Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Politics 74
- Sociology 72
- Political Science 62
- Philosophy 52
- Historia 48
- Cultural Studies 47
- Culture 47
- Literatura alemana 45
- History 38
- Data processing 35
- WebSphere 35
- Society 34
- Computer programs 33
- Història 33
- Media 33
- Cultural History 29
- Literature 28
- Body 26
- Management 25
- Political Sociology 25
- Political Theory 25
- Biblia 24
- Computer networks 24
- Artificial intelligence 23
- Literary Studies 23
- Education 22
- Filosofía 22
- Political Philosophy 22
- Development 21
- Media Studies 21
-
2121
-
2122Publicado 2016“…The book also includes a DVD with video clips demonstrating the strategies covered in the intervention chapters (chapters 2, 4, 5, 6, 7, 8, 9, and 11)"…”
Libro -
2123
-
2124Publicado 2015Tabla de Contenidos: “…Based Backbones 247 -- 5.6.7 Network Architecture for an MVNO?]Based Solution 250 -- References 252 -- 6 Radio Spectrum for PPDR Communications 257 -- 6.1 Spectrum Management: Regulatory Framework and Models 257 -- 6.1.1 Global?]…”
Libro electrónico -
2125Publicado 2023Tabla de Contenidos: “…_n9qj12nimnud -- _u3zsy9ghriq1 -- _u49m72w72jfc -- _4vecb9wpuoy4 -- _o04e1xqcrjch -- _8vfe22j2bs1h -- _4lpsryeya2wf -- _jnnlz3j5x9lw -- _i75sfh4xg2rh -- _qndcwush8uvn -- _jdcaozqcp8ii -- _wgt115spv497 -- _xv21p2as6xqh -- _4lpsryeya2wf -- _1kwtqhhigo80 -- _3tdmd243hsu -- _i6esk6mjh8fs -- _htsa97mcg1w -- _tau1nybrv5ge -- _iaz58ljy7ibc -- _wsm3rd1byrg3 -- _2s6qc3xm9d1f -- _nak2hjnv42pp -- _7lslq1dgm8vj -- _96d19a6k54h3 -- _nak59eripdqp -- _5cuybx7mhklo -- _wrkg4agzgs6d -- _du0hzgk144i0 -- _f72voabs3jk1 -- _wc6nebm47ozp -- _1h49ohoxrf4z -- _u0r72pcfwdzx -- _21dfc5x6eker -- _favkpklvh7xl -- _uexqt33aevgs -- _boixjt4c1em0 -- _mxkiyrla8g3q -- _756evh5r3saa -- _nf47hpylx7b1 -- _fbx77zh5fe4u -- _ccr3jxut0npg -- _mfmbplhqjx5o -- _gye6m72rtk7d…”
Libro electrónico -
2126Publicado 2024Tabla de Contenidos: “…4.8 Use of the Wireshark Sniffer Tool -- 4.9 Promiscuous Detection Tool: PromqryUI -- 4.9.1 Ping Method -- 4.9.2 Internet Control Message Protocol (ICMP) Test -- 4.9.3 Forged MAC Address Test -- 4.9.4 WIFI Security Alert -- 4.10 Countermeasures for Sniffing -- 4.11 Conclusion -- 4.12 Future Enhancement -- Chapter 5 Unraveling the Impact of Social Engineering on Organizations -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Conceptual Framework -- 5.4 Types of Social Engineering Attacks -- 5.5 Effects of Social Engineering on Organisations -- 5.6 Prevention Techniques against Social Engineering for Organisations -- 5.7 Illustrative Scenarios for Social Engineering Attacks -- 5.8 Case Study of Social Engineering -- 5.9 Conclusion -- Chapter 6 Impacts of Social Engineering on E-Banking -- 6.1 Introduction -- 6.2 Literature Survey -- 6.3 Potential Social Engineering Risks in E-Banking -- 6.4 Ontology Model of Social Engineering Attacks on E-Banking -- 6.5 Digital Transaction Scams -- 6.6 How to Fight Against Social Engineering Attacks on E-Banking -- 6.7 Detection and Prevention Techniques -- 6.8 Conclusion -- Chapter 7 The Art of Deception: Unmasking the Tools and Psychological Principles Behind Social Engineering -- 7.1 Introduction -- 7.1.1 Information Gathering -- 7.1.2 Establishing the Relationship -- 7.1.3 Exploitation Phase -- 7.1.4 Execution Phase -- 7.2 Tools and Techniques -- 7.2.1 Phishing -- 7.2.2 Baiting -- 7.2.3 Pretexting -- 7.2.4 Quid Pro Quo -- 7.2.5 Scareware -- 7.2.6 Diversion Theft -- 7.2.7 Tailgating -- 7.3 Social Engineering Toolkit -- 7.3.1 Attacks -- 7.4 Psychological Principles of Social Engineering -- 7.4.1 The Reciprocity Principle -- 7.4.2 The Need and Greed Principle -- 7.4.3 The Authority Principle -- 7.4.4 The Flattery Principle -- 7.4.5 The Consistency Principle -- 7.4.6 The Herd Principle -- 7.5 Conclusion…”
Libro electrónico -
2127Publicado 2003Tabla de Contenidos: “…Clustering applications scenarios -- 5.1 Testing the switch adapter failover -- 5.1.1 Scenario description -- 5.1.2 Logical interface down and detach scenario -- 5.1.3 Logical interface detach -- 5.1.4 Cable disconnected scenario -- 5.2 VSD implementation on an HPS -- 5.2.1 Scenario description -- 5.2.2 Our environment -- 5.2.3 VSD installation -- 5.2.4 Creating the RSCT peer domain -- 5.2.5 Designating the VSD nodes -- 5.2.6 Creating the VSD -- 5.2.7 VSD verification -- 5.2.8 VSD failover -- 5.3 GPFS on VSD -- 5.3.1 Our environment -- 5.3.2 GPFS software installation and configuration -- 5.3.3 GPFS verification -- 5.3.4 GPFS failover scenario -- Part 3 Appendixes -- Appendix A. …”
Libro electrónico -
2128por Arrell, KathrynTabla de Contenidos: “…Installing CRS and RAC -- 5.1 VM set up -- 5.2 Linux setup -- 5.2.1 Setting the kernel values -- 5.2.2 Moving the scripts to both nodes -- 5.2.3 Creating the raw devices -- 5.2.4 Create Oracle account -- 5.2.5 Set up logical volumes -- 5.2.6 Making symbolic links -- 5.2.7 Binding the raw devices -- 5.2.8 Set up the /etc/host file -- 5.2.9 Set up ssh to work without password -- 5.3 Preparation review -- 5.4 Oracle CRS installation -- 5.4.1 Cleaning up CRS if you need to reinstall -- 5.5 Oracle RAC installation -- 5.5.1 VIP configuration -- 5.6 Oracle Database creation -- 5.6.1 Setting up the user profile -- Chapter 6. …”
Publicado 2005
Libro electrónico -
2129Publicado 2015Tabla de Contenidos: “…Machine generated contents note: Contents Forward Preface 1 -- INTRODUCTIONS AND MOTIVATION 1.1 Introduction 1.2 The book 1.2.1 Objectives 1.2.2 Benefits 1.2.3 Organization 1.2.4 Book Cover 1.2.5 Impact of C-IoT 1.2.6 Summary 1.3 C-IoT Terms of References 1.3.1 Introduction 1.3.2 Need for IoT Framework 1.3.3 C-IoT Domains and Business Apps Model 1.3.4 C-IoT Roadmap 1.3.5 C-IoT Platform and Developer Community 1.3.6 C-IoT Opportunities for Business apps, solutions and systems 1.4 The Future 1.4.1 General Trends 1.4.2 Point Solutions 1.4.3 Collaborative IoT 1.4.4 C-IoT and RFID 1.4.5 C-IoT and Nanotechnology 1.4.6 Cyber-Collaborative IoT (C2-IoT) 1.4.7 C2-IoT and EBOLA Case 1.4.8 Summary 2 -- APPLICATION REQUIREMENTS 2.1 C-IOT Landscape 2.1.1 C-IoT Model and Architecture Layers 2.1.2 C-IoT Model and Enabling Technologies 2.1.3 Definition of key elements 2.1.4 Requirement Considerations 2.1.5 C-IoT System Solution - Requirement Considerations 2.2 Applications Requirement - Use Cases 2.3 Health & Fitness (Lead Example) 2.3.1 Landscape 2.3.2 Health & Fitness - Sensing Requirements 2.3.3 Health & Fitness - Gateway Requirements 2.3.4 Health & Fitness - Service Requirements 