Mostrando 6,161 - 6,180 Resultados de 7,859 Para Buscar '".ar"', tiempo de consulta: 0.10s Limitar resultados
  1. 6161
    Accés lliure
    991005001019706719
  2. 6162
    por Liyanage, Madhusanka
    Publicado 2020
    Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract; 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings, Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication; 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication; Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication; 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References; Chapter 4 Public Key Based Protocols -- EC Crypto…”
    Libro electrónico
  3. 6163
    Publicado 2024
    Tabla de Contenidos: “…6 Social Media Metrics and Analytics -- Social Media Measures -- The Barcelona Principles 3.0 and SMART Goals -- See, Say, Feel, Do -- Google Analytics -- Facebook Insights -- Twitter Analytics and Instagram Influence -- Social Network Analysis (SNA) -- Other Social Network Measurement Issues -- Discussion Questions: Strategies and Tactics -- 7 New and Mobile Media Technologies, Innovation and Investment -- Entrepreneurs -- Angel Investors and Start-Ups -- Big Ideas and Business -- "Crush It" and the Thank You Economy -- Crowdfunding -- Emergence of New and Mobile Media -- Implications of Revolutionary Mobile and Social Media -- Twitter Impact -- Mobile Geotagging -- Google Glass, Snapchat Spectacles and AR -- Discussion Questions: Strategies and Tactics -- 8 Big Data and Privacy -- Privacy Development -- TikTok, Instagram and Twitter Policies -- Big Data and Privacy -- FTC Regulation -- Privacy and Legal Implications -- Discussion Questions: Strategies and Tactics -- 9 Law and Regulation -- Free Expression and the First Amendment -- Internet Libel -- Facebook, Twitter and the Law -- International Social Media -- Prior Restraint and Terrorism -- US Internet Indecency -- Regulated Media Technologies -- FTC Regulation: Advertising, PR and Social Media -- Copyright Infringement, File Sharing and Fair Use -- Social Perspectives on Law -- Social Media Privacy Issues -- Discussion Questions: Strategies and Tactics -- 10 Social Media Ethics -- Theories and Philosophies -- Idealism and Relativism -- Moral Development -- Trust and Transparency -- Human Dignity Frameworks -- Practical Social Media Ethics -- Equality and Fairness -- Natural Law and Harm -- Reconsidering Community -- Limitations of Ethics -- Discussion Questions: Strategies and Tactics -- 11 Best Practices in Social Media -- Mobile Media and CMC -- Newspapers, Magazines and Journalism Revisited…”
    Libro electrónico
  4. 6164
    Publicado 2024
    “…Som leseprøve måler PIRLS resultatet av flere års leseopplæring, ikke bare den opplæringa som har funnet sted i femte klasse. …”
    Libro electrónico
  5. 6165
    Publicado 2024
    Tabla de Contenidos: “…Iespējas padarīt saistošus noteiktus lēmumu veidus, kas attiecas uz patērētāju prasībām, apsvēršana -- Turpināt stiprināt sabiedrības uzticību ombuda shēmām -- Iespējas ombudos ieviest vienreizēju ieejas punktu patērētāju un tirgotāju strīdiem apsvēršana -- Apsvērt iespēju sasaistīt PTAC un nozaru ombudu platformas ar tiesu sistēmām. -- Iespējas paplašināt un modernizēt ombuda ekosistēmu un individuālās ombuda shēmas apsvēršana -- Iespējas paplašināt ombudu kompetenci ārpus patērētāju aizsardzības tiesību aktiem apsvēršana -- Atsauces -- Piezīmes -- Pielikums A. …”
    Libro electrónico
  6. 6166
  7. 6167
  8. 6168
  9. 6169
  10. 6170
  11. 6171
    Publicado 2005
    Tabla de Contenidos: “…Projectes: Oficina prefabricada desmontable / Intel-arq ; Pabellón Temático en Expo-Habitat / Jorge Ambrosi ; Casa pR 34 / Rojkind Arquitectos ; Caja de posibilidades / Kwc far 12 ; Casa Pellico / Gerardo Balcázar ; La casa voladora / OPEN Arquitectura ; Casa Ro / Edmundo Rodríguez ; Restaurante Prima / at.103 ; Residencial PH-N / DCI ; Casa en Valle de Bravo / Grupo LBC Arquitectos ; Casa Ajusco / Despacho de Arquitectura ; Casa Magnolias / Salomón Isón ; Librería Porrúa / arquitectura 911sc / Alejandro Danel ; Casa Lamm / Serrano Monjaraz Arquitectos ; Conjunto Mixcoac / Aptilon Nurko Arquitectos ; Escuela de Danza / Felipe Martínez ; Restaurante Sushi Groove / Mateo Holmes ; Residencial Entre/Muros / Gilberto Borja ; Casa Larga / Augusto Quijano Arquitectos ; Puente Eco pista / Arquitectos Brom Asociados ; Corporativo Agrícola Martínez / Alexandre Lenoir ; Cholula 90 / Jacobo Micha y Arquitectos Asociados ; Edificio 4x6 / Axel Arañó ; Casa Montaña / Daniel Pérez-Gil ; Casas M / Fernanda Canales ; Cholula 52 / + Más Arquitectos ; Casa La Chiripa / Felipe Leal ; Agencia automotriz BMW / Estudio Arquitectura ; Tlaxcala 190 / Adrià + Broid + Rojkind ; AR58 / Dellekamp arquitectos ; Edificio