Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Online-Ressource
    Online-Ressource
    Waltham, [Massachusetts] :Morgan Kaufmann,
    UID:
    almafu_9960074166202883
    Umfang: 1 online resource (383 p.)
    Ausgabe: 1st edition
    ISBN: 9780124158696 , 0124158692
    Inhalt: Knowledge-based Configuration incorporates knowledge representation formalisms to capture complex product models and reasoning methods to provide intelligent interactive behavior with the user. This book represents the first time that corporate and academic worlds collaborate integrating research and commercial benefits of knowledge-based configuration. Foundational interdisciplinary material is provided for composing models from increasingly complex products and services. Case studies, the latest research, and graphical knowledge representations that increase understanding of knowle
    Anmerkung: Description based upon print version of record. , Half Title; Title Page; Copyright; Contents; Acknowledgments; About the Editors ; List of Contributors ; Foreword ; Part 1: Introduction; 1 Motivation for the Book; 1.1 What Is Configuration?; 1.2 Why Use Configuration Technologies?; 1.3 Why Read This Book?; References; 2 A Short History of Configuration Technologies; 2.1 Rule-based Configurators; 2.2 Early Model-based Configurators; 2.3 Mainstream Configuration Environments; 2.4 Mass Customization Toolkits; 2.5 Conclusion; References; 3 Configuration-Related Topics; 3.1 Design; 3.2 Planning; 3.3 Recommender Systems , 3.4 Software Configuration and Version Management3.5 Product Data Management; 3.6 Conclusion; References; 4 Benefits of Configuration Systems; 4.1 Introduction; 4.2 Challenges and Benefits; 4.3 Conclusion; References; 5 Overview of the Book; Part 2: Basics; 6 Configuration Knowledge Representation and Reasoning; 6.1 Introduction; 6.2 Constraint-Based Knowledge Representation; 6.2.1 Static Constraint Satisfaction; Constraint Satisfaction Problem and Solution; Configuration Task and Solution; Example: Map Configuration (Map Coloring); Example: Mobile Phone Configuration , Solution Search in Static CSPsExcursus: SAT Problems; 6.2.2 Advanced CSP Approaches; Dynamic Constraint Satisfaction; Generative Constraint Satisfaction; Solution Search in Advanced CSPs; 6.3 Graphical Knowledge Representation; 6.3.1 Feature Models; Mobile Phone Feature Model: Structure; Mobile Phone Feature Model: Constraints; Mobile Phone Configuration (Solution); Semantics of Feature Models; 6.3.2 UML Configuration Models; Computer Configuration Model in UML: Structure; Computer Configuration Model in UML: Constraints; Computer Configuration (Solution) , 6.4 Logic-Based Knowledge Representation6.4.1 First Order Logic (FOL); Configuration Task and Solution; Semantics of UML Configuration Models; Computer Configuration (Solution) in FOL; 6.4.2 Logic-Based Configuration; Answer Set Programming; Description Logics; Hybrid Configuration; 6.5 Comparison of Knowledge Representations; 6.5.1 Evaluation Criteria; 6.5.2 Comparison of Knowledge Representations; 6.6 Conclusion; Acknowledgments; References; 7 Conflict Detection and Diagnosis in Configuration; 7.1 Introduction; 7.2 Example; 7.3 Determining Minimal Conflict Sets , 7.3.1 Simple Conflict Detection7.3.2 QuickXPlain; 7.3.3 Runtime Performance of Conflict Detection Algorithms; 7.4 Determining Minimal Diagnoses; 7.4.1 Hitting Set Directed Acyclic Graph (HSDAG); 7.4.2 FastDiag; 7.4.3 Further Approaches; 7.5 Conclusion; Acknowledgments; References; 8 User Interfaces for Configuration Environments; 8.1 Introduction; 8.2 Design Principles for Configurator User Interfaces; 8.3 Technological Issues; 8.4 Usability Issues in Configurator User Interface Development; 8.5 Conclusion; Acknowledgments; References; 9 Core Capabilities of Sustainable Mass Customization , 9.1 Introduction , English
    Weitere Ausg.: ISBN 9780124158177
    Weitere Ausg.: ISBN 012415817X
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Buch
    Buch
    Amsterdam [u.a.] :Morgan Kaufmann,
    UID:
    almahu_BV042031313
    Umfang: XXIII, 357 S. : , Ill., graph. Darst.
    ISBN: 978-0-12-415817-7
    Anmerkung: Includes bibliographical references and index
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Aufsatzsammlung
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    gbv_1008661708
    Umfang: 1 Online-Ressource (xv, 65 pages)
    ISBN: 9780833085412 , 0833085417 , 9780833085740 , 0833085743 , 9780833087119 , 012415817X , 0833087118 , 9780124158177
    Inhalt: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)
    Inhalt: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)
    Anmerkung: "RR-610-JNI."--Page 4 of cover , "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Title page verso , Includes bibliographical references (pages 53-65)
    Weitere Ausg.: ISBN 0833087118
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Ablon, Lillian Markets for cybercrime tools and stolen data Santa Monica, CA : RAND Corporation, [2014]
    Sprache: Englisch
    Schlagwort(e): Electronic books
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9780124158153?
Meinten Sie 9780124158207?
Meinten Sie 9780124158467?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz