Angebote zu "Second-Level-Domains" (109 Treffer)

Kategorien

Shops

Modern X86 Assembly Language Programming
28,99 € *
ggf. zzgl. Versand

Gain the fundamentals of x86 64-bit assembly language programming and focus onthe updated aspects of the x86 instruction set that are most relevant to applicationsoftware development. This book covers topics including x86 64-bit programming andAdvanced Vector Extensions (AVX) programming.The focus in this second edition is exclusively on 64-bit base programming architectureand AVX programming. Modern X86 Assembly Language Programming's structure andsample code are designed to help you quickly understand x86 assembly languageprogramming and the computational capabilities of the x86 platform. After readingand using this book, you'll be able to code performance-enhancing functions andalgorithms using x86 64-bit assembly language and the AVX, AVX2 and AVX-512instruction set extensions.What You Will LearnDiscover details of the x86 64-bit platform including its core architecture, data types,registers, memory addressing modes, and the basic instruction setUse the x86 64-bit instruction set to create performance-enhancing functions thatare callable from a high-level language (C++)Employ x86 64-bit assembly language to efficiently manipulate common data typesand programming constructs including integers, text strings, arrays, and structuresUse the AVX instruction set to perform scalar floating-point arithmeticExploit the AVX, AVX2, and AVX-512 instruction sets to significantly accelerate theperformance of computationally-intense algorithms in problem domains such asimage processing, computer graphics, mathematics, and statisticsApply various coding strategies and techniques to optimally exploit the x86 64-bit,AVX, AVX2, and AVX-512 instruction sets for maximum possible performanceWho This Book Is For Software developers who want to learn how to write code using x86 64-bit assembly language. It's also ideal for software developers who already have a basic understanding of x86 32-bit or 64-bit assembly language programming and are interested in learning how to exploit the SIMD capabilities of AVX, AVX2 and AVX-512.

Anbieter: buecher
Stand: 26.10.2020
Zum Angebot
Modern X86 Assembly Language Programming
28,99 € *
ggf. zzgl. Versand

Gain the fundamentals of x86 64-bit assembly language programming and focus onthe updated aspects of the x86 instruction set that are most relevant to applicationsoftware development. This book covers topics including x86 64-bit programming andAdvanced Vector Extensions (AVX) programming.The focus in this second edition is exclusively on 64-bit base programming architectureand AVX programming. Modern X86 Assembly Language Programming's structure andsample code are designed to help you quickly understand x86 assembly languageprogramming and the computational capabilities of the x86 platform. After readingand using this book, you'll be able to code performance-enhancing functions andalgorithms using x86 64-bit assembly language and the AVX, AVX2 and AVX-512instruction set extensions.What You Will LearnDiscover details of the x86 64-bit platform including its core architecture, data types,registers, memory addressing modes, and the basic instruction setUse the x86 64-bit instruction set to create performance-enhancing functions thatare callable from a high-level language (C++)Employ x86 64-bit assembly language to efficiently manipulate common data typesand programming constructs including integers, text strings, arrays, and structuresUse the AVX instruction set to perform scalar floating-point arithmeticExploit the AVX, AVX2, and AVX-512 instruction sets to significantly accelerate theperformance of computationally-intense algorithms in problem domains such asimage processing, computer graphics, mathematics, and statisticsApply various coding strategies and techniques to optimally exploit the x86 64-bit,AVX, AVX2, and AVX-512 instruction sets for maximum possible performanceWho This Book Is For Software developers who want to learn how to write code using x86 64-bit assembly language. It's also ideal for software developers who already have a basic understanding of x86 32-bit or 64-bit assembly language programming and are interested in learning how to exploit the SIMD capabilities of AVX, AVX2 and AVX-512.

Anbieter: buecher
Stand: 26.10.2020
Zum Angebot
Applied Physics of External Radiation Exposure
138,49 € *
ggf. zzgl. Versand