2.3.5 Health & Fitness - Solution Considerations 2.3.6 Health & Fitness - System Considerations 2.3.7 Health & Fitness and Hospitals 2.4 Video Surveillance 2.4.1 Landscape 2.4.2 Video Surveillance - Across Home, Industry and Infrastructure 2.4.3 Video Surveillance - Sensing Requirements 2.4.4 Video Surveillance - Gateway Requirements 2.4.5 Video Surveillance - Services 2.4.6 Example: Red Light Camera - Photo Enforcement Camera 2.4.7 Conclusion 2.5 Smart Home & Building 2.5.1 Landscape 2.5.2 Requirement 2.5.3 Home - Sensing Requirements 2.5.4 Home - Gateway Requirements 2.5.5 Home - Services 2.6 Smart Energy 2.6.1 Landscape 2.6.2 Requirements 2.6.3 Smart Energy - Sensing Requirements 2.6.4 Smart Energy - Gateway Requirements 2.6.5 Smart Energy - Services 2.6.6 The Smart Energy App 2.6.7 Smart Energy and Network Security 2.7 Track & Monitor 2.7.1 Landscape 2.7.2 Track & Monitory - Sensing Requirements 2.7.3 Track & Monitor - Services 2.7.4 Track & Monitor - Solution Considerations 2.7.5 Track & Monitor - Examples 2.8 Smart Factory/Manufacturing 2.8.1 Factory Automation - Robot 2.8.2 Caregiver and Robot 2.8.3 Industrial Robot 2.9 Others: Smart Car, Smart Truck and Smart City 2.9.1 Smart Car 2.9.2 Smart Roadside 2.9.3 Drone 2.9.4 Machine Vision 2.9.5 Smart City 3 -- C-IOT APPLICATIONS AND SERVICES 3.1 Smart IoT Application Use Cases 3.1.1 Health monitoring - Individual level (Fitness/Health Tracking wearables) 3.1.2 Health Monitoring at Business level (used in clinic) 3.1.3 Home and Building Automation - Individual level (Smart Home) 3.1.3.1 Smart Thermostat (Smart Energy Management) 3.1.3.2 Smart Smoke Alarm (Safety) 3.1.3.3 Smart IP Camera for Video Surveillance (Security) 3.1.3.4 Smart Service Robots at Consumer level - Roombas iRobot 3.1.3.5 Smart Home Gateway (Scalable for Smart Building Automation) 3.1.3.6 Smart Building Automation 3.1.4 Smart Energy and Smart Grid 3.1.5 Smart Energy Gateways 3.1.6 Industrial and Factory Automation 3.1.7 Smart Transportation & Fleet Logistics (Connected Cars - V2X: V2V, V2I) 3.1.8 Smart City 3.2 Smart IoT Platform 3.2.2 Smart IoT Software Gateway Platform 3.2.3 Smart Sensor Fusion Platform 3.3 Secured C-IoT Software Platform 3.3.1 C-IoT Security - Example on Smart Energy 3.3.2 Securing NAN (Metrology-to-Concentrator) 3.3.3 Securing Home Area Network (HAN) 3.3.4 Securing WAN (Concentrator-to-Sub Station/Utility Servers) 3.3.5 Platform Solution for Concentrator 3.3.6 Platform Solution for Sub Station/Utility Servers 3.3.7 Network Topology and IP Addressing: WAN 3.3.8 Security on the Concentrator and Utility Servers 3.3.9 Summary on C-IoT Security 4 -- IOT REFERENCE DESIGN KIT 5 -- C-IOT CLOUD-BASED SERVICES AND END DEVICE DIVERSIITY 5.1 C-IoT Cloud Based Services 5.1.1 Introduction and Drivers to C-IoT Service Platform 5.1.2 Classes of C-IoT Cloud Computing 5.1.3 C-IoT Innovative and Collaborative Services 5.1.4 The Emerging Data Centre LAN 5.2 C-IoT User Device Diversity 5.2.1 Introduction 5.2.2 C-IoT Developers/Platform 5.2.3 Wearable Devices - Individual 5.2.4 Harvesting (Self-powered nodes) - Infrastructure Applications 5.2.5 Embedded Devices and Servers 5.2.6 Performing Sentiment Analysis Using Big Data 5.2.7 Far-Reaching Consequence 5.2.8 Collaboration 