Common Consensus Protocols -- 3.4.1 Proof of Work (PoW) -- 3.4.2 Proof of Stake (PoS) -- 3.4.3 Proof of Capacity/Proof of Space -- 3.4.4 Delegated Proof of Stake (DPoS) -- 3.4.5 Proof of Authority (PoA) -- 3.4.6 Practical Byzantine Fault Tolerance (PBFT) -- 3.4.7 Proof of Elapsed Time (PoET) -- 3.4.8 Other Mechanisms -- 3.5 Exercise -- 3.5.1 Introduction -- 3.5.2 Set up PoA Genesis Block -- 3.5.3 Create a PoA Network -- References -- 4 Smart Contracts -- 4.1 Introduction -- 4.2 Ethereum-An Alternative to Bitcoin -- 4.2.1 Introduction -- 4.2.2 Ethereum Versus Bitcoin Applications -- 4.2.3 Ethereum Approach -- 4.2.4 Gas -- 4.2.5 The Price of Gas -- 4.3 Solidity Programming Language -- 4.3.1 Syntax -- 4.3.2 Coin Toss Example -- 4.4 Oracles -- 4.4.1 Introduction -- 4.4.2 Smart Contract Integration -- 4.4.3 Oracles and Security -- 4.4.4 Types of Oracles -- 4.4.5 Oracle Contract Example -- 4.5 Decentralized Applications (dApps) -- 4.5.1 Introduction -- 4.5.2 dApp Example: The Decentralized Autonomous Organization (DAO) -- 4.6 Turing Completeness -- 4.6.1 Background -- 4.6.2 Turing Completeness and Ethereum -- 4.7 Legal Perspective -- 4.7.1 Smart Contract Interpretation -- 4.7.2 Open Questions -- 4.7.3 Conclusion -- 4.8 Exercise ("Piggy Bank") -- 4.8.1 Introduction -- 4.8.2 Opcode -- 4.8.3 Bytecode -- 4.8.4 Application Binary Interface (ABI) -- 4.8.5 Piggy Bank Deployment -- References -- 5 Privacy and Anonymity -- 5.1 Introduction -- 5.1.1 Anonymity -- 5.1.2 Unlinkability -- 5.1.3 Anonymity Versus Pseudonymity -- 5.1.4 Taint Analysis -- 5.2 De-anonymization -- 5.2.1 Introduction -- 5.2.2 Transaction Graph Analysis -- 5.2.3 Network-Layer De-anonymization -- 5.3 The Onion Router (TOR) Network -- 5.3.1 Background -- 5.3.2 TOR Approach -- 5.3.3 TOR Usage , 5.3.4 Limitations -- 5.4 Mixing Models -- 5.5 Decentralized Mixing -- 5.5.1 Motivation -- 5.5.2 Coinjoin Model -- 5.5.3 Coinjoin Anonymity -- 5.6 Zero-Knowledge Proofs -- 5.6.1 Introduction -- 5.7 Privacy and Security Protocols -- 5.7.1 Introduction -- 5.8 Privacy Coins -- 5.8.1 Introduction -- 5.8.2 The Zero Currencies -- 5.8.3 Zerocoin -- 5.8.4 Zerocash -- 5.9 Exercise -- 5.9.1 Introduction -- References -- Cryptography Foundations -- 6 Blockchain Cryptography: Part 1 -- 6.1 Introduction -- 6.1.1 Cryptography Fundamentals -- 6.1.2 Secrecy Prerequisites -- 6.1.3 Blockchain and Cryptography -- 6.2 Classic Ciphers -- 6.2.1 Substitution -- 6.2.2 Transposition -- 6.3 Modern Cryptographic Algorithms -- 6.3.1 Introduction -- 6.3.2 Vulnerabilities -- 6.4 Hashing -- 6.4.1 Introduction -- 6.4.2 Hash Collisions -- 6.4.3 Merkle-Damgård Construction -- 6.4.4 Length Extension Attack -- 6.5 Secure Hash Algorithm (SHA) -- 6.5.1 Introduction -- 6.5.2 Hash Example -- 6.6 Symmetric Encryption -- 6.6.1 Single Encryption Keys -- 6.6.2 The Hill Cipher -- 6.6.3 The Pohlig-Hellman Cipher -- 6.7 Exercise -- 6.7.1 Introduction -- 6.7.2 Message Prep -- 6.7.3 OpenSSL Setup -- 6.7.4 Message Encryption -- 6.7.5 Message Decryption -- References -- 7 Blockchain Cryptography: Part 2 -- 7.1 Asymmetric Key Schemes -- 7.1.1 Introduction -- 7.1.2 Illustrative Example -- 7.2 Diffie-Hellman-Merkle Key Agreement -- 7.2.1 Introduction -- 7.2.2 An Example -- 7.2.3 Limitations -- 7.3 Rivest, Shamir, and Adelman (RSA) -- 7.3.1 Introduction -- 7.3.2 Key Pairs -- 7.3.3 Intuition -- 7.3.4 An Example -- 7.4 Digital Signatures -- 7.4.1 Introduction -- 7.4.2 Motivation -- 7.4.3 Usage -- 7.4.4 Signatures -- 7.4.5 An Example -- 7.5 Quantum Resistance -- 7.5.1 Introduction -- 7.5.2 Mechanism -- 7.5.3 Shor's Algorithm -- 7.5.4 Grover's Algorithm -- 7.5.5 Imminence -- 7.5.6 Security Considerations , 7.5.7 Quantum Resistance -- 7.6 Exercise -- 7.6.1 Introduction -- 7.6.2 Message Prep -- 7.6.3 Key Generation (RSA) -- 7.6.4 Digital Signatures (RSA) -- 7.6.5 Key Generation (Elliptic Curves) -- 7.6.6 Digital Signatures (Elliptic Curves) -- References -- Real-World Applications -- 8 Blockchain in Action: Real-World Applications -- 8.1 Introduction -- 8.2 Currencies -- 8.3 Cross-Border Transfers -- 8.4 Tokenization -- 8.5 Asset Tracking -- 8.6 Commodity Trading -- 8.7 Looking Ahead -- 8.7.1 Humble Beginnings -- 8.7.2 A Word of Caution -- 8.7.3 The Jury Is Still Out -- References -- Index
    Additional Edition: Erscheint auch als Druck-Ausgabe Hellwig, Daniel Build Your Own Blockchain Cham : Springer International Publishing AG,c2020 ISBN 9783030401412
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV041932873
    Format: 260 S. , Ill., graph. Darst.
    ISBN: 9783645603423 , 3645603425
    Series Statement: Fruit up your fantasy
    Note: Zusätzliches Online-Angebot unter www.buch.cd
    Language: German
    Subjects: Computer Science , Engineering
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Raspberry Pi ; Sensortechnik ; Schnittstelle ; Ansteuerung ; Messschaltung ; Schaltplan ; Programmierung ; Physical Computing
    Author information: Engelhardt, Erich F. 1975-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Berlin : Konrad-Zuse-Zentrum für Informationstechnik
    UID:
    b3kat_BV019675804
    Format: 17 S. , graph. Darst.
    Series Statement: ZIB-Report / Konrad-Zuse-Zentrum für Informationstechnik Berlin 2004,46
    Content: Abstract: "Operative planning in gas distribution networks leads to large-scale mixed-integer optimization problems involving a hyperbolic PDE defined on a graph. We consider the NLP obtained under prescribed combinatorial decisions -- or as relaxation in a branch and bound framework, addressing in particular the KKT systems arising in primal-dual interior methods. We propose a custom solution algorithm using sparse local projections, based on the KKT systems' structural properties induced by the discretized gas flow equations in combination with the underlying network topology. The numerical efficiency and accuracy of the algorithm are investigated, and detailed computational comparisons with a control space method and with the multifrontal solver MA27 are provided."
