IMIST


Affiner votre recherche

Votre recherche a retourné 175 résultats.

Remote sensing digital image analysis : an introduction / par Richards, John A. Publication : [S.l.] : Springer, 2005 . 439 p. ; , Remote Sensing Digital Image Analysis provides the non-specialist with an introduction to quantitative evaluation of satellite and aircraft derived remotely retrieved data. Each chapter covers the pros and cons of digital remotely sensed data, without detailed mathematical treatment of computer based algorithms, but in a manner conductive to an understanding of their capabilities and limitations. Problems conclude each chapter. This fourth edition has been developed to reflect the changes that have occurred in this area over the past several years. Its focus is on those procedures that seem now to have become part of the set of tools regularly used to perform thematic mapping. As with previous revisions, the fundamental material has been preserved in its original form because of its tutorial value; its style has been revised in places and it has been supplemented if newer aspects have emerged in the time since the third edition appeared. It still meets, however, the needs of the senior student and practitioner. 25 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Exactes et Naturelles (1),

Reversing secrets of reverse engineering par Eilam, Eldad. Publication : [S.l.] Wiley 2005 . 624 pages , Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (2),

Security and game theory algorithms, deployed systems, lessons learned par Tambe, Milind Publication : Cambridge | New York Cambridge University Press 2012 . xiv, 319 pages , "Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"-- 24 cm. Date : 2012 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Software configuration management using vesta / par Heydon,, Clark Allan. Publication : [S.l.] : Springer, 2006 . 262 p. ; , This monograph addresses two core problems in developing large software projects: versioning and building. In order to develop and evolve large software code bases, software engineers need to understand the central role of automated, scalable software configuration management (SCM). Using the well-known Vesta system (an open-source SCM system developed at the Digital/Compaq Systems Research Center), the authors meticulously develop, demonstrate, and assess key concepts and methods to manage the evolution of large software systems. This book and the code of the Vesta system allow researchers to develop a deeper understanding of the problems inherent in large-scale software construction practices and techniques for their effective solution. 24 cm. Date : 2006 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Software modeling and design : UML, use cases, patterns, and software architectures / par Gomaa, Hassan. Publication : Cambridge ; | New York : Cambridge University Press, 2011 . xxv, 550 pages : 27 cm Date : 2011 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Statistical inference : the minimum distance approach / par Basu, Ayanendranath. Publication : Boca Raton, FL : CRC Press, 2011 . xix, 409 pages : 25 cm. Date : 2011 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Exactes et Naturelles (1),

