Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 692
- Biblia 428
- Teología dogmática 281
- Moral cristiana 280
- Derecho canónico 256
- Teología 222
- Obras anteriores a 1800 201
- Iglesia Católica 197
- Documentales 187
- Data processing 165
- obras anteriores a 1800 162
- Sermones 156
- Management 154
- Computer networks 149
- Development 135
- Crítica e interpretación 115
- Tomás de Aquino 112
- Application software 109
- Computer programs 100
- Mathematical models 98
- Design and construction 96
- Engineering & Applied Sciences 95
- Derecho 93
- Derecho civil 91
- Historia eclesiástica 88
- Artificial intelligence 86
- Películas cinematográficas 83
- Security measures 83
- Filosofía 82
- WebSphere 81
-
2241por Špiláčková, Marie, 1972-Tabla de Contenidos: “…SOCIAL WORK AS AN ELEMENT OF ENTERPRISE SOCIAL POLICY METHODOLOGICALLY LED BY FMLSA OF CSSR 137 4.1 Characteristics of Enterprise Social Work and its Methods 139 4.2 Methods of Social Work in Enterprise Practice 144 4.3 Social Worker as an Agent of Enterprise Social Work 146 4.3.1 Main Tasks of Social Workers in Organisations 149 4.4 Employee as a Subject of Enterprise Social Work 151 4.5 Strengths and Weaknesses of Comprehensive Programmes of Care for Workers 153 4.6 Importance of Enterprise Social Work 157 4.7 The Role of the Social Workers' Society in Application and Development of Enterprise Social Work 159 5. …”
Publicado 2020
Libro electrónico -
2242Publicado 2022Tabla de Contenidos: “…-- 1 Introduction -- 2 A Green New Deal Arising in Europe and USA -- 3 Brief History of the Green New Deal -- 4 Great Transformation in the Last Decade -- 4.1 Electricity and Energy Sector -- 4.2 Transportation Sector -- 4.3 Share Economy Sector -- 4.4 Major Progress in Other Related Sectors -- 5 Power to the People -- 6 Directing Toward the Green New Deal in an ``After COVID-19 ́ ́ World -- References -- Energy Democracy for Energy Transition in South Korea?…”
Libro electrónico -
2243por Meurer, MichaelaTabla de Contenidos: “…« - Praktiken und Normen des Extraktivismus -- 4.1.1 Sammelwirtschaft -- 4.1.2 Jagd und Fischfang -- 4.1.3 Landwirtschaft und Besitzbeziehungen -- 4.2 Formale Aspekte der normativen Ordnungen im Vergleich -- 4.2.1 Aushandlungsprozesse im Verwaltungsgremium -- 4.2.2 Aushandlungsprozesse in den Gemeinden -- 4.2.3 Die Bewohner*innen im staatlichen Recht und das Informelle im Formellen -- 4.3 »Meine 100 Hektar« - Interdependenzen im Rechtspluralismus -- 4.3.1 100 Hektar im Kontext der brasilianischen Landreform -- 4.3.2 100 Hektar in den Regelkomplexen -- 4.3.3 Zur Verzahnung normativer Ordnungen -- 4.4 Fazit - Der neue Rechtspluralismus -- 5. …”
Publicado 2021
Tesis -
2244
-