6 -- IMPACT OF C-IOT AND TIPS 6.1 Impact on Business Process Productivity and Smart of Digital Life 6.1.1 Individual 6.1.2 Industry 6.1.3 Infrastructure 6.2 Considerations of developing Differentiated C-IoT Solutions 6.2.1 Software Processes and Platform 6.2.3 Standardization 6.2.4 Advertising Ecosystem Value Exchange 6.2.5 Opportunity with Industry Supply Chain for Material Handling 6.3 Practical Tips in maintaining Digital Life Style 6.3.1 Mobile and Wearable Computing 6.3.2 Robotics and Automation 6.3.3 Sensors and C-IoT 6.3.4 BIG Data and Predictive Analysis 6.3.5 The Changing Workforce 6.3.6 Sustainability 7 -- CONCLUSION 7.1 Simple C-IoT Domains and Model 7.2 Disruptive Business Applications of C-IoT 7.3 A New LifeStyle 7.4 Development Platform 7.5 C-IoT emerging Standards, Consortiums and other Initiatives 7.5.1 C-IoT Emerging Standards 7.5.2 C-IoT Emerging Consortiums 7.5.3 Forums, Workshops, and other Initiatives 7.5.4 C-IoT and Radio Communications 7.5.5 C-IoT and Nanotechnology 7.5.6 C-IoT and Security 7.6 Final Note References About the Authors Index …”
Libro electrónico -
2130Publicado 2022Tabla de Contenidos: “…4.3.1 Getting buy-in and initiating opportunities to test API designs -- 4.3.2 Taking advantage of existing sessions -- 4.3.3 Establishing your own sessions -- 4.4 Testing API designs as part of a testing strategy -- Summary -- 5 Exploratory testing APIs -- 5.1 The value of exploratory testing -- 5.1.1 The testing cycle in exploratory testing -- 5.2 Planning to explore -- 5.2.1 Generating charters -- 5.2.2 Charters and exploratory testing sessions -- 5.2.3 Organizing our exploratory testing -- 5.3 Exploratory testing: A case study -- 5.3.1 Beginning the session -- 5.3.2 Knowing when something isn't right -- 5.3.3 Coming up with ideas for testing -- 5.3.4 Using tools -- 5.3.5 Note-taking -- 5.3.6 Knowing when to stop -- 5.3.7 Running your own exploratory testing session -- 5.4 Sharing your discoveries -- 5.5 Exploratory testing as part of a strategy -- Summary -- 6 Automating web API tests -- 6.1 Getting value from automation -- 6.1.1 The illusion of automation -- 6.1.2 Automation as change detection -- 6.1.3 Letting risk be our guide -- 6.2 Setting up a Web API automation tool -- 6.2.1 Dependencies -- 6.2.2 Structuring our framework -- 6.3 Creating automated API checks -- 6.3.1 Automated check 1: A GET request -- 6.3.2 Automated check 2: A POST request -- 6.3.3 Automated check 3: Combining requests -- 6.3.4 Running your automated tests as integration tests -- 6.4 Utilizing automation in our strategy -- Summary -- 7 Establishing and implementing a testing strategy -- 7.1 Establishing a strategy for our context -- 7.1.1 Identifying what's a priority -- 7.1.2 Different strategies for different contexts -- 7.2 Turning a testing strategy into a testing plan -- 7.2.1 Understanding your context's testability -- 7.2.2 Organizing and documenting a plan -- 7.2.3 Executing and reflecting on a plan -- 7.2.4 Evolving our strategy -- Summary…”
Libro electrónico -
2131
-
2132
-
2133
-
2134
-
2135
-
2136por Brisson, Mathurin-Jacques, 1723-1806Accés lliure via BiPaDi
Publicado 1796
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Libro -
2137
-
