Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Operations research, engineering, an...
~
Daras, Nicholas J.
Operations research, engineering, and cyber securitytrends in applied mathematics and technology /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Operations research, engineering, and cyber securityedited by Nicholas J. Daras, Themistocles M. Rassias.
Reminder of title:
trends in applied mathematics and technology /
other author:
Daras, Nicholas J.
Published:
Cham :Springer International Publishing :2017.
Description:
xi, 422 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Cyber intelligence (Computer security)Congresses.
Online resource:
http://dx.doi.org/10.1007/978-3-319-51500-7
ISBN:
9783319515007$q(electronic bk.)
Operations research, engineering, and cyber securitytrends in applied mathematics and technology /
Operations research, engineering, and cyber security
trends in applied mathematics and technology /[electronic resource] :edited by Nicholas J. Daras, Themistocles M. Rassias. - Cham :Springer International Publishing :2017. - xi, 422 p. :ill., digital ;24 cm. - Springer optimization and its applications,v.1131931-6828 ;. - Springer optimization and its applications ;v. 3..
Complementarity and Variational Inequalities in Electronics (K. Addi, D. Goeleven) -- Electromagnetic Scattering by a Chiral Impedance Screen (C. E. Athanasiadis, V. Sevroglou, K. Skourogiannis) -- Optimal Batch Production with Rework Process for Products with Time Varying Demand over Finite Planning Horizon (L. Benkherouf, K. Skouri, I. Konstantaras) -- On co-polynomials on the real line and the unit circle (Kenier Castillo, Francisco Marcellan, Jorge Rivero) -- Electromagnetic Compatibility (EMC) in Challenging Environments (C. Christopoulos) -- Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities (P. Daniele, A. Maugeri, A. Nagurney) -- Ellipsoid Targeting with Overlap (N. J. Daras) -- A Review of Several Optimization Problems Related to Security in Networked System (B. DasGupta, V. Srinivasan) -- On Some Information Geometric Approaches to Cyber Security (C. Dodson) -- A Survey of Recent Inequalities for Relative Operator Entropy (S. S. Dragomir) -- On the Use of Elliptic Regularity Theory for the Numerical Solution of Variational Problems (A. Dreves, J. Gwinner, N. Ovcharova) -- Strong and Weak Convexity of Closed Sets in a Hilbert space (V. V. Goncharov, G. E. Ivanov) -- Non-Equilibrium Solutions of Dynamic Networks: a Hybrid System Approach (Scott Greenhalgh, Monica-Gabriela Cojocaru) -- Measuring Ballistic Dispersion for the Purpose of Ammunition Quality Assurance (W. J. Hurley, J. Brimberg, A. Pavlov) -- Region-Based Watermarking for Images (K. A. Raftopoulos, N. Papadakis, K. S. Ntalianis, P. Tzouveli, G. Goudelis, S. D. Kollias) -- Optimal Inventory Policies for Finite Horizon Inventory Models with Time Varying Demand: a Unified Presentation (K. Skouri, L. Benkherouf, I. Konstantaras) -- Metrical Pareto Efficiency and Monotone EVP (M. Turinici) -- New Two-Slope Parameterized Achievement Scalarizing Functions for Nonlinear Multiobjective Optimization (O. Wilppu, M. M. Makel, Y. Nikuli)
Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists, engineers and researchers in pure and applied mathematical sciences, operations research, engineering, and cyber security will find the interdisciplinary scientific perspectives useful to their overall understanding and further research.
ISBN: 9783319515007$q(electronic bk.)
Standard No.: 10.1007/978-3-319-51500-7doiSubjects--Topical Terms:
695345
Cyber intelligence (Computer security)
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Operations research, engineering, and cyber securitytrends in applied mathematics and technology /
LDR
:04340nmm a2200325 a 4500
001
509293
003
DE-He213
005
20170314074152.0
006
m d
007
cr nn 008maaau
008
171121s2017 gw s 0 eng d
020
$a
9783319515007$q(electronic bk.)
020
$a
9783319514987$q(paper)
024
7
$a
10.1007/978-3-319-51500-7
$2
doi
035
$a
978-3-319-51500-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
PBU
$2
bicssc
072
7
$a
MAT003000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
O61 2017
245
0 0
$a
Operations research, engineering, and cyber security
$h
[electronic resource] :
$b
trends in applied mathematics and technology /
$c
edited by Nicholas J. Daras, Themistocles M. Rassias.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
xi, 422 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Springer optimization and its applications,
$x
1931-6828 ;
$v
v.113
505
0
$a
Complementarity and Variational Inequalities in Electronics (K. Addi, D. Goeleven) -- Electromagnetic Scattering by a Chiral Impedance Screen (C. E. Athanasiadis, V. Sevroglou, K. Skourogiannis) -- Optimal Batch Production with Rework Process for Products with Time Varying Demand over Finite Planning Horizon (L. Benkherouf, K. Skouri, I. Konstantaras) -- On co-polynomials on the real line and the unit circle (Kenier Castillo, Francisco Marcellan, Jorge Rivero) -- Electromagnetic Compatibility (EMC) in Challenging Environments (C. Christopoulos) -- Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities (P. Daniele, A. Maugeri, A. Nagurney) -- Ellipsoid Targeting with Overlap (N. J. Daras) -- A Review of Several Optimization Problems Related to Security in Networked System (B. DasGupta, V. Srinivasan) -- On Some Information Geometric Approaches to Cyber Security (C. Dodson) -- A Survey of Recent Inequalities for Relative Operator Entropy (S. S. Dragomir) -- On the Use of Elliptic Regularity Theory for the Numerical Solution of Variational Problems (A. Dreves, J. Gwinner, N. Ovcharova) -- Strong and Weak Convexity of Closed Sets in a Hilbert space (V. V. Goncharov, G. E. Ivanov) -- Non-Equilibrium Solutions of Dynamic Networks: a Hybrid System Approach (Scott Greenhalgh, Monica-Gabriela Cojocaru) -- Measuring Ballistic Dispersion for the Purpose of Ammunition Quality Assurance (W. J. Hurley, J. Brimberg, A. Pavlov) -- Region-Based Watermarking for Images (K. A. Raftopoulos, N. Papadakis, K. S. Ntalianis, P. Tzouveli, G. Goudelis, S. D. Kollias) -- Optimal Inventory Policies for Finite Horizon Inventory Models with Time Varying Demand: a Unified Presentation (K. Skouri, L. Benkherouf, I. Konstantaras) -- Metrical Pareto Efficiency and Monotone EVP (M. Turinici) -- New Two-Slope Parameterized Achievement Scalarizing Functions for Nonlinear Multiobjective Optimization (O. Wilppu, M. M. Makel, Y. Nikuli)
520
$a
Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists, engineers and researchers in pure and applied mathematical sciences, operations research, engineering, and cyber security will find the interdisciplinary scientific perspectives useful to their overall understanding and further research.
650
0
$a
Cyber intelligence (Computer security)
$v
Congresses.
$3
695345
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Systems engineering.
$3
182491
650
1 4
$a
Mathematics.
$3
184409
650
2 4
$a
Optimization.
$3
274084
650
2 4
$a
Numerical Analysis.
$3
275681
650
2 4
$a
Order, Lattices, Ordered Algebraic Structures.
$3
275673
650
2 4
$a
Mathematics of Algorithmic Complexity.
$3
675328
650
2 4
$a
Mathematical Modeling and Industrial Mathematics.
$3
274070
650
2 4
$a
Mathematical Applications in Computer Science.
$3
530811
700
1
$a
Daras, Nicholas J.
$3
573118
700
1
$a
Rassias, Themistocles M.
$3
456128
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Springer optimization and its applications ;
$v
v. 3.
$3
440366
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-51500-7
950
$a
Mathematics and Statistics (Springer-11649)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000139226
電子館藏
1圖書
電子書
EB QA76.9.A25 O61 2017
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-51500-7
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login