2245Publicado 2013Tabla de Contenidos: “…2.4.5 Printers -- 2.4.6 Telecommunications Equipment -- 2.4.7 Digital Cameras -- 2.4.8 Character Codes -- 2.5 SUMMARY -- 3 THE DIGITAL LOGIC LEVEL -- 3.1 GATES AND BOOLEAN ALGEBRA -- 3.1.1 Gates -- 3.1.2 Boolean Algebra -- 3.1.3 Implementation of Boolean Functions -- 3.1.4 Circuit Equivalence -- 3.2 BASIC DIGITAL LOGIC CIRCUITS -- 3.2.1 Integrated Circuits -- 3.2.2 Combinational Circuits -- 3.2.3 Arithmetic Circuits -- 3.2.4 Clocks -- 3.3 MEMORY -- 3.3.1 Latches -- 3.3.2 Flip-Flops -- 3.3.3 Registers -- 3.3.4 Memory Organization -- 3.3.5 Memory Chips -- 3.3.6 RAMs and ROMs -- 3.4 CPU CHIPS AND BUSES -- 3.4.1 CPU Chips -- 3.4.2 Computer Buses -- 3.4.3 Bus Width -- 3.4.4 Bus Clocking -- 3.4.5 Bus Arbitration -- 3.4.6 Bus Operations -- 3.5 EXAMPLE CPU CHIPS -- 3.5.1 The Intel Core i7 -- 3.5.2 The Texas Instruments OMAP4430 System-on-a-Chip -- 3.5.3 The Atmel ATmega168 Microcontroller -- 3.6 EXAMPLE BUSES -- 3.6.1 The PCI Bus -- 3.6.2 PCI Express -- 3.6.3 The Universal Serial Bus -- 3.7 INTERFACING -- 3.7.1 I/O Interfaces -- 3.7.2 Address Decoding -- 3.8 SUMMARY -- 4 THE MICROARCHITECTURE LEVEL -- 4.1 AN EXAMPLE MICROARCHITECTURE -- 4.1.1 The Data Path -- 4.1.2 Microinstructions -- 4.1.3 Microinstruction Control: The Mic-1 -- 4.2 AN EXAMPLE ISA: IJVM -- 4.2.1 Stacks -- 4.2.2 The IJVM Memory Model -- 4.2.3 The IJVM Instruction Set -- 4.2.4 Compiling Java to IJVM -- 4.3 AN EXAMPLE IMPLEMENTATION -- 4.3.1 Microinstructions and Notation -- 4.3.2 Implementation of IJVM Using the Mic-1 -- 4.4 DESIGN OF THE MICROARCHITECTURE LEVEL -- 4.4.1 Speed versus Cost -- 4.4.2 Reducing the Execution Path Length -- 4.4.3 A Design with Prefetching: The Mic-2 -- 4.4.4 A Pipelined Design: The Mic-3 -- 4.4.5 A Seven-Stage Pipeline: The Mic-4 -- 4.5 IMPROVING PERFORMANCE -- 4.5.1 Cache Memory -- 4.5.2 Branch Prediction -- 4.5.3 Out-of-Order Execution and Register Renaming…”
Libro electrónico -
2246por Kammermann, MarkusTabla de Contenidos: “…Auflage -- Kapitel 2: Vorbereitung auf CompTIA A+ -- 2.1 Prüfen Sie Ihr Wissen -- 2.2 Fragen zu einem Computersystem -- 2.2.1 Die Front eines PC-Systems -- 2.2.2 Rückseitige Anschlüsse -- 2.2.3 Blick auf das Mainboard -- Teil I: Alles Blech oder was -- Kapitel 3: Vom Bit bis zum Personal Computer -- 3.1 Die Welt der Elektronik -- 3.1.1 Darstellung von Zahlen -- 3.1.2 Darstellung von Texten -- 3.1.3 Darstellung von Bildern -- 3.1.4 Darstellung von Tönen -- 3.2 Ganz klein und ganz groß -- 3.3 Der Personal Computer -- 3.4 Vom Laptop bis zum Smartphone -- 3.5 Smart sind die Geräte -- 3.5.1 Unterhaltung -- 3.5.2 Wearable Computer -- 3.6 Fragen zu diesem Kapitel -- Kapitel 4: Einblick in die Systemarchitektur -- 4.1 Die Systemzentrale: Der Prozessor -- 4.1.1 Single Core, Dual Core, noch mehr Core -- 4.1.2 Intel Core i und AMD Zen -- 4.1.3 Sockel für Prozessoren -- 4.1.4 Die technische Funktion der CPU -- 4.1.5 Der Cache -- 4.2 Mainboard-Komponenten -- 4.2.1 Das Chipset -- 4.2.2 Der DMA-Controller -- 4.2.3 Der Interrupt-Controller -- 4.2.4 Der Taktgeber -- 4.2.5 Mainboard-Formfaktoren -- 4.3 Der Arbeitsspeicher -- 4.3.1 Aufbau von RAM-Bausteinen -- 4.3.2 Aktuelle RAM-Typen hören auf den Namen DDR -- 4.3.3 Single Channel, Dual Channel, Quad Channel -- 4.3.4 Bauformen -- 4.3.5 Was folgt nach DDR5? …”
