Explosive Effects and ApplicationsJonas A. Zukas, William Walters, William P. Walters Springer Science & Business Media, 14 nov. 2002 - 433 pages This is a broad-based text on the fundamentals of explosive behavior and the application of explosives in civil engineering, industrial processes, aerospace applications, and military uses. |
Avis des internautes - Rédiger un commentaire
Aucun commentaire n'a été trouvé aux emplacements habituels.
Table des matières
| 1 | |
| 9 | |
| 11 | |
| 17 | |
| 20 | |
| 25 | |
| 29 | |
| 30 | |
A Framework for Security Assurance in Component Based Development | 587 |
Fast and Efficient Rendering System | 592 |
Information Fusion for Probabilistic Reasoning and Its Application | 593 |
An Authenticated Key Agreement Protocol Resistant | 603 |
A Case Study in Applying Common Criteria to Development Process | 608 |
Track on Computational Methods | 611 |
Parametric Freehand Sketches | 613 |
Efficient PasswordBased Authenticated Key Agreement Protocol | 617 |
| 33 | |
| 37 | |
| 39 | |
| 41 | |
| 46 | |
Video Summarization Using Fuzzy OneClass Support Vector Machine | 49 |
New Parameter for Balancing Two Independent Measures | 56 |
A Study on Efficient Key Distribution and Renewal | 66 |
Optimal Server Allocation in Reconfigurable Clusters with | 76 |
A Transcode and Prefetch Technique of Multimedia Presentations | 89 |
Task Allocation for Minimizing Programs Completion Time | 97 |
Constructing Control Flow Graph for Java by Decoupling Exception | 106 |
A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion | 107 |
3DColorStructureCode A New Nonplainness Island Hierarchy | 109 |
Adaptive IntervalBased Caching Management Scheme for Cluster | 116 |
A Document Classification Algorithm Using the Fuzzy Set Theory | 122 |
Track on Parallel and Distributed Computing | 124 |
Partitioning Orthogonal Polygons by Extension of All Edges | 127 |
The Measurement of an Optimum Load Balancing Algorithm in | 136 |
Network Security Management Using ARP Spoofing | 142 |
A DAGBased XCIGS Algorithm for Dependent Tasks | 158 |
A Digital Watermarking Scheme in JPEG2000 Using the Properties | 159 |
A Fuzzy Expert System for Network Forensics | 175 |
Parallel and Distributed Computing Workshop | 178 |
A Design of Preventive Integrated Security Management System | 183 |
Conflict Resolution of Data Synchronization in Mobile Environment | 196 |
Authentication of Mobile Node Using AAA in Coexistence of | 199 |
Maximizing Parallelism for Nested Loops | 213 |
New Approach for Secure and Efficient Metering | 215 |
Multiplier with Parallel CSA Using CRTs Specific Moduli | 216 |
Detection Techniques for ELF Executable File Using Assembly | 230 |
Gossip Based Causal Order Broadcast Algorithm | 233 |
Remote Visualization Based on Grid Computing | 236 |
Incremental Adaptive Loop Subdivision | 237 |
A Modified AODV Protocol with Multipaths Considering Classes | 239 |
Committing Secure Results with Replicated Servers | 246 |
Reverse Subdivision Multiresolution for Polygonal Silhouette | 247 |
A Modified Parallel Computation Model Based on Cluster | 252 |
Cylindrical Approximation of a Neuron from | 257 |
Design and Implementation of the HoneyPot System with Focusing | 262 |
Skeletizing SDObjects by Projections | 267 |
A Parallel Volume Splatting Algorithm Based on PCClusters | 272 |
Track on Computational Geometry | 277 |
A QoS Improvement Scheme for RealTime Traffic | 278 |
Error Concealment Method Using ThreeDimensional | 288 |
A Queue Management Scheme for Alleviating the Impact | 294 |
Confidence Sets for the Aumann Mean of a Random Closed Set | 298 |
An Algorithm of Mapping Additional Scalar Value in 2D Vector | 308 |
Traffic Control Scheme of ABR Service Using NLMS in ATM Network | 310 |
Numerical Revelation and Analysis of Critical Ignition Conditions | 313 |
Exact Calculation | 315 |
Curvature Dependent Polygonization by the Edge Spinning | 325 |
Bond Order Potentials for a priori Simulations | 328 |
A Novel Model for Defining Topological LineRegion Relations | 335 |
Inorganic Phosphates Investigation by Support Vector Machine | 338 |