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Forschungsbericht
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV043690489
    Format: 256 Seiten , Illustrationen , 24 cm
    Edition: 2., aktualisierte und erweiterte Auflage
    ISBN: 9783645604901
    Series Statement: Fruit up your fantasy
    Note: Auf dem Umschlag: "Raspberry Pi 3"
    Language: German
    Subjects: Computer Science , Engineering
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Raspberry Pi ; Sensortechnik ; Schnittstelle ; Ansteuerung ; Messschaltung ; Schaltplan ; Programmierung ; Physical Computing
    Author information: Engelhardt, Erich F. 1975-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg
    UID:
    b3kat_BV041889675
    Format: 1 Online-Ressource
    ISBN: 9783642001932
    Series Statement: Studies in Computational Intelligence 190
    Note: The authors have consolidated their research work in this volume titled Soft Computing for Data Mining Applications. The monograph gives an insight into the research in the fields of Data Mining in combination with Soft Computing methodologies. In these days, the data continues to grow exponentially. Much of the data is implicitly or explicitly imprecise. Database discovery seeks to discover noteworthy, unrecognized associations between the data items in the existing database. The potential of discovery comes from the realization that alternate contexts may reveal additional valuable information. The rate at which the data is stored is growing at a phenomenal rate. As a result, traditional ad hoc mixtures of statistical techniques and data management tools are no longer adequate for analyzing this vast collection of data. Several domains where large volumes of data are stored in centralized or distributed databases includes applications like in electronic commerce, bioinformatics, computer security, Web intelligence, intelligent learning database systems, finance, marketing, healthcare, telecommunications, and other fields. With the importance of soft computing applied in data mining applications in recent years, this monograph gives a valuable research directions in the field of specialization. As the authors are well known writers in the field of Computer Science and Engineering, the book presents state of the art technology in data mining. The book is very useful to researchers in the field of data mining. - N R Shetty, President, ISTE, India , Self Adaptive Genetic Algorithms -- Characteristic Amplification Based Genetic Algorithms -- Dynamic Association Rule Mining Using Genetic Algorithms -- Evolutionary Approach for XML Data Mining -- Soft Computing Based CBIR System -- Fuzzy Based Neuro - Genetic Algorithm for Stock Market Prediction -- Data Mining Based Query Processing Using Rough Sets and GAs -- Hashing the Web for Better Reorganization -- Algorithms for Web Personalization -- Classifying Clustered Webpages for Effective Personalization -- Mining Top - k Ranked Webpages Using SA and GA -- A Semantic Approach for Mining Biological Databases -- Probabilistic Approach for DNA Compression -- Non-repetitive DNA Compression Using Memoization -- Exploring Structurally Similar Protein Sequence Motifs -- Matching Techniques in Genomic Sequences for Motif Searching -- Merge Based Genetic Algorithm for Motif Discovery
    Additional Edition: Erscheint auch als Druckausgabe ISBN 978-3-642-00192-5
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Data Mining ; Soft Computing ; Data Mining ; Genetischer Algorithmus ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book
    Book
    Boca Raton ; London ; New York : CRC Press, Taylor & Francis Group
    UID:
    b3kat_BV043685537
    Format: XXX, 176 Seiten , Illustrationen
    ISBN: 9781498726610
    Language: English
    Subjects: Computer Science , Engineering
    RVK:
    RVK:
    RVK:
    Keywords: Gasturbine ; Neuronales Netz
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Book
    Book
    Beijing ; Boston ; Farnham ; Sebastopol ; Tokyo : O'Reilly
    UID:
    b3kat_BV043507270
    Format: xxi, 430 Seiten , Illustrationen, Diagramme, Karten
    Edition: First edition
    ISBN: 9781491940464
    Language: English
    Subjects: Computer Science
    RVK:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV042514125
    Format: 220 S. , zahlr. Ill., graph. Darst.