Residencial Parque España / TEN Arquitectos ; Parque México / Higuera + Sánchez ; Augen / Alberto Kalach ; Plaza y monumento "Pablo Neruda" / Alfredo Hidalgo ; Hotel Deseo / Central de Arquitectura ; Centro Cultural Muros / Francisco Guzmán ; Embajada de México en Guatemala / Teodoro González de León, Francisco Serrano ; Porsche Interlomas / Mauricio Rocha ; Eugenio Sue 308 / Becker Arquitectos ; Concesionaria de autos "ACASA" / Francisco Serrano ; EGADE Escuela de graduados / Legorreta + Legorreta ; Museo Tamux / Marván Arquitectos ; Corporativo Cemex / Landa García Landa Arquitectos ; Corporativo Palmas / LCM Fernando Romero ; Complejo de Seguridad Pública / Escala del Norte ; Alterna Interlomas / Diámetro Arquitectos Vidarq ; Corporativo Autofin / Lucio Muniain et al ; Poliforum León / Nuño, Mac Gregor y de Buen ; Centro Comunitario / Gorshtein Fasja y Arquitectos ; Hotel Sheraton / Pascal Arquitectos…”
    Libro
  12. 6172
  13. 6173
    por Porete, Margarita
    Publicado 2015
    Texto completo en Odilo
    Otros
  14. 6174
  15. 6175
    Publicado 2014
    Tabla de Contenidos: “…JAmes mill; 3. John sTuArT mill; Lecturas Complementarias; Bibliografía; Tema 9 del socialismo utópico al anarquismo; Introducción; 1. el mundo intelectual británico; 2. …”
    Libro electrónico
  16. 6176
    Tabla de Contenidos: “…Composición porcentual de N2, O2, CO2, Ar y H2; El aire es ligero, sin embargo, pesa. Propiedades físicas de los gases; Leyes de los gases: Boyle, Charles y Gay-Lussac; Teoría cinética-molecular de los gases ideales…”
    Libro electrónico
  17. 6177
    por Miguel Pascual, Roberto de
    Publicado 2006
    Tabla de Contenidos: “…La retórica medieval: el ars predicandi y San Agustín.Bibliografía; CAPÍTULO 4. …”
    Libro electrónico
  18. 6178
    Publicado 2021
    Tabla de Contenidos: “…-- What Are Security, Privacy, and Compliance Considerations For DCS? -- How Will AR/VR or Future Technology Change DCS? -- Notes -- Preface: Now It's Our Turn -- Chapter 2: The Peaks and Valleys of Customer Service -- Chapter 3: Digital Self-Service Changed Things Forever -- Chapter 5: The Process - A Step-By-Step Guide…”
    Libro electrónico
  19. 6179
    Publicado 2016
    Tabla de Contenidos: “…Chapter 6: GPU-Based Particle Swarm Optimization 6.1 Introduction; 6.2 Particle Swarm Optimization; 6.3 GPU-Based PSO for Single-Objective Optimization; 6.4 GPU-Based PSO for Multiple-Objective Optimization; 6.5 Remarks; 6.6 Summary; Chapter 7: GPU-Based Fireworks Algorithm ; 7.1 Introduction; 7.2 Fireworks Algorithms (FWA); 7.3 GPU-Based Fireworks Algorithm; 7.4 Summary; Chapter 8: Attract-Repulse Fireworks Algorithm Using Dynamic Parallelism ; 8.1 Introduction; 8.2 Attract-Repulse Fireworks Algorithm (AR-FWA); 8.3 Implementation; 8.4 Experiments and Analysis; 8.5 Summary…”
    Libro electrónico
  20. 6180
    Publicado 2023
    Tabla de Contenidos: “…Chapter 4 Understanding GPT Models in ChatGPT -- Summarizing Model Progress -- Comparing GPT-4 to Earlier ChatGPT Models -- Choosing ChatGPT Models -- Learning about GPT-4 Advancements -- Adjusting to GPT-4's Limitations -- Chapter 5 Warnings, Ethics, and Responsible AI -- Making Responsible AI -- Troubling developments -- Protecting humans from humans using AI -- Understanding the good, the bad, and the ugly -- Heeding OpenAI Warnings -- Considering Copyright and IP Protections -- Searching for Predictability -- Reaching for reliability -- Hallucinating versus accuracy -- Humanizing the machine -- Mitigating Risks and Liability -- Chapter 6 Probing Professional and Other Uses for ChatGPT -- Finding ChatGPT Embedded in Software -- Locating ChatGPT in business software -- Integrating with everything, everywhere, all at once -- Zooming in on ChatGPT in virtual meetings -- Letting ChatGPT summarize and translate -- Searching for ChatGPT in other applications -- Seeing ChatGPT in AR, VR, and the Metaverse -- Discovering ChatGPT in search engines -- Coding with ChatGPT and Copilot X -- Learning Where to Use ChatGPT for Marketing -- Retrieving Smart Answers for HR -- Harnessing ChatGPT in Legal -- Storytelling in Journalism -- Consulting ChatGPT in Healthcare -- Cashing In on ChatGPT in Finance -- Chapter 7 Working with ChatGPT in Education -- Flipping Critical Thinking to a New Learning Model -- Leveraging ChatGPT to Aid Overworked Educators -- Changing How Subjects Are Taught -- Banning ChatGPT Stifles Education -- Chapter 8 Using ChatGPT in Daily Life -- Dying Keywords -- Moving from Information Search to Knowledge Assistants -- Living with Misinformation and Manipulation -- Narrowing Options -- Chapter 9 Recognizing the Ways ChatGPT and Generative AI Will Change the World -- Understanding What Is and Isn't of Real Concern…”
    Libro electrónico