Layered WebCaching Technique for VOD Services | 345 |
RealTime Video Watermarking for MPEG Streams | 348 |
Characterization of Equilibrium Structure for N2N2 Dimer | 350 |
Approximation Algorithms for fcSource Bottleneck Routing Cost | 355 |
A Time Dependent Study of the Nitrogen Atom Nitrogen | 357 |
From DFT Cluster Calculations to Molecular Dynamics Simulation | 366 |
Efficient Sequential and Parallel Algorithms for Popularity | 367 |
Object Boundary Edge Selection Using LevelofDetail Canny Edges | 369 |
Molecular Mechanics and Dynamics Calculations to Bridge Molecular | 374 |
An Experiment and Design of WebBased Instruction Model | 378 |
Direct Simulation Monte Carlo Modeling of Non Equilibrium | 383 |
A Study on Neural Networks Using Taylor Series Expansion | 389 |
Molecular Simulation of Reaction and Adsorption in Nanochemical | 392 |
PMEPR Reduction Algorithms for STBCOFDM Signals | 394 |
Quantum Generalization of Molecular Dynamics Method | 402 |
Speech Emotion Recognition and Intensity Estimation | 406 |
The Efficient WebBased Mobile GIS Service System | 410 |
Ions as Intermediates in the Reaction between | 412 |
Automatic Selecting Coefficient for Semiblind Watermarking | 421 |
Towards a Full Dimensional Exact Quantum Calculation | 422 |
A Web Based Model for Analyzing Compliance of Mobile Content | 426 |
Conformations of 1246Tetrathiepane | 432 |
Differentiated Web Service System through KernelLevel Realtime | 441 |
BitSerial Multipliers for Exponentiation and Division | 442 |
Numerical Models in Biomechanics Session | 445 |
Achieving Fair New Call CAC for Heterogeneous Services | 460 |
Design on Mobile Secure Electronic Transaction Protocol | 461 |
Musculoskeletal Modeling of Lumbar Spine under Follower Loads | 467 |
A SequenceFocused Parallelisation of EMBOSS on a Cluster | 473 |
Visual Mining of Market Basket Association Rules | 479 |
A Design of Configuration Management Practices and CMPET | 481 |
Encoding Image Based on Retinal Ganglion Cell | 486 |
Deformable Templates for Recognizing the Shape | 489 |
Track on Signal Processing | 493 |
Track on Software Engineering | 496 |
A FaultTolerant Mobile Agent Model in Replicated Secure Services | 500 |
Integrating Medical Imaging into a Grid Based | 505 |
Track on Cluster Computing | 508 |
Using C++ Functors with Legacy C Libraries | 514 |
A Study on Smart Card Security Evaluation Criteria | 517 |
ParallelDistributed Film Line Scratch Restoration | 525 |
A Cluster Based Hierarchical Routing Protocol for Mobile Networks | 528 |
Frameworks as Web Services | 534 |
Supporting Adaptive Security Levels in Heterogeneous Environments | 537 |
On Triangulations | 544 |
Cache Conscious Dynamic Transaction Routing | 548 |
A Reduced Codification for the Logical Representation | 553 |
Probability Distribution of OpCodes in Edgebreaker | 554 |
A Study on Key Recovery Agent Protection Profile Having | 557 |
An Adaptive Prefetching Method for Web Caches | 566 |
Synthesis of Mechanical Structures Using a Genetic Algorithm | 573 |
Track on Security Engineering | 574 |
Track on Computational Medicine | 575 |
Improving Productivity and Enhancing the Reusability | 577 |
Architecture Environments for Ebusiness Agent Based on Security | 625 |
Workshop on Computational Geometry | 630 |
Bezier Solutions of the Wave Equation | 631 |
A Novel Data Encryption and Distribution Approach | 637 |
Simple and Efficient Group Key Agreement | 643 |
Generation of Unordered Binary Trees | 648 |
A Differential Method for Parametric Surface Intersection | 651 |
Multiparty Key Agreement Protocol with Cheater Identification | 655 |
Secure Handoff Based on Dual Session Keys in Mobile | 663 |
Asymptotic Error Estimate of Iterative NewtonType Methods | 667 |
Visualization of Large Terrain Using Nonrestricted | 671 |
IDBased Authenticated MultipleKey Agreement Protocol | 672 |
A Defense Mechanism Knowledge Base | 683 |
Improved Mathematical | 686 |
A Secure and Flexible Multisigncryption Scheme | 689 |
Image Coherence Based Adaptive Sampling for Image Synthesis | 693 |