This book describes the interaction of living matter with photons, neutrons, charged particles, electrons and ions. The authors are specialists in the field of radiation protection. The book synthesizes many years of experiments with external radiation exposure in the fields of dosimetry and radiation shielding in medical, industrial and research fields. It presents the basic physical concepts including dosimetry and offers a number of tools to be used by students, engineers and technicians to assess the radiological risk and the means to avoid them by calculating the appropriate shields. The theory of radiation interaction in matter is presented together with empirical formulas and abacus. Numerous numerical applications are treated to illustrate the different topics. The state of the art in radiation protection and dosimetry is presented in detail, especially in the field of simulation codes for external exposure to radiation, medical projects and advanced research. Moreover, important data spread in different up to date references are presented in this book. The book deals also with accelerators, X-rays facilities, sealed sources, dosimetry, Monte Carlo simulation and radiation regulation. Each chapter is split in two parts depending on the level of details the readers want to focus on. The first part, accessible to a large public, provides a lot of simple examples to help understanding the physics concepts under radiation external exposure. The second part, called "Additional Information" is not mandatory; it aims on explaining topics more deeply, often using mathematical formulations. The book treats fundamental radiometric and dosimetric quantities to describe the interaction in materials under the aspects of absorbed dose processes in tissues. Definitions and applications on limited and operational radiation protection quantities are given. An important aspect are practical engineering tools in industrial, medical and research domains. Source characterization and shielding design are addressed. Also more "exotic" topics, such as ultra intense laser and new generation accelerators, are treated. The state of the art is presented to help the reader to work with the book in a self-consistent way. The basic knowledge necessary to apply Monte Carlo methods in the field of radiation protection and dosimetry for external radiation exposure is provided. Coverage of topics such as variance reduction, pseudo-random number generation and statistic estimators make the book useful even to experienced Monte Carlo practitioners. Solved problems help the reader to understand the Monte Carlo process. The book is meant to be used by researchers, engineers and medical physicist. It is also valuable to technicians and students.

Anbieter: buecher
Stand: 26.10.2020
Zum Angebot
Applied Physics of External Radiation Exposure
138,49 € *
ggf. zzgl. Versand

This book describes the interaction of living matter with photons, neutrons, charged particles, electrons and ions. The authors are specialists in the field of radiation protection. The book synthesizes many years of experiments with external radiation exposure in the fields of dosimetry and radiation shielding in medical, industrial and research fields. It presents the basic physical concepts including dosimetry and offers a number of tools to be used by students, engineers and technicians to assess the radiological risk and the means to avoid them by calculating the appropriate shields. The theory of radiation interaction in matter is presented together with empirical formulas and abacus. Numerous numerical applications are treated to illustrate the different topics. The state of the art in radiation protection and dosimetry is presented in detail, especially in the field of simulation codes for external exposure to radiation, medical projects and advanced research. Moreover, important data spread in different up to date references are presented in this book. The book deals also with accelerators, X-rays facilities, sealed sources, dosimetry, Monte Carlo simulation and radiation regulation. Each chapter is split in two parts depending on the level of details the readers want to focus on. The first part, accessible to a large public, provides a lot of simple examples to help understanding the physics concepts under radiation external exposure. The second part, called "Additional Information" is not mandatory; it aims on explaining topics more deeply, often using mathematical formulations. The book treats fundamental radiometric and dosimetric quantities to describe the interaction in materials under the aspects of absorbed dose processes in tissues. Definitions and applications on limited and operational radiation protection quantities are given. An important aspect are practical engineering tools in industrial, medical and research domains. Source characterization and shielding design are addressed. Also more "exotic" topics, such as ultra intense laser and new generation accelerators, are treated. The state of the art is presented to help the reader to work with the book in a self-consistent way. The basic knowledge necessary to apply Monte Carlo methods in the field of radiation protection and dosimetry for external radiation exposure is provided. Coverage of topics such as variance reduction, pseudo-random number generation and statistic estimators make the book useful even to experienced Monte Carlo practitioners. Solved problems help the reader to understand the Monte Carlo process. The book is meant to be used by researchers, engineers and medical physicist. It is also valuable to technicians and students.

Anbieter: buecher
Stand: 26.10.2020
Zum Angebot
Second-Level-Domains aus kennzeichenrechtlicher...
71,95 € *
ggf. zzgl. Versand

Die Arbeit erörtert die kennzeichenrechtlichen Fragestellungen im Zusammenhang mit Second-Level-Domains im Internet. Hierbei werden neue Entwicklungen, Tendenzen und Probleme aufgegriffen, um auf der Grundlage des geltenden Rechts Lösungsansätze zu entwickeln. Im Mittelpunkt steht der Schutz des Kennzeichens gegen die Benutzung als Second-Level-Domain im Internet. Hierzu wird zunächst untersucht, unter welchen Voraussetzungen deutsches Recht überhaupt anwendbar ist. Anschließend wird die Anwendbarkeit der in Betracht kommenden Schutztatbestände auf die Problematik der Domain-Namen hin untersucht. Weiter wird die Streitfrage, welche Ware bzw. Dienstleistung zur Bestimmung der Verwechslungsgefahr maßgeblich ist, erörtert. Im Übrigen wird ermittelt, unter welchen Bedingungen eine Einschränkung des Grundsatzes der zeitlichen Priorität nach6 MarkenG geboten ist. Bei dem Sonderproblem des Domain-Grabbing wird die besondere Bedeutung des12 BGB für diese Fallkonstellation herausgestellt. Sodann werden die Besonderheiten aufgezeigt, die sich bei dem Schutz des Gemeindenamens gegen die Benutzung als Second-Level-Domain ergeben. Ferner werden die Schutzmöglichkeiten des bekannten und des berühmten Kennzeichens gegen die Benutzung als Second-Level-Domain diskutiert. Schließlich wird noch der Frage nachgegangen, ob auch dem Domain-Namen selbst kennzeichenrechtlicher Schutz zugute kommen kann.

Anbieter: Dodax
Stand: 26.10.2020
Zum Angebot
Security for Pervasive Healthcare
45,80 € *
ggf. zzgl. Versand

Miniaturization of medical appliances and wireless communication enable the pervasive health monitoring of users in their daily life thus improving users’ health and well-being, helping for quick reaction on emergencies, and yet, allowing for cost reduction in the healthcare sector. In the simplest healthcare setting, a fixed set of wireless medical sensors forms a patient area network (PAN) monitoring the user’s vital signs. Medical staff can access, gather, or process data directly, or transmit it to a remote healthcare service. Pervasive health monitoring in these diverse situations and locations is carried out by different organizations, such as fitness centers or retirement homes, by means of a medical sensor network (MSN) allowing authorized parties to access to the sensed health information.In this context, the exchange of users’ medical data leads to severe privacy and security concerns. Meeting these strict security needs of these ubiquitous medical applications is a big challenge, since privacy of medical data has to be guaranteed all the way from the resource-constrained sensor nodes to the backend services, the system has to fulfill latency needs, and lots of mobility is involved. In fact, ensuring the smooth but secure interaction of the different system parts is one of the most testing tasks.This thesis addresses the challenge of deploying secure medical sensor networks, and to this end we propose algorithms, protocols, and systems that pursue three main goals. The first being the described solutions enabling the efficient deployment of security systems – bearing in mind that the underlying interactions and the expected system operation is fundamental for the successful system deployment. Secondly, the individual mechanisms and the overall architecture should provide a comprehensive solution for key and entity management, access control, and privacy-aware identification. These are the key challenges in the analyzed scenarios due to the pervasive nature of the system wherein a multitude of parties interact with each other. Finally, security methods and cryptographic algorithms should be lightweight to allow for efficient system deployment and operation on resource-constrained devices.Overall, this work proposes a security architecture that is comprised of three security layers, namely MSN, PAN, and backend security layers. In our architecture, the MSN and PAN security layers reflect the trend towards a patient-centric approach wherein both user and health institutions share responsibility on the control of the health information. The MSN security layer is in charge of providing the basic link-security within each MSN. The PAN layer creates a security domain around the user’s PAN giving him control on the disclosure of his health information. The backend security layer ensures smooth interaction between the MSN and PAN layers.The proposed security architecture is articulated and supported by the results in four complementary research areas. The first one refers to lightweight key establishment and information verification algorithms used at the MSN layer. With this we investigate and specify how the wireless medical sensors can agree on pairwise keys and verify information in an efficient way based on polynomial schemes in the scope of an MSN. We propose several optimizations for key establishment algorithms and introduce the concept of lightweight digital certificates that allows for distributed information verification without the need of public-key cryptography.Second, we examine how the polynomial keying material can be distributed and arranged at the MSN security layer to achieve a higher resiliency level, to reduce system requirements, and to provide other security functionalities. We also show how the proposed hierarchical and multidimensional systems – tailored to fit the underlying organization of health institutions – allow for efficient deployment. A resourceful approach for key establishment is not usable if it cannot be deployed and managed, hence, we describe two key distribution and management systems for the polynomial keying material fitting the specific system deployment and operational requirements. The first system, which applies to infrastructureless systems, relies on a lightweight but resilient device, a smart card, playing the role of trust center. The second one makes use of backend services to control and manage more complex systems comprised of a multitude of networks.Third, we introduce several lightweight security mechanisms running at the PAN security layer. We describe the system interactions between both the MSN and PAN layers based on dedicated-hardware including the formation and management of the PAN security domain within the MSN security domain. The main goal of this piece of hardware, the patient security manager star – that consists of a healthcare card linked to each user and a patient security manager managed by the MSN – is to allow for PAN roaming between MSNs while guaranteeing end-to-end security. Additionally, this layer provides user privacy-aware identification for roaming users based on a hierarchy of identifiers and context-aware access control depending, e.g., on the user’s health state.The fourth addressed research topic is denominated cooperative security, an approach that aims at leveraging system security by enforcing cooperation among the nodes in an MSN, converting PANs in authentic distributed security domains that are able to manage their trust relationships, and allowing for fast and distributed revocation when nodes misbehave thus enhancing the system security.After successfully analyzing, prototyping, and testing the key components in both the MSN and the PAN layers, we have shown that our comprehensive security architecture and its components can play a fundamental role in the efficient and progressive rollout of secure pervasive healthcare systems. Further research lines emerge from this work. The first one refers to the additional refinements and extensions of the overall security architecture as well as a closer analysis of the interactions between PAN and MSN in specific use cases. The second one refers to the design of identity-based pairwise key generation engines based on non-linear keying material structures that can allow any pair of peers to generate a common symmetric-key given their identifiers but without suffering from the alpha-secure property inherent to the polynomial schemes. Such schemes might become more and more important for future pervasive systems comprising thousands or millions of devices. The third one involves further extensions for cooperative security protocols to convert large-scale distributed systems into living networks capable of autonomously controlling their own security system and removing infected nodes.