Statistical methods in counterterrorism : game theory, modeling, syndromic surveillance, and biometric authentication.   Publication : [S.l.] : Springer, 2006 . 292 p. ; , All the data was out there to warn us of this impending attack, why didn't we see it?" This was a frequently asked question in the weeks and months after the terrorist attacks on the World Trade Center and the Pentagon on September 11, 2001. In the wake of the attacks, statisticians moved quickly to become part of the national response to the global war on terror. This book is an overview of the emerging research program at the intersection of national security and statistical sciences. A wide range of talented researchers address issues in - Syndromic Surveillance---How do we detect and recognize bioterrorist events? - Modeling and Simulation---How do we better understand and explain complex processes so that decision makers can take the best course of action? - Biometric Authentication---How do we pick the terrorist out of the crowd of faces or better match the passport to the traveler? - Game Theory---How do we understand the rules that terrorists are playing by? This book includes technical treatments of statistical issues that will be of use to quantitative researchers as well as more general examinations of quantitative approaches to counterterrorism that will be accessible to decision makers with stronger policy backgrounds. Dr. Alyson G. Wilson is a statistician and the technical lead for DoD programs in the Statistical Sciences Group at Los Alamos National Laboratory. Dr. Gregory D. Wilson is a rhetorician and ethnographer in the Statistical Sciences Group at Los Alamos National Laboratory. Dr. David H. Olwell is chair of the Department of Systems Engineering at the Naval Postgraduate School in Monterey, California. 24 cm. Date : 2006 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Juridiques, Economiques et de Gestion (1),
Strategic software engineering : an interdisciplinary approach / par P,, Deek Fadi. Publication : [S.l.] : Auerbach Publishers Inc., 2005 . 333 p. ; , ReliØ. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Swarm intelligence : introduction and applications.   Publication : [S.l.] : Springer, 2008 . 286 p. ; , The laws that govern the collective behavior of social insects, flocks of birds, or fish schools continue to mesmerize researchers. While individuals are rather unsophisticated, in cooperation they can solve complex tasks, a prime example being the ability of ant colonies to find shortest paths between their nests and food sources. Task-solving results from self-organization, which often evolves from simple means of communication, either directly or indirectly via changing the environment, the latter referred to as stigmergy. Scientists have applied these principles in new approaches, for example to optimization and the control of robots. Characteristics of the resulting systems include robustness and flexibility. This field of research is now referred to as swarm intelligence. The contributing authors are among the top researchers in their domain. The book is intended to provide an overview of swarm intelligence to novices, and to offer researchers in the field an update on interesting recent developments. Introductory chapters deal with the biological foundations, optimization, swarm robotics, and applications in new-generation telecommunication networks, while the second part contains chapters on more specific topics of swarm intelligence research such as the evolution of robot behavior, the use of particle swarms for dynamic optimization, and organic computing. 25 cm. Date : 2008 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),
Tabu search / par Glover,, Fred W. Publication : [S.l.] : Springer, 1998 . 408 p. ; , This book explores the meta-heuristics approach called tabu search , which is dramatically changing our ability to solve a host of problems that stretch over the realms of resource planning, telecommunications, VLSI design, financial analysis, scheduling, space planning, energy distribution, molecular engineering, logistics, pattern classification, flexible manufacturing, waste management, mineral exploration, biomedical analysis, environmental conservation and scores of other problems. The major ideas of tabu search are presented with examples that show their relevance to multiple applications. Numerous illustrations and diagrams are used to clarify principles that deserve emphasis, and that have not always been well understood or applied. The book's goal is to provide `hands-on' knowledge and insight alike, rather than to focus exclusively either on computational recipes or on abstract themes. This book is designed to be useful and accessible to researchers and practitioners in management science, industrial engineering, economics, and computer science. It can appropriately be used as a textbook in a masters course or in a doctoral seminar. Because of its emphasis on presenting ideas through illustrations and diagrams, and on identifying associated practical applications, it can also be used as a supplementary text in upper division undergraduate courses. Finally, there are many more applications of tabu search than can possibly be covered in a single book, and new ones are emerging every day. The book's goal is to provide a grounding in the essential ideas of tabu search that will allow readers to create successful applications of their own. Along with the essential ideas, understanding of advanced issues is provided, enabling researchers to go beyond today's developments and create the methods of tomorrow. 24 cm. Date : 1998 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Juridiques, Economiques et de Gestion (1),

Tutorials in mathematical biosciences I : mathematical neuroscience / par Borisyuk, Alla. Publication : [S.l.] : Springer, 2005 . 170 p. ; , This volume introduces some basic theories on computational neuroscience. Chapter 1 is a brief introduction to neurons, tailored to the subsequent chapters. Chapter 2 is a self-contained introduction to dynamical systems and the bifurcation theory, oriented toward neuronal dynamics. The theory is illustrated with a model of Parkinson's disease. Chapter 3 reviews the theory of coupled neural oscillators observed ghroughout the nervous systems at all levels; it describes how oscillations arise, what pattern they take, and how they depend on excitory of inhibitory synaptic connections. Chapter 4 specializes to one particular neuronal system, namely, the auditory system. It includes a self-contained introduction, from the anatomy and physiology of the inner ear to the neuronal network which connects the hair cells to the cortex, and describes various models of subsystems. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Exactes et Naturelles (1),

