LEADER 02928nam 2200613 450 001 9910481016103321 005 20211005144628.0 010 $a1-4704-0438-9 035 $a(CKB)3360000000465021 035 $a(EBL)3114059 035 $a(SSID)ssj0000973289 035 $a(PQKBManifestationID)11527845 035 $a(PQKBTitleCode)TC0000973289 035 $a(PQKBWorkID)10959566 035 $a(PQKB)10093004 035 $a(MiAaPQ)EBC3114059 035 $a(PPN)195417259 035 $a(EXLCZ)993360000000465021 100 $a20050715d2005 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aLax-Phillips scattering and conservative linear systems $ea Cuntz-algebra multidimensional setting /$fJoseph A. Ball, Victor Vinnikov 210 1$aProvidence, Rhode Island :$cAmerican Mathematical Society,$d2005. 215 $a1 online resource (114 p.) 225 1 $aMemoirs of the American Mathematical Society,$x0065-9266 ;$vnumber 837 300 $a"November 2005, volume 178, number 837 (first of 5 numbers)." 311 $a0-8218-3768-0 320 $aIncludes bibliographical references (pages 99-101). 327 $a""Contents""; ""Chapter 1. Introduction""; ""Chapter 2. Functional Models for Row-Isometric/Row-Unitary Operator Tuples""; ""2.1. The classical case""; ""2.2. Functional models of noncommutative formal power series""; ""2.3. Hardy subspaces""; ""2.4. Intertwining operators""; ""Chapter 3. Cuntz Scattering Systems""; ""3.1. Basic geometric structure of Cuntz scattering systems""; ""3.2. The scattering function and models for Cuntz scattering systems""; ""3.3. The colligation associated with a Cuntz scattering system""; ""Chapter 4. Unitary Colligations""; ""4.1. Preliminaries"" 327 $a""4.2. The Cuntz scattering system associated with a unitary colligation U and Cuntz weight W*""""Chapter 5. Scattering, Systems and Dilation Theory: the Cuntz-Toeplitz Setting""; ""5.1. Outgoing Cuntz scattering systems""; ""5.2. Cuntz unitary colligations and outgoing Cuntz scattering systems""; ""5.3. Model theory for row contractions""; ""5.4. Realization theory""; ""Bibliography"" 410 0$aMemoirs of the American Mathematical Society ;$vno. 837. 606 $aScattering (Mathematics) 606 $aLinear systems 606 $aOperator algebras 606 $aHilbert space 608 $aElectronic books. 615 0$aScattering (Mathematics) 615 0$aLinear systems. 615 0$aOperator algebras. 615 0$aHilbert space. 676 $a510 s 676 $a515/.724 700 $aBall$b Joseph A.$f1947-$054258 702 $aVinnikov$b V$g(Victor), 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910481016103321 996 $aLax-Phillips scattering and conservative linear systems$92472603 997 $aUNINA LEADER 01223nam a22003251i 4500 001 991003960019707536 005 20030929091256.0 008 031111s1985 uik|||||||||||||||||eng 020 $a0856351318 035 $ab12498920-39ule_inst 035 $aARCHE-053219$9ExL 040 $aDip.to Lingue$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a821 100 1 $aBrontė, Charlotte$0386910 245 14$aThe Brontė sisters :$bselected poems /$cedited by Stevie Davies 260 $aManchester :$bCarcanet,$c1985 300 $a123 p. ;$c20 cm 600 14$aBrontė, Charlotte$xOpere poetiche 600 14$aBrontė, Emily$xOpere poetiche 600 14$aBrontė, Anne$xOpere poetiche 700 1 $aBrontė, Emily 700 1 $aBrontė, Anne 700 1 $aDavies, Stevie 907 $a.b12498920$b02-04-14$c13-11-03 912 $a991003960019707536 945 $aLE012 828.8 BROS 1$g1$i2012000132085$lle012$o-$pE0.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i12934951$z13-11-03 945 $aLE012 828.8 BROS 1/A$g2$i2012000132092$lle012$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i12934963$z13-11-03 996 $aBrontė sisters$9182200 997 $aUNISALENTO 998 $ale012$b13-11-03$cm$da $e-$feng$guik$h4$i2 LEADER 01738nam 2200373z- 450 001 9910346922603321 005 20210211 010 $a1000012049 035 $a(CKB)4920000000101296 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/50219 035 $a(oapen)doab50219 035 $a(EXLCZ)994920000000101296 100 $a20202102d2009 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aInformation flow control for java : a comprehensive approach based on path conditions in dependence Graphs 210 $cKIT Scientific Publishing$d2009 215 $a1 online resource (221 p. p.) 311 08$a3-86644-398-6 330 $aInformation flow control (IFC) is a technique to assert the security of a given program with respect to a given security policy. The classical policy noninterference requires that public output of a program may not be influenced from secret input. This work leverages a technique called program slicing, which is closely connected to IFC and offers many dimensions for improving analysis precision, the most powerful are Path Conditions. Our evaluation shows scalability with a low annotation burden. 517 $aInformation flow control for java 610 $ainformation flow control 610 $apath conditions 610 $aprogram dependence graph 610 $aprogram slicing 610 $asoftware security 700 $aHammer$b Christian$4auth$0887149 906 $aBOOK 912 $a9910346922603321 996 $aInformation flow control for java : a comprehensive approach based on path conditions in dependence Graphs$93025967 997 $aUNINA