Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,727
- Biblia 3,152
- Història 1,607
- Crítica e interpretación 1,592
- Filosofía 1,525
- Teología 1,411
- Bíblia 1,245
- Església Catòlica 1,077
- Liturgia 1,055
- Teología dogmática 1,048
- Iglesia Católica 959
- Moral cristiana 870
- Derecho canónico 855
- History 818
- Obres anteriors al 1800 783
- Sermones 760
- Biografías 649
- Derecho 618
- Litúrgia 572
- -Historia 564
- Management 560
- Engineering & Applied Sciences 545
- Matemáticas 525
- Música 522
- Teología moral 512
- Religión 509
- Medicina 506
- Teologia 504
- Patrística 480
- Historia y crítica 473
-
179601Publicado 2015Tabla de Contenidos: “…78 3.3 LTE meets Demands of Public Safety Networks 79 3.4 Wide Range of LTE Devices for Public Safety 80 3.5 Standalone versus Shared Deployments 81 3.6 Interworking 83 3.6.1 Device Aspects 83 3.6.2 Network Aspects 83 References 83 4 Proximity Services 85 4.1 Introduction to Proximity Services 85 4.1.1 Proximity Services Overview 85 4.1.2 ProSe Communication 86 4.1.3 ProSe Discovery 88 4.1.4 ProSe for Public Safety 88 4.2 Proximity Services Architectures 90 4.2.1 Non-roaming Architecture 90 4.2.2 Inter-PLMN Architecture 91 4.2.3 Roaming Architecture 91 4.2.4 Description of Functional Entities 93 4.2.5 Interfaces and Protocols 97 4.3 Synchronization 104 4.3.1 LTE Primary and Secondary Synchronization Signals 106 4.3.2 LTE D2D Synchronization 107 4.4 Service Authorization 108 4.5 ProSe Direct Discovery 109 4.5.1 ProSe Direct Discovery Models 110 4.5.2 ProSe Direct Discovery Modes 110 4.5.3 Direct Discovery Procedure for Model A 111 4.5.4 Radio Aspects and Physical Layer Design 112 4.5.5 Radio Resource Allocation for Direct Discovery 112 4.5.6 Inter-frequency ProSe Discovery 113 4.5.7 Announce Procedure (non-roaming) 114 4.5.8 Announce Procedure (roaming) 115 4.5.9 Monitor Procedure (non-roaming) 117 4.5.10 Monitor Procedure (roaming) 118 4.5.11 Match Procedure (non-roaming) 120 4.5.12 Match Procedure (roaming) 121 4.5.13 Direct Discovery Procedure for Model B 123 4.6 ProSe Direct Communication 123 4.6.1 Radio Aspects and Physical Layer Design 124 4.6.2 Radio Resource Allocation for Direct Communication 125 4.6.3 Inter-frequency ProSe Communication 127 4.6.4 IP Address Allocation 128 4.6.5 One-to-Many Communication (Transmission) 128 4.6.6 One-to-Many Communication (Reception) 130 4.6.7 Direct Communication via ProSe Relay 130 4.7 EPC-Level ProSe Discovery 131 4.7.1 EPC-Level ProSe Discovery Procedure 132 4.7.2 User Equipment Registration 133 4.7.3 Application Registration 134 4.8 Other Essential Functions for Proximity Services 135 4.8.1 Provisioning 135 4.8.2 Subscription Data 136 4.8.3 Security 136 4.8.4 Charging 138 4.8.5 ProSe-Related Identifiers 140 4.8.6 Illustration for Match Event 144 4.9 Deployment Scenarios 146 4.9.1 ProSe Direct Discovery 146 4.9.2 ProSe Direct Communication 147 4.10 Public Safety Use Cases 147 4.10.1 Use Cases for ProSe Communication 148 4.10.2 Use Cases for Network to UE Relay 149 4.10.3 Performance Characteristics 149 4.11 Outlook to Enhanced Proximity Services 150 4.12 Terms and Definitions 151 4.12.1 Home PLMN 151 4.12.2 Equivalent Home PLMN 151 4.12.3 Visited PLMN 151 4.12.4 Registered (Serving) PLMN 152 4.12.5 Local PLMN 152 4.12.6 Hybrid Adaptive Repeat and Request 152 4.12.7 Radio Link Control 152 4.12.8 Logical Channel Prioritization 153 4.12.9 System Information 153 4.12.10 OFDM Symbol 154 4.12.11 Dual-Rx UE 154 References 154 5 Group Communication Over LTE 157 5.1 Introduction to Group Communication Services 157 5.2 Group Communication System Enablers for LTE 158 5.3 Principles of Group Communication over LTE 