Авторизация
Поиск по указателям
Zelkowitz M. — Advances in Computers, Volume 55
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Advances in Computers, Volume 55
Автор: Zelkowitz M.
Аннотация: Volume 55 covers some particularly hot topics. Linda Harasim writes about education and the Web in "The Virtual University: A State of the Art." She discusses the issues that will need to be addressed if online education is to live up to expectations. Neville Holmes covers a related subject in his chapter "The Net, the Web, and the Children." He argues that the Web is an evolutionary, rather than revolutionary, development and highlights the division between the rich and the poor within and across nations. Continuing the WWW theme, George Mihaila, Louqa Raschid, and Maria-Esther Vidal look at the problems of using the Web and finding the information you want. Naren Ramakrishnan and Anath Grama discuss another aspect of finding relevant information in large databases in their contribution. They discuss the algorithms, techniques, and methodologies for effective application of scientific data mining. Returning to the Web theme, Ross Anderson, Frank Stajano, and Jong-Hyeon Lee address the issue of security policies. Their survey of the most significant security policy models in the literature shows how security may mean different things in different contexts. John Savage, Alan Selman, and Carl Smith take a step back from the applications and address how theoretical computer science has had an impact on practical computing concepts. Finally, Yuan Taur takes a step even further back and discusses the development of the computer chip. Thus, Volume 55 takes us from the very fundamentals of computer science-the chip-right to the applications and user interface with the Web.
Язык:
Рубрика: Computer science /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2001
Количество страниц: 301
Добавлена в каталог: 24.08.2015
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Abbatel, J. 57 83
Abbott, C. 125 163
Ableson, H. 155 168
Access Control List (ACL) 219—220
Active reading 16
Active writing 15
Adali, S. 113 117
Adam, N. 153 168
ADEPT-50 197
Adhikary, J. 124 162
Adiwijaya, I. 153 168
Adjunct mode use of networks 25
Aggregation 205—206
Agrawal, R. 121 138 162
Aircraft design 158—159
Akamai 175
Akman, E. 151 168
Algorithms, design and analysis 181—182
Algorithms, new theories 182
Alta Vista 72
Ames, S.R. 197 234 235
Amir, A. 183
Amoroso, E. 201 209 210 231
Analyst Alice 212
Anderson, D. 127 163
Anderson, J. 190 231
Anderson, M. 202 231
Anderson, R.J. 186 190 192 205 206 213 214 217 228 231 234
Anderson, S. 6 46
Angelucci, R. 273 279
Anghel, M. 124 162
Anytime analysis 161
ANZLIC 90
Application incompatibility 206
Archie, J. 134 165
Arecibo radio telescope 127
Astronomy 179
Astrophysics, data mining 126—127
Asynchronous Transfer Mode (ATM) networks 175
Atalla, M.M. 238 278
Atluri, V. 153 168
Atmospheric Global Circulation Model (AGCM) 123
Austell, V.A. 209 233
Automated compliance verification 227—228
Avnur, R. 139 166
Axiom 178
B2B (business-to-business) 68
B2C (business-to-consumer) 68
Bacon 136
Bacsich, P. 11 47
Baden, S. 151 168
Badger, L. 198 231
Bailey-Kellogg, C. 141 154 166 168
Bajaj, C. 147 167
Baker, C. 151 152 168
Bakoglu, H.B. 276 278 279
Balabanian, N. 76 85
Balasubramanian, J. 151 168
Banday, A. 127 163
Bane, P.W. 54 82
Barbara, D. 122 135 162
Barksdale, G. 199 231
Barlow, J.P. 77 85
Barnes, J. 145 167
Baru, C. 151 167
Bassous, E. 242 247 273 278
Beazley, D. 152 153 168
Bell, D.E. 189 193 231
Bell-LaPadula (BLD) security policy model 189—199
Benkart, T. 231
Bennett, B. 6 46
Bennett, C. 127 163
Berdichevsky, D. 78 85
Berger, J.L. 198 233
Berghel, H. 68 72 83 84
Berlin, A. 130 164
Berners-Lee, T. 89 113 116
Berry, M. 122 125 162 163
Bersanelli, B. 127 163
Berson, T. 199 231
Bezdek, J. 135 165
Biba integrity model 189 207—209 222
Biba, K. 189 207 232
BiCMOS 240
Bioinformatics, data mining 131—132
Bishop, C. 136 137 165
Biswas, G. 125 163
Bitzer, D. 231
Blacker encryption devices 200—201
Blank, D. 72 84
Blaze, M. 227 232
Blocking features 123
Blom, R. 124 162
BLP 199 203 206—208 210 211 219
Blum, A. 136 165
Blum, M. 183
BMA security policy 190 212—214
Board, J. 145 167
Boebert, W.E. 227 232
Boehringer, K. 130 164
Bohrer, B., et al. 113 117
Boisvert, R. 151 168
Bolt, D.B. 73 84
Books 60—64
Books, content 62
Books, manufacture 61
Books, storage 62—63
Boolean matrix 222
BOOMERANG 127
Boothby, N.G. 75 84
Bosak, J. 70 84
Bosch, D. 124 162
Bouton, C. 6 46
Bowman, C. 114 118
Boyan, J. 157 168
Bradley, S.P. 54 82
Bradshaw, F.T. 197 234 235
Bradshaw, G. 135 136 165
Bradsher, M. 6 46
Bramley, B. 151 168
Bramley, R. 151 167
Branstad, M. 201 232
Bratko, I. 137 166
Bray, T. 70 84
Breg, F. 151 168
Brewer, D.F.C. 190 211 232
Brewington, B.E. 69 84
Bright, L. 113 117
British National Lottery 228—229
Brodley, C. 125 163
Brodley, C.E. 71 84
Brokers 115
Bruffee, K.A. 28 29 31 47
Bryan, G. 125 163