Anbieter: Dodax
Stand: 26.10.2020
Zum Angebot
Development Process for Distributed Automation ...
45,80 € *
ggf. zzgl. Versand

In this dissertation, two requirements on DASs are investigated: (1) flexibility and re-configurability of the control strategy and (2) a comprehensible development process. Three basic approaches are proposed regarding the first requirement. First, an Operation Modes (OMs) guideline is proposed to define different control scenarios for distinctive operations. Second, the concept of Functionality based Control (FBC) is proposed to improve reusability of the functional software components (i.e. model and source code). Third, the Scheduler-Selector-Synchronizer (S³) architecture is proposed to combine OMs and FBC based on scheduling management. For the second requirement, a development process model for DAS is provided integrating the three proposed approaches in different development phases. The development process considers three work domains, i.e. problem, solution and realization. The guideline of each domain is kept as simple as possible, leading to a better understanding in its adoption. Furthermore, an unambiguous mapping from user requirements into system requirements using relation theory is proposed. UML is used for high-level modeling and IEC 61499 is applied in low-level design and for the implementation in the automation plant.The practical application of the presented approach is illustrated with the automation process of a Festo didactic Modular Production System (MPS).

Anbieter: Dodax
Stand: 26.10.2020
Zum Angebot
Domain-Namen: ein Spiegel deutscher Sprache?
32,95 € *
ggf. zzgl. Versand

Die Bildung von Domain-Namen wird von zahlreichen Faktoren beeinflusst. Neben Marketing- und Werbeaspekten spielen auch das soziale und kulturelle Umfeld sowie persönliche Erfahrungen und aktuelle Trends eine Rolle. Im Buch werden alle bei der DENIC e.G. registrierten Domain-Namen unter der ccTLD (country code Top Level Domain) .de im Zeitraum von 2000 - 2006 analysiert. Ziel war es gewesen, eine statistische Basis zu schaffen, um eine Aussage darüber treffen zu können, ob Domain-Namen ein Spiegelbild der deutschen Sprache darstellen können. Analysiert wurden u.a. die Entwicklung der Anzahl der verwendeten Zeichen, der Bindestriche, der Zahlen, von Sonderzeichen, einzelner Buchstaben in SLD (Second Level Domains) und der Vergleich mit den Häufigkeitsgebirgen von SLD unter den gTLD (generische Top Level Domains) .net und .com.

Anbieter: Dodax
Stand: 26.10.2020
Zum Angebot
Domain Name
49,00 € *
ggf. zzgl. Versand

A domain name is an identification label that defines a realm of administrative autonomy, authority, or control in the Internet, based on the Domain Name System (DNS). Domain names are used in various networking contexts and application-specific naming and addressing purposes. They are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet, run web sites, or create other publicly accessible Internet resources

Anbieter: Dodax
Stand: 26.10.2020
Zum Angebot