159 5.4 Functional Entities 162 5.4.1 User Equipment 162 5.4.2 GCS AS 162 5.4.3 BM-SC 163 5.4.4 eNB, MME, S-GW, P-GW, PCRF 163 5.5 Interfaces and Protocols 163 5.5.1 MB2 Interface 163 5.5.2 Rx and SGi Interfaces 167 5.6 GCSE Functions 169 5.6.1 Unicast Delivery 169 5.6.2 MBMS Delivery 171 5.6.3 Service Continuity 172 5.6.4 Priority and Preemption 173 5.6.5 MBMS Delivery Status Notification 175 5.7 Establishment of MBMS Delivery 175 5.7.1 Pre-establishment 175 5.7.2 Dynamic Establishment 176 5.8 MBMS Delivery Procedures 179 5.8.1 MBMS Delivery Modification 179 5.8.2 MBMS Delivery Deactivation 181 5.8.3 TMGI Management 182 5.9 Access Control 183 5.10 Mission Critical Push To Talk 185 5.10.1 MCPTT Service Description 186 5.10.2 MCPTT Call Types 187 5.10.3 MCPTT Priorities 187 5.10.4 Shareable MCPTT Devices 188 5.10.5 On and Off Network Mode of Operation 188 5.10.6 Interworking with legacy PTT Systems 189 References 189 6 Summary and Outlook 191 6.1 Role of LTE 191 6.2 Public Safety Features 192 6.3 LTE for Public Safety 193 6.4 Outlook 196 References 196 Appendix A 197 A.1 Call Flows 197 A.1.1 Attach 197 A.1.2 Detach 200 A.1.3 Tracking Area Update 201 A.1.4 Paging 202 A.1.5 Service Request 203 A.1.6 X2-Based Handover 205 A.1.7 S1-Based Handover 206 A.1.8 MBMS Session Start 210 A.1.9 MBMS Session Stop 212 A.1.10 MBMS Session Update 213 A.1.11 UE-requested PDN Connectivity 214 A.1.12 Dedicated Bearer Context Activation 216 A.2 3GPP Reference Points 217 References 221 Index 223 …”
Libro electrónico -
179602por Moeller, MortenTabla de Contenidos: “…A.3.3 allow_policy -- A.3.4 select_policy -- A.3.5 gateway.lst -- A.3.6 login_policy -- A.3.7 after_policy -- A.3.8 sub_ep.sh -- A.3.9 ep_login_notif.sh -- A.3.10 run_ep_customization_task.sh -- A.4 DB2 monitoring deployment-related scripts -- A.4.1 create_db2_instance_objects.sh -- A.4.2 create_db2_database_objects.sh -- A.4.3 itm_db2_instance_rm_distrib.sh -- A.4.4 itm_db2_database_rm_distrib.sh -- A.5 WebSphere Application Server monitoring deployment files -- A.5.1 create_app_server.sh -- A.5.2 itm_was_rm_distrib.sh -- A.5.3 was_configure_tec_adapter.sh -- A.5.4 was_start_tec_adapter.sh -- A.5.5 was_stop_tec_adapter.sh -- A.6 TMTP monitoring deployment scripts -- A.6.1 addtoagentgroup.sh -- A.6.2 deployj2ee.sh -- A.7 Software Packages and related files -- A.7.1 Common scripts -- A.7.2 IBM HTTP Server v2.0.47 -- A.7.3 WebSphere Message Queuing Server v5.3 -- A.7.4 WebSphere Message Queuing Server v5.3 Fixpack 8 -- A.7.5 WebSphere Application Server v5.1 -- A.7.6 WebSphere Application Server v5.1 Fixpack 1 -- A.7.7 DB2 Server v8.2 -- A.7.8 TMTP Agent v5.3 -- A.7.9 WebSphere Caching Proxy v5.1 -- A.7.10 WebSphere Caching Proxy v5.1 Fixpack 1 -- A.7.11 TimeCard v5.1 -- A.8 APM related scripts and files -- A.8.1 ep_customization.sh -- A.8.2 Production_Outlet_Plan_v1.0.xml -- Appendix B. Obtaining the installation images -- IBM Business Partners -- Appendix C. …”
Publicado 2005
Libro electrónico -
179603Publicado 2004Tabla de Contenidos: “…Using the EQQUX000 and EQQUX002 exits -- The workstation analyzer (WSA) subtask -- Improving workstation analyzer throughput -- EQQUX000 and EQQUX002: Installation -- EQQUX000 and EQQUX002: Implementation -- JCL fetch from specific libraries -- Model JCL fetched from JCL libraries -- Model JCL fetched from storage -- Insertion of JCL cards before first EXEC or PROC statement -- Amend CLASS= on JOBCARD -- General usage notes -- How to define data store destinations on a per job basis with EQQUX002 -- Appendix B. Gathering statistics -- Gathering statistics -- Changing statistics gathering and more -- Using the job tracking log data -- Appendix C. …”