Brynjolfsson, E. 68 84
Bucchignano, J. 255 278
Buchanan, B. 159 168 169
Buchanan, D.A. 256 271 278
buckets 105—112 116
Buneman, P. 153 168
Burns, J.R. 239 278
Busnel, R.G. 54 82
Cambridge CAP machine 220
Candan, K.S. 113 117
Cant, C. 204 232
Cantwell, B. 133 165
capability 220—221
Carroll, B. 54 83
Caruthers, J. 129 164
Catlin, A. 151 153 168
Cattell, R.G.G. 100 117
CCITT X.509 recommendation 223
CD-ROM 64
Centroids 115
certificates 223
Certification practice statement 225—226
CGI-based web applications 17
Chakrabarti, S. 57 83
Chan, K. 129 164
Chanat, J. 124 162
Chandy, K. 151 167
Chapman, G. 133 165
Char, B. 151 167
Cheeseman, P. 140 166
Chemical engineering, data mining 127—130
Chen, H-C. 64 69 83
Chen, W. 278
Children 50 64—75
Children and Internet 65—66
Children and World Wide Web 69—70
Children, digital divide 73—75
Children, future 73—75
Children, infancy divide 75
Chinese Wall model 190 211—212 222
Chou, A. 139 166
CLARANS 124
Clark — Wilson model 190 209—211 221
Clark, D.D. 65 83 209 232
Classe, A. 54 82
Clustering 124 134—135 140—141
CMC 11
CMOS devices, 25-nm, design 266—273
CMOS devices, 25-nm, Monte Carlo simulations 272—273
CMOS devices, band-to-band tunneling current density versus electric field 270
CMOS devices, below 0.25 m 251—266
CMOS devices, channel profile design 260—262
CMOS devices, dopant number fluctuations 264—266
CMOS devices, gate electrode 258—260
CMOS devices, gate oxide 256—258
CMOS devices, global wires 276—278
CMOS devices, halo doping 262
CMOS devices, interconnect issues 273—278
CMOS devices, interconnect resistance 275
CMOS devices, interconnect scaling 273—275
CMOS devices, inversion layer quantization effect 258
CMOS devices, low-temperature 255
CMOS devices, polysilicon-gate depletion effects 271—272
CMOS devices, power supply 251—255
CMOS devices, power vs performance tradeoff 254—255
CMOS devices, relative performance 254
CMOS devices, retrograde doping 260—261
CMOS devices, short-channel device design 266—268
CMOS devices, source-drain doping requirements 263—264 268—270
CMOS devices, standby power 252
CMOS devices, threshold voltage 251—255
CMOS Inverter 239 273
CMOS technology 239 240
CMOS VLSI 238—242
COBE 127
Codewords 192
Coiera, E. 155 168
Collaborative discourse 15
Collaborative learning 6—16 24—25 30
Collaborative learning, online courses 8
Combined recency 112
Comerford, R. 51 82
Comiskey, J. 125 163
Commerce and industry and Internet 68
Commerce and industry and World Wide Web 71—72
Commercial-off-the-shelf (COTS) components 202
Common Criteria 189 200
Communication networks 175
Communication technology 50
Compartment 192
Compartmented Mode Workstation (CMW) 198 201—202
Completeness 96—97 102
Composability 199 204
Computational biology 178
Computational complexity 180—181
Computational geometry 175
Computational steering 152
computer networking 1—2
Computer simulation (QoSim) 43
Computer system, protection of 187—188
Computer-aided materials design (CAMD) 129
Condon, A. 173 183
Conferencing systems 7
Configuration Management 189
CONQUEST 124
Constant-field scaling 242—245
Constant-field scaling, effect on circuit parameters 244—245
Constant-field scaling, rules 242—244
Constant-voltage scaling 245—246
Constrained Data Item (CDI) 210 222
Coordinating Communicating Systems (CCS) 176
CORBA 113
Corbalis, M.C. 51 82
Corporate email 226—227
Cosmic background radiation (CMB) 126—127
Cosmology, data mining 126—127
covert channels 205
Craven, M. 139 166
Crawford, A.K. 73 84
Crippen, R. 124 162
Cryptography 175
Cunningham, D.J. 6 46
Curry, J. 32 47
Curtis, B. 228 232
Cybenko, G. 69 84 136 165
Dalton's equations 136
Damage criteria 191—192
Damocles 273
Damon, W. 78 85
Dancing in Cyberspace 27
DASL (DAV Searching and Locating) 114
Data diode 200
Data is scarce 156—159
Data management 152—153
Data Mining 119—169
Data mining, applications 122—134
Data mining, applications, astrophysics and cosmology 126—127
Data mining, applications, bioinformatics 131—132
Data mining, applications, chemical and materials engineering 127—130
Data mining, applications, flows 133—134
Data mining, applications, geological and geophysical 123—126
Data mining, approximation 122 143—151
Data mining, best practices 139—143 147—151 153—155
Data mining, compression 121
Data mining, compression, continuous attribute sets 147—149
Data mining, compression, data defined over geometry and topologies 144
Data mining, compression, particle position data 148
Data mining, constructive induction 138—139
Data mining, controlling the complexity of induction 141—142
Data modelling 152—155
Data reduction techniques 122
Data representation 153—155
Data sources, discovering 100—101
Data sources, selecting and ranking 101—104
data storage 64
Database management system (DBMS) 153
Dataquest 11
Davari, B. 273 279
Davison, S. 153 168
de Bernardis, P. 127 163
de Boor's function 157—158
de Swaan, A. 76 84 85
Dean, C. 124 162
Delayed communication 50
Delphi effect 44
Demmel, J. 151 168
Реклама