A New RoleBased Authorization Model | 701 |
A Comparison of Multiresolution Modelling | 703 |
Applications of Fuzzy Data Mining Methods for Intrusion | 706 |
Effective Packet Marking Approach to Defend against DDoS Attack | 708 |
Texture Mapping on Arbitrary 3D Surfaces | 721 |
A Robust Image Authentication Method Surviving Acceptable | 722 |
A Relationship of Configuration Management Requirements | 725 |
Optimizing Symmetric FFTs with Prime EdgeLength | 736 |
Performance Improvement in Mobile IPv6 Using | 738 |
A Bandwidth Reduction Scheme for 3D TextureBased Volume | 741 |
ContextBased Proofreading of Structured Documents | 743 |
A PolicyBased Security Management Architecture Using XML | 755 |
Where the Truth Lies in Automatic Theorem Proving | 761 |
Storing Together the Structural Information of XML Documents | 763 |
An Integrated XML Security Mechanism for Mobile Grid Application | 776 |
An Application of Computer Graphics for Landscape | 779 |
Isolating and Specifying the Relevant Information of | 783 |
A Scheme for Improving WEP Key Transmission between | 792 |
View Morphing Based on Autocalibration for Generation | 799 |
A New Pedagogical | 807 |
An ObjectOriented Metric to Measure the Degree of Dependency | 808 |
Security Issues in Network File Systems | 812 |
Virtual Reality Technology Applied to Simulate | 817 |
A ContentIndependent Scalable Encryption Model | 821 |
Virtual Reality Applied to Molecular Sciences | 827 |
Multimodal Biometrics System Using Face and Signature | 828 |
Design Analysis and Optimization of LCD Backlight Unit Using | 837 |
A Geometrical Approach for Network Intrusion Detection | 841 |
Dynamically Changing Road Networks Modelling | 843 |
An Efficient Parameter Estimation Technique | 847 |
Association Inlining for Mapping XML DTDs to Relational Tables | 849 |
A Computer Tool for the Generation | 857 |
Use of Spectral Techniques in the Design | 859 |
Ontologies in Fashion | 863 |
Macroscopic Treatment to Polymorphic Email Based Viruses | 867 |
An Efficient Cache Conscious Multidimensional Index Structure | 869 |
Making Discrete Games | 877 |
WebBased Learning Session | 880 |
A Scalable PKI for Secure Routing in the Internet | 882 |
Speech Driven Facial Animation Using Chinese Mandarin | 886 |
Feature Extraction and Correlation for Timetoimpact | 887 |
Cryptanalysis and Improvement of Password Authenticated | 895 |
Autonomic Protection System Using Adaptive Security Policy | 896 |
The Development and Application of a WebBased Information | 902 |
Efficient Prefetch and Prerelease Based Buffer Cache Management | 906 |
DDoS Attack Defense Architecture Using | 915 |
Observing Standards for WebBased Learning from the Web | 922 |
A New Approach for Numerical Identification | 926 |
KolmogorovSmirnov Test for Image Comparison | 933 |
Chaotic Protocols | 938 |
Relevance Feedback for ContentBased Image Retrieval Using | 942 |
Track on Mobile Computing Systems | 945 |
Image Corner Detection Using Radon Transform | 948 |
From Axial Maps to Mark Point Parameter Analysis Ma P P A | v |
Geometric Graphs Realization as Coin Graphs 1 | 1 |
A Multi Agent | 5 |
Disc Covering Problem with Application to Digital Halftoning 11 | 11 |
On Local Transformations in Plane Geometric Graphs Embedded | 22 |
Reducing the Time Complexity of MinkowskiSum Based Similarity | 32 |
Efficient Key Distribution Protocol for Secure Multicast | 34 |
A Practical Algorithm for Approximating Shortest Weighted Path | 42 |
PlaneSweep Algorithm of Onlogn for the Inclusion Hierarchy | 53 |
Shortest Paths for Disc Obstacles 62 | 62 |
A Study on Generating an Efficient Bottomup Tree Rewrite Machine | 65 |
Improving the Global Continuity of the Natural | 71 |
A Study on Methodology for Enhancing Reliability of Datapath 73 | 73 |
SelfTuning Mechanism for Genetic Algorithms Parameters | 77 |
Combinatorics and Triangulations 81 | 81 |
DigitSerial AB2 Systolic Array for Division in GF2m 87 | 87 |
Approximations for Two DecompositionBased Geometric | 90 |
Computing Largest Empty Slabs 99 | 99 |
A Linear Systolic Array for Multiplication in GF2m | 106 |