Libro electrónico -
179604por Hayashi, Kumiko, 1958-Tabla de Contenidos: “…Source code -- perfstat_dump_all.c -- perfstat_dude.c -- spmi_dude.c -- spmi_data.c -- spmi_file.c -- Spmi_traverse.c -- dudestat.c -- Appendix B. Trace hooks -- AIX 5L trace hooks -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index…”
Publicado 2005
Libro electrónico -
179605Publicado 2003Tabla de Contenidos: “…Using DB2 LOAD for the case study -- Planning the load -- Load the multipartition tables -- Load the single partition tables, region, and nation -- Run SET INTEGRITY -- Appendix B. MDC dimension analyzer -- Overview of the dimension analyzer -- The script evaluate_dimensions.ksh -- How average row size is obtained -- The skeleton SQL file, evaluate_dimensions.sql -- A real example of use -- Create a duplicate of the lineitem table -- First cut -- Second cut, generated columns -- Creating lineitem as MDC table -- Summary of results -- Listing of evaluate_dimensions.ksh…”
Libro electrónico -
179606Publicado 2005Tabla de Contenidos: “…Installation and setup -- Installation planning for the WebSphere environment -- WebSphere Application Server V5.1.1.1 requirements -- Installing WebSphere Application Server 5.1.1.1 -- Installation of Application Developer 5.1.2 -- Installation planning for the Microsoft .Net environment -- Appendix B. Additional material -- Locating the Web material -- Using the Web material -- System requirements for downloading and running the Web material…”
Libro electrónico -
179607Publicado 2018Tabla de Contenidos: “…Maathuis, Susann Bellmann, Jos M. B. M. van der Vossen, Dirk Berressem, Annalena Koehler, Susann Schwejda-Guettes, Barbara Gaigg, Angelika Kuchinka-Koch and John F. …”
Libro electrónico -
179608Publicado 2023Tabla de Contenidos: “…Timeline of the development of the Internet -- Appendix B. A Declaration of the Independence of Cyberspace by John Perry Barlow -- Appendix C. …”
Libro electrónico -
179609por Klein, AndreaTabla de Contenidos: “…13.2.3 Schreiben mit KI-Tools -- Kapitel 14: Vermitteln von Inhalten -- 14.1 Überzeugender Text -- 14.1.1 Adressatenorientierung -- 14.1.2 Thematische Entwicklung -- 14.2 Aussagekräftige Darstellungen -- 14.2.1 Vorbemerkungen -- 14.2.2 Abbildungen -- 14.2.3 Tabellen -- Kapitel 15: Korrekt zitieren -- 15.1 Grundlagen des Zitierens -- 15.1.1 Sinn und Zweck des Zitierens -- 15.1.2 Zitiergrundsätze -- 15.1.3 Zitierfähigkeit und Zitierwürdigkeit -- 15.2 Zitiertechnik -- 15.2.1 Zitiertechnik im Text -- 15.2.2 Zitiertechnik im Literaturverzeichnis -- Kapitel 16: Überarbeiten -- 16.1 Feedback -- 16.1.1 Haltung zu Feedback -- 16.1.2 Grundprinzipien des Feedbacks -- 16.1.3 Organisation des Feedback-Prozesses -- 16.2 Überarbeitungsschritte -- 16.2.1 Haltung zur Überarbeitung -- 16.2.2 Inhaltliche Überarbeitung -- 16.2.3 Sprachliche Überarbeitung -- 16.2.4 Formale Überarbeitung -- 16.2.5 Überarbeiten mit KI-Tools -- 16.3 Einreichen -- Kapitel 17: Allerletzte Schritte -- Anhang A: Anhang -- Ausgewählte Tastenkürzel in Word -- Einige der wichtigsten Sonderformate für die Platzhaltersuche -- Checkliste zur formalen Überarbeitung Ihres Textes -- Anhang B: Fact Sheets -- Ablenkungsfreies Schreiben -- Internetsperrren -- To-do-Tools -- Kanban -- Literaturverwaltung -- Notiz-Tools und Zettelkästen -- Online-Umfragetools -- Mindmapping-Programme -- Datensicherung -- Anhang C: Literaturverzeichnis -- Anhang D: Abbildungs- und Tabellenverzeichnis…”
Publicado 2023
Libro electrónico -
179610Publicado 2023Tabla de Contenidos: “…GLOSSARY -- Answer Key -- Appendix A - Hand Hygiene and Vital Signs Checklists -- Appendix B - Wound Dressings -- Appendix C - Head-to-Toe Assessment Checklist -- Appendix D: Information Related to Other Skills Referenced on the NCLEX-PN Test Plan…”
