Mostrando 4,041 - 4,054 Resultados de 4,054 Para Buscar '".sv"', tiempo de consulta: 0.10s Limitar resultados
  1. 4041
  2. 4042
    Publicado 2014
    Texto completo en Odilo
    Otros
  3. 4043
    por Marcial Rubio
    Publicado 2014
    Texto completo en Odilo
    Otros
  4. 4044
  5. 4045
    Publicado 2017
    Texto completo en Odilo
    Otros
  6. 4046
    Publicado 2019
    Tabla de Contenidos: “…Morales Break line and shotpile surfaces modeling in design of large-scale blasts S.V. Lukichev, O.V. Nagovitsyn & A.S. Shishkin Incorporation of mineralisation risk into underground mine planning R.C. …”
    Libro electrónico
  7. 4047
    Publicado 2021
    Tabla de Contenidos: “…Univariate Stochastic Volatility models -- 7.5.1. Zero-Mean AR(1) SV Model -- 7.5.2. Normal Mixture Approximation -- 7.5.3. …”
    Libro electrónico
  8. 4048
    por Taylor, Paul G.
    Publicado 2015
    Texto completo en Odilo
    Otros
  9. 4049
    Publicado 2017
    Tabla de Contenidos: “…4.10.3 Handover between LTE and CDMA2000 -- 4.11 Carrier Aggregation -- 4.11.1 CA Types, Bandwidth Classes and Band Combinations -- 4.11.2 CA Configuration, Activation and Deactivation -- 4.12 Network Planning Aspects -- 4.12.1 Single Frequency Network -- 4.12.2 Cell-Edge Performance -- 4.12.3 Self-Organizing Network Functionality -- 4.13 CS-Fallback for Voice and SMS Services with LTE -- 4.13.1 SMS over SGs -- 4.13.2 CS-Fallback for Voice Calls -- 4.14 Voice in Combined LTE and CDMA2000 Networks (SV-LTE) -- 4.15 Network Sharing - MOCN and MORAN -- 4.15.1 National Roaming -- 4.15.2 MOCN (Multi-Operator Core Network) -- 4.15.3 MORAN (Mobile Operator Radio Access Network) -- 4.16 From Dipoles to Active Antennas and Gigabit Backhaul -- 4.17 IPv6 in Mobile Networks -- 4.17.2 IPv6 and International Roaming -- 4.17.3 IPv6 and Tethering -- 4.17.4 IPv6-Only Connectivity -- 4.18 Network Function Virtualization -- 4.18.1 Virtualization on the Desktop -- 4.18.2 Running an Operating System in a Virtual Machine -- 4.18.3 Running Several Virtual Machines Simultaneously -- 4.18.4 Virtual Machine Snapshots -- 4.18.5 Cloning a Virtual Machine -- 4.18.6 Virtualization in Data Centers in the Cloud -- 4.18.7 Managing Virtual Machines in the Cloud -- 4.18.8 Network Function Virtualization -- 4.18.9 Virtualizing Routers -- 4.18.10 Software-Defined Networking -- 4.19 Machine Type Communication and the Internet of Things -- 4.19.1 LTE Cat-1 Devices -- 4.19.2 LTE Cat-0 Devices and PSM -- 4.19.3 LTE Cat-M1 Devices -- 4.19.4 LTE NB1 (NB-IoT) Devices -- 4.19.5 NB-IoT - Deployment Options -- 4.19.6 NB-IoT - Air Interface -- 4.19.7 NB-IoT - Control Channels and Scheduling -- 4.19.8 NB-IoT Multicarrier Operation -- 4.19.9 NB-IoT Throughput and Number of Devices per Cell -- 4.19.10 NB-IoT Power Consumption Considerations -- 4.19.11 NB-IoT - High Latency Communication…”
    Libro electrónico
  10. 4050
    por Ferrer Martínez, Juan
    Publicado 2015
    Tabla de Contenidos: “….) -- 2.3.1 XAML -- 2.3.2 XUL -- 2.3.3 UIML -- 2.3.4 SvG -- 2.3.5 MXML -- 2.4 HERRAMIENTAS LIBRES Y PROPIETARIAS (...) -- 2.4.1 GLADE -- 2.4.2 BLEND PARA vISUAL STUDIO -- 2.5 PALETAS Y VISTAS -- 2.5.1 GLADE -- 2.5.2 BLEND PARA VISUAL STUDIO -- 2.6 COMPONENTES CONTENEDORES DE CONTROLES -- 2.6.1 GLADE -- 2.6.2 BLEND PARA vISUAL STUDIO -- 2.7 CONTROLES, PROPIEDADES -- 2.8 UBICACIÓN, TAMAÑO Y ALINEAMIENTO DE CONTROLES -- 2.9 EVENTOS, CONTROLADORES. …”
    Libro electrónico
  11. 4051
    Publicado 2020
    “…This book will be updated to comprehensively include SAN Volume Controller SA2 and SV2 and FlashSystem 7200 in due course…”
    Libro electrónico
  12. 4052
  13. 4053
    Publicado 2015
    “…Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. …”
    Libro electrónico
  14. 4054
    Publicado 2013
    “…Como en tantas otras ocasiones, el Diccionario de Autoridades (1726, s.v. architectura) roza la perfección: Ciéncia que enseña à edificar tales fábricas, que puedan commodamente habitar en ellas los hombres, atendiendo à su firmeza, conveniéncia y hermosúra, proporcionándolas al fin para que se erígen. …”
    Enlace del recurso
    Electrónico