LEADER 02607nam 2200577 450 001 9910818014103321 005 20180731043854.0 010 $a1-4704-0359-5 035 $a(CKB)3360000000464945 035 $a(EBL)3114480 035 $a(SSID)ssj0000910344 035 $a(PQKBManifestationID)11471439 035 $a(PQKBTitleCode)TC0000910344 035 $a(PQKBWorkID)10932295 035 $a(PQKB)11215112 035 $a(MiAaPQ)EBC3114480 035 $a(RPAM)12816760 035 $a(PPN)195416473 035 $a(EXLCZ)993360000000464945 100 $a20020613h20022002 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe AB program in geometric analysis $esharp Sobolev inequalities and related problems /$fOlivier Druet, Emmanuel Hebey 210 1$aProvidence, Rhode Island :$cAmerican Mathematical Society,$d[2002] 210 4$dİ2002 215 $a1 online resource (113 p.) 225 1 $aMemoirs of the American Mathematical Society,$x0065-9266 ;$vnumber 761 300 $aDescription based upon print version of record. 311 $a0-8218-2989-0 320 $aIncludes bibliographical references (pages 95-98). 327 $a""5.4. Extremal functions for the Aa???part of the AB program""""5.5. Critical functions versus best constants""; ""5.6. Low dimension""; ""5.7. The Ba???part of the AB program""; ""Chapter 6. PDE Methods""; ""6.1. Weak pointwise estimates""; ""6.2. Strong pointwise estimates""; ""6.3. Exact asymptotic profile""; ""Chapter 7. The isoperimetric inequality""; ""Chapter 8. The H[sup(p)][sub(1)]a???inequalities, 1 < p < dimM""; ""8.1. Sharp inequalities with respect to the Aa???constant""; ""8.2. Geometric rigidity attached to the first constant"" 327 $a""8.3. A scale in powers of sharp Sobolev inequalities""""8.4. Extremal functions for the Aa???part of the AB program""; ""8.5. Sharp inequalities with respect to the Ba???constant""; ""Bibliography"" 410 0$aMemoirs of the American Mathematical Society ;$vno. 761. 606 $aVariational inequalities (Mathematics) 606 $aRiemannian manifolds 615 0$aVariational inequalities (Mathematics) 615 0$aRiemannian manifolds. 676 $a510 s 676 $a514/.74 700 $aDruet$b Olivier$f1976-$01611350 702 $aHebey$b Emmanuel$f1964- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910818014103321 996 $aThe AB program in geometric analysis$94095799 997 $aUNINA LEADER 03996nam 2200757Ia 450 001 9910963701403321 005 20240417004802.0 010 $a9786612437236 010 $a9781282437234 010 $a1282437232 010 $a9780309138512 010 $a0309138515 035 $a(CKB)2670000000015885 035 $a(OCoLC)649901504 035 $a(CaPaEBR)ebrary10355550 035 $a(SSID)ssj0000343558 035 $a(PQKBManifestationID)11280707 035 $a(PQKBTitleCode)TC0000343558 035 $a(PQKBWorkID)10306934 035 $a(PQKB)11016066 035 $a(MiAaPQ)EBC3378552 035 $a(Au-PeEL)EBL3378552 035 $a(CaPaEBR)ebr10355550 035 $a(CaONFJC)MIL243723 035 $a(OCoLC)923280651 035 $a(Perlego)4738772 035 $a(EXLCZ)992670000000015885 100 $a20090610d2009 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aTechnology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities /$fWilliam A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies 205 $a1st ed. 210 $aWashington, DC $cNational Academies Press$dc2009 215 $a1 online resource (390 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780309138505 311 08$a0309138507 320 $aIncludes bibliographical references. 327 $aFrontMatter -- Preface -- Acknowledgment of Reviewers -- Contents -- Synopsis -- 1 Overview, Findings, and Recommendations -- Part I: Framing and Basic Technology -- 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3 A Military Perspective on Cyberattack -- 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation -- 5 Perspectives on Cyberattack Outside National Security -- 6 Decision Making and Oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7 Legal and Ethical Perspectives on Cyberattack -- 8 Insights from Related Areas -- 9 Speculations on the Dynamics of Cyberconflict -- 10 Alternative Futures -- Appendixes -- Appendix A: Biographies of Committee Members and Staff -- Appendix B: Meeting Participants and Other Contributors -- Appendix C: Illustrative Criminal Cyberattacks -- Appendix D: Views on the Use of Force in Cyberspace -- Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions. 606 $aComputer networks$xSecurity measures$xGovernment policy$zUnited States 606 $aComputer networks$xSecurity measures$zUnited States 606 $aCyberspace$xSecurity measures$zUnited States 606 $aCyberterrorism$zUnited States$xPrevention 606 $aInformation warfare$zUnited States 615 0$aComputer networks$xSecurity measures$xGovernment policy 615 0$aComputer networks$xSecurity measures 615 0$aCyberspace$xSecurity measures 615 0$aCyberterrorism$xPrevention. 615 0$aInformation warfare 676 $a355.3/43 701 $aDam$b Kenneth W$0141275 701 $aLin$b Herbert$01093194 701 $aOwens$b William A.$f1940-$01808673 712 02$aNational Research Council (U.S.).$bCommittee on Offensive Information Warfare. 712 02$aNational Research Council (U.S.).$bComputer Science and Telecommunications Board. 712 02$aNational Research Council (U.S.).$bDivision on Engineering and Physical Sciences. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910963701403321 996 $aTechnology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities$94359052 997 $aUNINA