Libro electrónico -
179611por Caro, RodrigoTabla de Contenidos: “…Cupido pendulos Sancio Hurtado de la Puente in pretorio hispalensi senatori cum paucis integerrimo Rudericus Carus beticus amico Opt . B.M.D . (h . 38 r.-42 r.) . vv.: Pontane, si quid est, carmen hoc lege / decimo quod expressit venittens tormine (h . 38 v.) . …”
Publicado 1760
Manuscrito -
179612Publicado 1847Tabla de Contenidos: “…Dama visigoda (dibujo a plumilla) / Juan Galín (h. 21r.). 22. Sello "Al INMORTAL B. E. Murillo" (dibujo a plumilla) / Cabanas (h. 22r.). 22. …”
Manuscrito -
179613Publicado 2020Tabla de Contenidos: “…La toma de decisiones de inversión -- 16.1 El flujo de caja libre -- 16.2 Índices para evaluar proyectos de inversión -- 16.2.1 El valor presente neto (VPN) -- 16.2.2 La Tasa Interna de Retorno (TIR) -- 16.2.3 El costo promedio ponderado del capital (WACC) -- 16.2.3.1 El costo del patrimonio (RE ) -- 16.2.3.2 La tasa libre de riesgo (Rf ) -- 16.2.3.2.1 Tasas libres de riesgo reales -- 16.2.3.2.2 Otras alternativas a la tasa libre de riesgo -- 16.2.3.3 Cálculo de la prima de riesgo (Rm - Rf ) -- 16.2.3.4 Cálculo de la Beta (b) -- 16.2.3.4.1 Las betas fundamentales -- 16.2.3.4.2 Bottom-Up Betas -- 16.2.4 El costo de la deuda (RD ) -- 16.3 La valoración de empresas y el gradiente -- Unidad 6. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
179614por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Le crédit d'impôt-recherche -- Tableau 15. Indice B dans quelques pays de l'OCDE -- Rapprocher la recherche publique et celle des entreprises -- Graphique 29. …”
Publicado 1999
Libro electrónico -
179615por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Évolution de la spécialisation commerciale du Portugal -- Tableau 1.A1.2. Partie B. Évolution de la spécialisation commerciale de la République tchèque (suite) -- Tableau 1.A1.2. …”
Publicado 2005
Libro electrónico -
179616por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Les taux d'emploi féminin sont plus élevés au Portugal pour les femmes à un âge où la présence d'un jeune enfant est vraisemblable -- Graphique 3.1b. Dans les cantons de Vaud et de Zürich, les femmes continuent souvent à travailler jusqu'à 55 ans -- 3.2. …”
Publicado 2004
Libro electrónico -
179617
-
179618
-
179619por Almond, ChrisTabla de Contenidos: “…Kerberos -- Overview -- Kerberos keys and initial setup -- Authenticating to the Kerberos server -- Authenticating to an application server -- Kerberos terminology -- Where to find more information about Kerberos -- IBM Redbooks -- Other IBM publications -- Non-IBM publications -- Other information sources -- Appendix B. Sample scripts, files, and output -- Sample administrative scripts -- Change the pseudo-root FS sample script -- Create a KDC server with NFS V4 server -- Create a full client with legacy KDC server backend -- Create a Full Client with KDC and LDAP backend -- Script to copy ACLs to an entire directory structure -- Windows command script to run ktpass -- Script to gather additional information for local AIX software support -- Sample client Kerberos configuration files -- Kerberos configuration file /etc/krb5/krb5.conf with legacy backend -- Kerberos configuration file /etc/krb5/krb5.conf with LDAP backend -- Kerberos configuration file /etc/krb5/krb5.conf with Windows Active Directory backend -- LDIF sample file for KDC -- Sample iptrace output -- Successful authentication during mount request -- Unsuccessful authentication during mount request -- Appendix C. …”
Publicado 2004
Libro electrónico -
179620