2138Publicado 2002Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Biblioteca Universidad de Deusto, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Diocesana de Salamanca, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de la Universidad de Navarra, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro
-
2139
-
2140Simulation of Spray Polymerisation and Structure Generation in Spray Drying by Single Droplet ModelsPublicado 2022Tabla de Contenidos: “…40 -- 3 Modelling of Reactive Droplet Drying and Polymerisation 41 -- 3.1 Transport in a Reaction-Diffusion System 42 -- 3.1.1 Constant Physical Properties. 44 -- 3.1.2 Consideration of Mixture Effects . 46 -- 3.1.3 Diffusion and Reaction Driven Convection at Variable -- Molar Weights47 -- 3.1.4 Transport of Polymer - Quasi-Steady-State Assumption . 50 -- 3.1.5 Transport of Statistical Moments . 52 -- 3.2 Lumped Modelling - 0D approach 56 -- 3.2.1 General Equations for Reactive Spray Drying57 -- 3.2.2 Spray Polymerisation - Quasi-Steady-State Assumption 58 -- 3.2.3 Spray Polymerisation - Method of Moments. 59 -- 3.3 Distributed Modelling - 1D approach. 60 -- 3.3.1 General Equations of the Droplet Continuum60 -- 3.3.2 Boundary Conditions . 62 -- 3.3.3 Spray Polymerisation - QSSA66 -- 3.3.4 Spray Polymerisation - Method of Moments. 68 -- 3.4 Comparison with Existing Models 69 -- 3.5 Implementational Considerations . 70 -- 3.5.1 Implementation of the Moving Boundary Problem . 70 -- 3.5.2 Boundary Conditions . 71 -- 3.5.3 Treatment of Convection Terms . 72 -- 3.5.4 Implementation of Diffusion. 75 -- 3.6 Verification of the Transport Approach76 -- 3.6.1 Diffusion Driven Convection, Constant Properties 76 -- 3.6.2 Diffusion Driven Convection, Variable Molar Weight 79 -- 3.6.3 Diffusion Driven Convection, Excess Volumes . 82 -- 3.6.4 Reaction Induced Convection85 -- 4 Simulation of Spray Polymerisation 87 -- 4.1 Kinetics and Process Conditions . 88 -- 4.2 Lumped Simulation of Droplet Polymerisation 92 -- 4.2.1 Principle Course of the Process - -- Plain Kinetics, no Monomer Evaporation 92 -- 4.2.2 Effects of Kinetics on the Process 94 -- 4.3 Spatial Effects in Droplet Polymerisation 98 -- 4.3.1 Effect of the Diffusion Coefficient on Concentration Gradients . 99 -- 4.3.2 Inhomogeneities of the Product at Small Diffusion Coefficients, Effect of Moments' Diffusion . 102 -- 4.3.3 Effect of Monomer Evaporation . 106 -- 4.3.4 Pre-polymerisation Before Atomisation . 111 -- 4.3.5 Polymerisation at Elevated Monomer Content in the Drying Gas 116 -- 4.3.6 Influence of Non-Ideality of Activities 122 -- 4.3.7 Interaction with the drying gas125 -- 4.3.8 Applicability of the QSSA model 131 -- 4.4 Summary of Basic Findings on Droplet Polymerisation . 133 -- 4.5 Process Evaluation, Numerical DoEs. 135 -- 4.5.1 DoEs' Setup and Evaluation. 135 -- 4.5.2 Droplet Polymerisation with Solvent in the Feed 138 -- 4.5.3 Bulk Polymerisation within a Droplet 142 -- 4.5.4 Bulk Feed with Pre-Polymerisation before Atomisation . 149 -- 4.6 Discussion and Suggestions for Further Research 153 -- 5 SPH and its Application to Single Droplet Slurry Drying 155 -- 5.1 Mathematical Derivation . 156 -- 5.1.1 SPH Interpolation 156 -- 5.1.2 Integral Approximations . 159 -- 5.1.3 First Derivatives . 160 -- 5.1.4 Laplace-Operator and Divergence of Diffusive Fluxes 162 -- 5.1.5 General Second Derivatives. 165 -- 5.1.6 Choice of Kernel, Smoothing Length and Cut-off Radius 165 -- 5.1.7 Correction of the SPH Approximation 168 -- 5.2 Implementation of Boundary Conditions . 169 -- 5.2.1 Ghost Particles169 -- 5.2.2 Insertion of Boundary Conditions into SPH Equations . 171 -- 5.2.3 Repulsive Forces as Hard Sphere Boundaries172 -- 5.3 Hydrodynamics of an Incompressible Liquid in SPH173 -- 5.3.1 Continuity Equation, Density Evaluation 173 -- 5.3.2 Momentum Balance . 175 -- 5.3.3 Weakly Compressible SPH 178 -- 5.4 Incompressible SPH 179 -- 5.4.1 Boundary Conditions in ISPH182 -- 5.4.2 Boundaries by the Ghost Technique, Wall Boundaries 182 -- 5.4.3 Free Surface Boundaries in ISPH 183 -- 5.4.4 Modifications to ISPH in This Work . 184 -- 5.5 Surface Tension and Wetting . 189 -- 5.5.1 The Interparticle Force Approach 190 -- 5.5.2 The Concept of Surface-Lateral Particle Forces . 195 -- 5.6 Representation of the Solid Phase 200 -- 5.6.1 Primary Particles in the Slurry200 -- 5.6.2 Calculation of Crust Formation . 202 -- 5.7 Modelling of Drying Phenomena in SPH . 205 -- 5.7.1 Heat Conduction . 205 -- 5.7.2 Implementation of Linear Driving Force based Heat and -- Mass Transfer into SPH . 205 -- 5.7.3 Extension to the Second Drying Period . 208 -- 5.7.4 Treatment of Evaporation Concerning Particle Mass and -- Deletion 209 -- 5.7.5 Modelling of Diffusion Driven Drying Involving the Gas -- Phase . 210 -- 5.8 Time Integration 213 -- 5.8.1 Stability Criteria in Explicit Time Stepping. 214 -- 5.8.2 Time Stepping Criteria Employed in This Work and Their -- Reference Length . 216 -- 5.8.3 Implicit Solution of Diffusive Equations . 218 -- 5.8.4 Initialisation of an SPH Calculation . 220 -- 6 Validation of the SPH Implementation 221 -- 6.1 Implicit Solution of Heat Conduction. 221 -- 6.2 Heat and Mass Transfer by Linear Driving Forces 224 -- 6.2.1 Heat Transfer to a Unilaterally Heated Rod. 224 -- 6.2.2 Coupled Heat and Mass Transfer: Droplet Evaporation . 226 -- 6.3 Diffusion Driven Drying by SPH-Grid Coupling . 228 -- 6.4 SPH Flow Solver . 230 -- 6.4.1 ISPH Solution of a Standing Water Column. 230 -- 6.4.2 Free Surface Flow 231 -- 6.4.3 Surface Tension Approach of Pairwise Forces234 -- 6.4.4 Wetting Phenomena . 237 -- 7 Simulation of Structure Evolution During Drying 243 -- 7.1 Simulation of the First Drying Period243 -- 7.2 Simulation of Crust Formation 245 -- 7.2.1 Simulation of the Second Drying Period without Crust -- Formation . 245 -- 7.2.2 Crust Formation by Caught on First Touch. 247 -- 7.2.3 Crust Formation Determined by the Water Content . 249 -- 7.2.4 Effect of the Density Correction . 250 -- 7.3 Influence of Adjustable Parameters on the Structure. 251 -- 7.4 Effect of the Temperature . 256 -- 7.5 Variation of the Resolution 259 -- 7.6 Drying of a Microporous Structure 261 -- 7.7 Comments on numerical efficiency 267 -- 8 Conclusion 269 -- A Numerical Regression by Gaussian Processes 273 -- B FVM Implementation of the Droplet Polymerisation Model 277 -- C Implementational Aspects of SPH 281 -- C.1 Neighbourhood Search281 -- C.1.1 Linked List 281 -- C.1.2 Verlet List . 282 -- C.2 Performance Aspects, Memory Alignment 282.…”
Libro electrónico