Understanding intrusion detection through visualization / par Axelsson, Stefan. Publication : [S.l.] : Springer, 2005 . 145 p. ; , With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents researchïɪħon why false alarms are, and will remain a problem; then appliesïɪħresults from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. Thisïɪħvolume presents four different visualization approaches, mainly applied to data from web server access logs. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Video traces for network performance evaluation : a comprehensive overview and guide on video traces and their utilization in networking research / par Seeling, Patrick. Publication : [S.l.] : Springer, 2006 . 274 p. ; , Multimedia networking, especially the delivery video over the Internet, accounts for a large fraction of todayЀ™s and future computer networks. Working with actual video provides several challenges on different technical and social levels. Video traces - a representation of video data and video quality in textual format - present a different approach to facilitate studies with video traffic. Video Traces for Network Performance Evaluation provides a comprehensive introduction to video traces and their use in networking research. After first providing the basics of digital video and video coding, video traces are introduced, covering the metrics captured in the traces, the trace generation, as well as the statistical characteristics of the video characterized in the traces. Attention is then turned to the use of the video traces in networking research, examining the practical aspects of transporting video over Internet Protocol (IP) networks and the simulation of video transport using traces, including the simulations that incorporate the impact of transmission errors using offset distortion traces. Software tools and utilities that facilitate the use of video traces in network simulations and other video networking related software tools are also presented. 24 cm. Date : 2006 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Wireless sensor networks.   Publication : [S.l.] : Springer, 2006 . 442 p. ; , Wireless Sensor Networks presents a comprehensive and tightly organized compilation of chapters that surveys many of the exciting research developments taking place in this field. Chapters are written by several of the leading researchers exclusively for this book. Authors address many of the key challenges faced in the design, analysis and deployment of wireless sensor networks. Included is coverage of low-cost sensor devices equipped with wireless interfaces, sensor network protocols for large scale sensor networks, data storage and compression techniques, security architectures and mechanisms, and many practical applications that relate to use in environmental, military, medical, industrial and home networks. The book is organized into six parts starting with basic concepts and energy efficient hardware design principles. The second part addresses networking protocols for sensor networks and describes medium access control, routing and transport protocols. In addition to networking, data management is an important challenge given the high volumes of data that are generated by sensor nodes. Part III is on data storage and manipulation in sensor networks, and part IV deals with security protocols and mechanisms for wireless sensor networks. Sensor network localization systems and network management techniques are covered in Part V. The final part focuses on target detection and habitat monitoring applications of sensor networks. This book is intended for researchers starting work in the field and for practitioners seeking a comprehensive overview of the various aspects of building a sensor network. It is also an invaluable reference resource for all wireless network professionals. 24 cm. Date : 2006 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),
WIRELESS COMMUNICATIONS : PRINCIPLES AND PRACTICE / par Rappaport, Theodore S. Publication : [S.l.] : Prentice Hall, 2002 . 736 p. ; , For cellular radio engineers and technicians. The leading book on wireless communications offers a wealth of practical information on the implementation realities of wireless communications. This book also contains up-to-date information on the major wireless communications standards from around the world. Covers every fundamental aspect of wireless communications, from cellular system design to networking, plus world-wide standards, including ETACS, GSM, and PDC. Theodore Rappaport is Series Editor for the Prentice Hall Communication, Engineering, and Emerging Technologies Series. 24 cm. Date : 2002 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Constraint processing / par Dechter, Rina, Publication : San Francisco : Morgan Kaufmann Publishers, 2003 . 1 online resource (xx, 481 pages) : Date : 2003 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Designing security architecture solutions / par Ramachandran, Jay. Publication : New York : John Wiley, 2002 . 1 online resource (xxviii, 452 pages) : , "Wiley Computer Publishing." Date : 2002 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Vous ne trouvez pas ce que vous cherchez ?
© Tous droits résérvés IMIST/CNRST
Angle Av. Allal Al Fassi et Av. des FAR, Hay Ryad, BP 8027, 10102 Rabat, Maroc
Tél:(+212) 05 37.56.98.00
CNRST / IMIST

Propulsé par Koha