    ISBN: 3645603441 , 9783645603447
    Series Statement: Fruit up your fantasy
    Additional Edition: Erscheint auch als Online-Ausgabe, EPUB ISBN 978-3-645-22316-4
    Additional Edition: Erscheint auch als Online-Ausgabe, PDF ISBN 978-3-645-20344-9
    Language: German
    Subjects: Computer Science , Engineering
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Arduino Micro ; Physical Computing ; Sensortechnik ; Hobbyelektronik ; Arduino 1.0 ; Sensortechnik ; Arduino-Plattform ; Sensortechnik ; Sensortechnik ; Messschaltung ; Schaltplan ; Messwertverarbeitung ; Arduino-Plattform
    Author information: Schlenker, Mattias
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV041452007
    Format: 1 Online-Ressource (VIII, 203 S.) , Ill., graph. Darst.
    ISBN: 9783642412950 , 9783642412967
    Series Statement: Lecture notes in computer science 7586
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Serviceorientierte Architektur ; Drahtloses Sensorsystem ; Internet ; Messung ; Testbed ; Monitoring ; Leistungsbewertung ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_595124828
    Format: Online-Ressource (X, 400 S.)
    Edition: Online-Ausg. Berlin [u.a.] Springer 2006 Springer lecture notes archive
    ISBN: 9783540489795
    Series Statement: Lecture notes in computer science 861
    Content: AI approaches towards sensor-based driver support in road vehicles -- Representing concurrent actions and solving conflicts -- Preselection strategies for case based classification -- Utilizing spatial relations for natural language access to an autonomous mobile robot -- Cardinality restrictions on concepts -- An artificial neural network for high precision eye movement tracking -- A Kripke-Kleene logic over general logic programs -- The stable semantics and its variants: A comparison of recent approaches -- TabVer a case study in table verbalization -- Cooperating to be noncooperative: The dialog system PRACMA -- Robust constructive induction -- Enriching a semantic network language by integrating qualitative reasoning techniques -- Combining spatial and terminological reasoning -- Detecting gestalts in CAD-plans to be used as indices for case-retrieval in architecture -- The NeuDB-system: Towards the integration of neural networks and database systems -- Weighted defaults in description logics: Formal properties and proof theory -- Epistemic queries in Classic -- Communicating rational agents -- Knowledge-level modularization of a complex knowledge base -- Program verification techniques as a tool for reasoning about action and change -- A conditional logic for updating in the possible models approach -- Probabilistic justification of default reasoning -- A prioritized Contextual Default Logic: Curing anomalous extensions with a simple abnormality default theory -- Incorporating specificity into circumscriptive theories -- Coherent choice and epistemic entrenchment (preliminary report) -- A note on tableaux of logic of paradox -- When nonmonotonicity comes from distances -- Rigid unification by completion and rigid paramodulation -- Unification in a sorted ?-calculus with term declarations and function sorts -- Goal oriented equational theorem proving using team work -- The hardest random SAT problems -- Formal methods for automated program improvement -- Adapting methods to novel tasks in proof planning -- Using charts for transfer in MT -- A new frame for common-sense reasoning — Towards local inconsistencies -- Prioritized transitions for updates -- An optimal bidirectional search algorithm -- Learning to discriminate phases in gas-liquid flow -- Strategies for semantical contractions -- Conflicts in the spatial interaction of autonomous agents -- Using rough sets theory to predict German word stress -- Graphtheoretical algorithms and knowledge-based design -- Interval situation calculus.
    Content: This volume presents the proceedings of the 18th German Annual Conference on Artificial Intelligence (KI-94), held in Saarbrücken in September 1994. Besides the invited paper "AI approaches towards sensor-based support in road vehicles" by H.-H. Nagel, the book contains 33 full research papers and 12 poster presentations selected from a total of 98 contributions, half of them originating from outside Germany. The papers cover all relevant aspects of AI with a certain focus on knowledge representation and logical foundations of AI; further topics covered are neural network applications, logic programming, natural language, machine learning, and reasoning.
    Note: Literaturangaben
    Additional Edition: ISBN 3540584676
    Additional Edition: ISBN 9783540584674
    Additional Edition: Druckausg. Advances in artificial intelligence Berlin : Springer, 1994 ISBN 3540584676
    Additional Edition: ISBN 0387584676
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Künstliche Intelligenz ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages