| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910827151103321 |
|
|
Autore |
Dauphiné André |
|
|
Titolo |
Modèles Géographiques Avec le Langage Mathematica / / André Dauphiné |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London : , : ISTE Editions Ltd., , 2017 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (333 pages) |
|
|
|
|
|
|
Collana |
|
Collection systèmes d'information, web et société |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Geography - Mathematical models |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Intro -- Table des matières -- Introduction -- PARTIE 1. Modéliser les relationssociétés-nature -- Introduction de la partie 1 -- Chapitre 1. Paradoxes théoriquesde la géographie classique -- Chapitre 2. Modèles statistiques et probabilistesdes relations sociétés-nature -- Chapitre 3. Modèles de systèmesdynamiques ordinaires -- PARTIE 2. Modéliserles localisations géographiques -- Introduction de la partie 2 -- Chapitre 4. Théories des localisationsgéographiques -- Chapitre 5. Modèles des localisationsgéographiques -- PARTIE 3. Structures spatialeset dynamiques territoriales -- Introduction de la partie 3 -- Chapitre 6. Théoriser les structureset les dynamiques territoriales -- Chapitre 7. Modèlesde points et de champs -- Chapitre 8Modèles de réseaux -- Chapitre 9Modèlesde l'espace géographique -- Chapitre 10.Macro et micro-modèlesde la morphogénie -- Conclusion -- Bibliographie -- Index. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910484587203321 |
|
|
Titolo |
Information Systems Security : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
|
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2005.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 342 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 3803 |
|
|
|
|
|
|
Altri autori (Persone) |
|
JajodiaSushil |
MazumdarChandan |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Computer networks |
Operating systems (Computers) |
Computers and civilization |
Electronic data processing - Management |
Information storage and retrieval systems |
Cryptology |
Computer Communication Networks |
Operating Systems |
Computers and Society |
IT Operations |
Information Storage and Retrieval |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry -- Auditable Anonymous Delegation -- A Robust Double Auction Protocol |
|
|
|
|
|
|
|
|
|
|
Based on a Hybrid Trust Model -- VTrust: A Trust Management System Based on a Vector Model of Trust -- Analysis and Modelling of Trust in Distributed Information Systems -- EPAL Based Privacy Enforcement Using ECA Rules -- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection of Relationships in XML Documents with the XML-BB Model -- EISA – An Enterprise Application Security Solution for Databases -- Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast Fingerprinting -- A Key Reshuffling Scheme for Wireless Sensor Networks -- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks -- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks -- Detecting ARP Spoofing: An Active Technique -- Episode Based Masquerade Detection -- A Game-Theoretic Approach to Credit Card Fraud Detection -- Modifications of SHA-0 to Prevent Attacks -- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes -- On Broadcast Encryption with Random Key Pre-distribution Schemes -- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field -- SPEAR: Design of a Secured Peer-to-Peer Architecture -- A Web-Enabled EnterpriseSecurity Management Framework Based on a Unified Model of Enterprise Information System Security -- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches -- A Transparent End-to-End Security Solution. |
|
|
|
|
|
| |