Publicado 2022
Libro electrónico -
2247Publicado 2018Tabla de Contenidos: “…3.3 Dynamics of Flow along a Streamline 192 -- 3.4 Applications of the Bernoulli Equation 202 -- 3.4.1 Flow through Orifices 203 -- 3.4.2 Flow Measurement 209 -- 3.4.3 Trajectory of a Liquid Jet 214 -- 3.4.4 Compressibility Effects 216 -- 3.4.5 Viscous Effects 218 -- 3.4.6 Branching Conduits 220 -- 3.5 Curved Flows and Vortices 222 -- 3.5.1 Forced Vortices 223 -- 3.5.2 Free Vortices 226 -- Key Equations in Kinematics and Streamline Dynamics 229 -- Problems 232 -- Chapter 4 Finite Control Volume Analysis 256 -- 4.1 Introduction 256 -- 4.2 Reynolds Transport Theorem 257 -- 4.3 Conservation of Mass 259 -- 4.3.1 Closed Conduits 263 -- 4.3.2 Free Discharges from Reservoirs 265 -- 4.3.3 Moving Control Volumes 267 -- 4.4 Conservation of Linear Momentum 268 -- 4.4.1 General Momentum Equations 269 -- 4.4.2 Forces on Pressure Conduits 273 -- 4.4.3 Forces on Deflectors and Blades 281 -- 4.4.4 Forces on Moving Control Volumes 282 -- 4.4.5 Wind Turbines 288 -- 4.4.6 Reaction of a Jet 293 -- 4.4.7 Jet Engines and Rockets 296 -- 4.5 Angular Momentum Principle 298 -- 4.6 Conservation of Energy 307 -- 4.6.1 The First Law of Thermodynamics 308 -- 4.6.2 Steady-State Energy Equation 309 -- 4.6.3 Unsteady-State Energy Equation 320 -- Key Equations in Finite Control Volume Analysis 323 -- Problems 327 -- Chapter 5 Differential Analysis 357 -- 5.1 Introduction 357 -- 5.2 Kinematics 358 -- 5.2.1 Translation 358 -- 5.2.2 Rotation 360 -- 5.2.3 Angular Deformation 363 -- 5.2.4 Linear Deformation 363 -- 5.3 Conservation of Mass 365 -- 5.3.1 Continuity Equation 365 -- 5.3.2 The Stream Function 372 -- 5.4 Conservation of Momentum 375 -- 5.4.1 General Equation 376 -- 5.4.2 Navier-Stokes Equation 379 -- 5.4.3 Nondimensional Navier-Stokes Equation 381 -- 5.5 Solutions of the Navier-Stokes Equation 385 -- 5.5.1 Steady Laminar Flow Between Stationary Parallel Plates 385.…”
Libro electrónico -
2248por Lewis, Ted G.Tabla de Contenidos: “…-- 4.2 The North American Grid -- 4.2.1 Grid Structure -- 4.2.2 ACE and Kirchhoff's Law -- 4.2.3 Anatomy of a Blackout -- 4.3 Threat Analysis -- 4.3.1 Attack Scenario 1: Disruption of Fuel Supply to Power Plants -- 4.3.2 Attack Scenario 2: Destruction of Major Transformers -- 4.3.3 Attack Scenario 3: Disruption of SCADA Communications -- 4.3.4 Attack Scenario 4: Creation of a Cascading Transmission Failure -- 4.4 From Death Rays to Vertical Integration -- 4.4.1 Early Regulation -- 4.4.2 Deregulation and EPACT 1992 -- 4.4.3 Electricity Sector ES-ISAC -- 4.5 Out of Orders 888 and 889 Comes Chaos -- 4.5.1 Economics Versus Physics -- 4.5.2 What Increases SOC? …”
Publicado 2023
Libro electrónico -