A Novel LMS Method for RealTime Network Traffic Prediction 127 | 127 |
On the Time Complexity of Rectangular Covering Problems | 137 |
A MarketBased Scheduler for JXTABased PeertoPeer | 147 |
CORBABased Multithreaded Distributed Simulation | 167 |
Automated Model Generation System Based on Freeform Deformation | 178 |
A Systematic Database Summary Generation Using | 185 |
The Employment of Regular Triangulation for Constrained | 198 |
Implementation of the VoronoiDelaunay Method for Analysis | 217 |
Intermediate View Synthesis from Stereoscopic | 243 |
Control Messaging Channel for Distributed Computer Systems 261 | 261 |
DistortionFree of General Information with Edge Enhanced Error | 281 |
Filtering of Colored Noise for Signal Enhancement 301 | 301 |
Effective Digital Watermarking Algorithm by Contour Detection 321 | 321 |
Decentralized Interagent Message Forwarding Protocols | 376 |
Optimization of Usability on an Authentication System Built from | 386 |
An Efficient Simple Cooling Schedule for Simulated Annealing 396 | 396 |
A ProblemSpecific Convergence Bound for Simulated | 405 |
Comparison and Selection of Exact and Heuristic Algorithms 415 | 415 |
Adaptive Texture Recognition in Image Sequences with Prediction | 425 |
Fuzzy Matching of User Profiles for a Banner Engine 433 | 433 |
Autres éditions - Tout afficher
Explosive Effects and Applications Jonas A. Zukas,William Walters,William P. Walters Aucun aperçu disponible - 2002 |
Expressions et termes fréquents
agent algorithm application approach architecture avatars Berlin Heidelberg 2004 cache calculations Chem client cluster collaborative filtering components Computer Graphics coordinates curve Data Grid dataset defined developed distributed dynamic efficient energy environment equation evaluation execution Figure function geometry grid computing ICCSA IEEE implementation initial input integrals interaction interface interpolation iterations Lagana LNCS machine matching matrix mesh method modules molecular monitoring nodes obtained OpenMP operation optimal P-GRADE paper Parallel Computing parallel program parameters parametric surfaces performance Phys pixel potential energy surface problem Proc processors proposed quadtree reaction reconstruction request sampling scheduling scheme Section server simulation solution solve Springer-Verlag Berlin Heidelberg structure surface SyncML tasks techniques texture texture mapping triangle strips triangles University of Perugia update vector vertex virtual visualization volume rendering voxel
Fréquemment cités
Page 168 - Knowledge discovery in databases (KDD) is the non-trivial process of identifying valid, novel, potentially useful, and ultimately understandable patterns in data [1].
Page 46 - C¿, Specific heat at constant pressure. C¿ Specific heat at constant volume.
Page 560 - Single resolution compression of arbitrary triangular meshes with properties.
Page 177 - R. Agrawal, H. Mannila, R. Srikant, H. Toivonen and AI Verkamo, Fast discovery of association rules, in Advances in Knowledge Discovery and Data Mining (UM Fayyad, G.
Page 96 - Ross, and R. Thakur. PVFS: A Parallel File System for Linux Clusters. In Proceedings of the 4th Annual Linux Showcase and Conference, pages 317—327, 2000.
Page 491 - I -2005-000- 1 0989-0 from the Basic Research Program of the Korea Science & Engineering Foundation References [1] Yaszemski MJ, Payne RG, Hayes WC, Langer R, and Mikos AG., Biomaterials.
Page 29 - A Taxonomy and Survey of Grid Resource Management Systems for Distributed Computing", Software: Practice and Experience (SPE) Journal, Wiley Press, USA, 2001.
Page 195 - D. Agrawal, A. El Abbadi, A. Singh and T. Yurek. Efficient View Maintenance at Data Warehouses.
Page 184 - M. Willebeek-Lemair and AP Reeves, Strategies for dynamic load-balancing on highly parallel computers, IEEE Transactions on Parallel and Distributed Systems, vol. 4, no. 9, pp.
Page 650 - The structure of this paper is as follows: In Section 2, we introduce notations and shortly discuss the algorithms proposed by Moller and Held.