2249Publicado 2018Tabla de Contenidos: “…8.3 CARACTERÍSTICAS DE LA PROGRAMACIÓN -- 8.3.1 PROGRAMACIÓN MODULAR -- 8.3.2 PROGRAMACIÓN ESTRUCTURADA -- 8.4 ESTRUCTURAS BÁSICAS DE CONTROL -- 8.4.1 SECUENCIA 8.4.2 SELECCIÓN -- 8.4.2 SELECCIÓN -- 8.4.3 ITERACIÓN -- 8.4.4 ACUMULADORES 8.4.3 ITERACIÓN -- 8.5 ETAPAS DE LA PROGRAMACIÓN 8.6 DIAGRAMA DE FLUJO -- 8.6 DIAGRAMA DE FLUJO -- 8.6.1 SÍMBOLOS BÁSICOS DE UN DIAGRAMA DE FLUJO -- 8.6.2 REGLAS PARA HACER DIAGRAMAS DE FLUJO CONECTOR EN DIFERENTE PÁGINA -- 8.6.3 EJEMPLOS DE DIAGRAMAS DE FLUJO -- 1. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2250Publicado 2018Tabla de Contenidos: “…3.3.2 Financial Liberalization in the Post Bretton Woods Era -- 3.4 Stylized Behaviour of Macroeconomic Variables During Episodes of Financial Crises -- 3.4.1 Financial Market Variables -- 3.4.1.1 Monetary Aggregates and Foreign Exchange Reserves -- 3.4.1.2 Deposits and Domestic Credit -- 3.4.1.3 Interest Rates -- 3.4.1.4 Equity and Real Estate Prices -- 3.4.2 Current Account Variables -- 3.4.3 Capital Account Variables -- 3.4.4 Real Sector Variables -- 3.4.5 Balance Sheet Variables -- 3.4.5.1 Liquidity and Profit Variables -- 3.4.5.2 Market Valuation and Solvency Variables -- 3.4.6 An Assessment -- 3.5 Standard Theory of Financial Crises and its Correspondence with the Stylized Facts -- 3.5.1 Inconsistent Macroeconomic Policy Models -- 3.5.2 Self-Fulfilling Expectations Models -- 3.5.3 Asymmetric Information Models -- 3.5.4 Credit Constraint and Balance Sheet Models -- 3.5.5 Endogenous Financial Crisis Models -- 3.5.6 An Assessment -- II A Cyclical Theory of Financial Crises -- 4 A Model of Financial Crises and Endogenous Fluctuations in Industrial Countries -- 4.1 The Real Side -- 4.2 The Financial Side -- 4.2.1 A Stylized Financial Structure -- 4.2.2 Financial Market Equilibria -- 4.3 Short-Run Comparative-Static Analysis -- 4.3.1 General Results -- 4.3.2 A Comparative-Static View of Financial Crises -- 4.4 Long-Run Dynamic Analysis -- 4.4.1 Finance, Investment and Long-Run Profit Expectations -- 4.4.2 The Local Dynamics of the System -- 4.4.3 Phase Diagram Analysis -- 4.4.4 The Global Dynamics of the System -- 4.4.5 A Dynamic View of Financial Crises and Macroeconomic Fluctuations -- 4.4.5.1 The Emergence of Endogenous Long-Run Equilibrium Business Cycles -- 4.4.5.2 The Emergence of Financial Crises -- 4.4.6 A Keynesian Perspective on Global Dynamics -- 4.5 A Comparison with Standard Theory of Financial Crises…”
Electrónico -
2251Publicado 2018Tabla de Contenidos: “…Solutions for Off-Chip Traffic -- 4.3. Solutions for Power Consumption -- 4.3.1. Integration -- 4.3.2. …”
Libro electrónico -
2252Publicado 2010Tabla de Contenidos: “…Das Verhältnis von Capability-Armut und sozialer Ausgrenzung . 205 -- 4.3. Reflexionen zur Empirie des CA . 208 -- 4.3.1. …”
Libro electrónico -
2253Publicado 2024Tabla de Contenidos: “…3.2 Chapter Contributions -- 3.3 Related Work -- 3.4 IoT Information Security -- 3.4.1 Background -- 3.4.2 System Model -- 3.5 Zero-Determinant Strategies -- 3.6 Game-Theoretic Transmission Strategy -- 3.6.1 Transmission Probability -- 3.6.2 Transmission Strategy -- 3.7 Extension to Multiple IoT Users -- 3.7.1 Zero-Determinant Strategies -- 3.7.2 Generalized Transmission Strategy -- 3.8 Numerical Results -- 3.8.1 Model Dynamics -- 3.8.2 Simulated Use Cases -- 3.9 Discussions -- 3.9.1 About the Game-Theoretic Approach -- 3.9.2 Conclusions -- References -- Chapter 4 Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure -- 4.1 Introduction -- 4.2 Related Work -- 4.2.1 Policies and SDN -- 4.2.2 Automatic Device Provisioning -- 4.2.3 Secure Device Provisioning -- 4.2.4 Machine Learning-based Classification of Devices -- 4.2.5 IoT Security and Attacks -- 4.3 Fundamentals of Policy-Based Network and Security Management -- 4.3.1 Policy -- 4.3.2 Policy-Based Network and Security Management -- 4.3.3 Policy-Based Management Architecture -- 4.3.4 Benefits of a Policy-Based Management Architecture -- 4.4 IoT Network Scenario -- 4.4.1 Types of Devices and Device Ontology -- 4.5 Policy-Driven Security Architecture -- 4.5.1 Device Provisioning? …”
Libro electrónico -
2254por Teichler, UlrichTabla de Contenidos: “…Carreras académicas y empleo; 4.3. Representación de los intereses del claustro académico; 4.4. …”
Publicado 2006
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2255por Sarrión Esteve, JoaquínTabla de Contenidos: “…Tutela de la dignidad humana: sentencia Omega (2004)4.3. Los derechos sociales frente a las libertades económicas; 4.3.1. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2256por Arcenegui, Jose AntonioTabla de Contenidos:
Publicado 2003Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2257por Götz Betancourt, Shirley ElizabethTabla de Contenidos: “…Adaptabilidad del entorno frente a la demanda peruana4.3. Reacoplamiento regional de la política exterior chilena (2006-2010); 4.3.1. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2258por Martinez Bonastre, OscarTabla de Contenidos: “…3.2.6 Control del Flujo3.2.7 Procedimientos; 3.2.8 Ámbito de las variables; 3.2.9 Arrays; 3.2.10 Listas; 3.2.11 Carga de Ficheros; 3.2.12 Ficheros Entrada / Salida; 4 FUNCIONAMIENTO EXTERNO DE NS-2; 4.1 Introducción; 4.2 Componentes del simulador.; 4.3 Inicio del simulador; 4.3.1 Obtención de una salida; 4.3.2 Configuración de eventos; 4.4 Nodos; 4.5 Enlaces; 4.5.1 Distribución de los enlaces; 4.6 Colas; 4.6.1 Tipos de colas.; 4.6.2 Configuración de colas.; 4.7 Agentes; 4.7.1 Agentes de transporte; 4.7.2 Agentes de aplicación; 4.8 Encaminamiento (routing); 4.8.1 Encaminamiento unicast…”
Publicado 2004
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2259por Davalos Fernandez, RodolfoTabla de Contenidos: “…Principio de Autonomía; 4.3. Bilateralidad…”
Publicado 2006
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2260por Ponce Cárdenas, JesúsTabla de Contenidos: “…EROS ORIENTAL: BELDADES TURCAS ENTRE EL HAMAM Y EL HAREM -- 4.3. RASGOS ELOCUTIVOS DE UN POEMARIO ORIENTALISTA -- 4.3.1. …”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico