Mostrando 301 - 320 Resultados de 413 Para Buscar '"Burst"', tiempo de consulta: 0.12s Limitar resultados
  1. 301
    Publicado 2017
    Tabla de Contenidos: “…Review Spammer Detection Leveraging Reviewing Burstiness -- 3.1. Burst Detection -- 3.2. Spammer Detection Under Review Bursts -- 3.2.1. …”
    Libro electrónico
  2. 302
    Publicado 2021
    Tabla de Contenidos: “…A monetary expansion -- 3.5.4. The bursting of the financial bubble -- 3.6. Some examples of crises of capitalism -- 3.6.1. …”
    Libro electrónico
  3. 303
    por Toutain, Laurent
    Publicado 2011
    Tabla de Contenidos: “…Auto-negotiation; 3.8.6. Half-duplex mode and burst transmission; 3.9. Examples of Ethernet frames; 3.9.1. …”
    Libro electrónico
  4. 304
    Publicado 2017
    Tabla de Contenidos: “…-- Systemic Risk Drivers -- Why Systemic Risk Must Be Understood, Monitored, and Managed -- Key Points -- Knowledge Check -- Notes -- Chapter 2: How We Got Here: A History of Financial Crises -- Introduction -- Common Drivers of Historical Crises -- Bursting of Asset Bubbles -- Banking Crises -- Sovereign Debt Crisis -- International Contagion -- Key Points -- Knowledge Check -- Notes -- Chapter 3: The Credit Crisis of 2007-2009 -- Introduction -- Planting the Seeds of a Bubble: The Early 2000s -- Wall Street's Role -- The U.S. …”
    Libro electrónico
  5. 305
    Publicado 2017
    Tabla de Contenidos: “…Avalanche or breakdown noise -- 5.3.4. Burst or "popcorn" or random telegraph signal noise -- 5.3.5. …”
    Libro electrónico
  6. 306
    por Elkin, Allen
    Publicado 2013
    Tabla de Contenidos: “…-- Taking a Three-Minute Energy Burst -- More Ways to Relax -- Chapter 5: Quieting Your Mind -- Where Do All These Thoughts Come From!? …”
    Libro electrónico
  7. 307
    por Oppenheimer, Peter C.
    Publicado 2024
    Tabla de Contenidos: “…Bubbles and Financial Innovation -- The Japan Bubble and the Tech Bubble -- Chapter 7 2000-2009: Bubbles and Troubles -- The Bursting of the Technology Bubble -- The Financial Crisis of 2007-2009 -- Leverage and Financial Innovation -- The Decline in Long-Term Growth Expectations -- The Rise in the Equity Risk Premium -- The Negative Correlation Between Bonds and Equities -- Chapter 8 2009-2020: The Post-Financial-Crisis Cycle and Zero Interest Rates -- 1. …”
    Libro electrónico
  8. 308
    por Story, Derrick
    Publicado 2005
    Tabla de Contenidos: “…Autoexposure; 2.1.3. AVI; 2.1.4. Burst/Continuous Shooting Mode; 2.1.5. Close-ups; 2.1.6. …”
    Libro electrónico
  9. 309
    Publicado 2017
    Tabla de Contenidos: “…. -- There's more... -- Burst capacity -- Metrics -- Eventually consistent reads -- Chapter 7: Networking -- Introduction -- Building a secure network -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also... -- Creating a NAT gateway -- Getting ready -- How to do it... -- How it works... -- See also -- Canary deployment via DNS -- Getting ready -- How to do it... -- How it works... -- Hosting a domain -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also... -- Routing based on location with failover -- Getting ready -- How to do it... -- How it works... -- Normal operation (geolocation routing) -- Region A failure -- Region B failure -- There's more... -- See also... -- Network logging and troubleshooting -- Getting ready -- How to do it... -- How it works... -- There's more... -- Log format -- Updates -- Omissions -- See also -- Chapter 8: Security and Identity -- Introduction -- Federating with your AWS account -- Getting ready -- How to do it... -- Active Directory configuration -- Auth Account policy configuration -- Auth Account role configuration -- Simple AD configuration -- App Account role configuration -- How it works... -- There's more... -- See also -- Creating SSL certificates -- How to do it... -- How it works... -- There's more... -- EC2 instances -- Importing certificates -- CloudFormation -- Active Directory as a service -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating users -- Getting ready -- How to do it... -- There's more... -- See also -- Creating instance roles -- How to do it…”
    Libro electrónico
  10. 310
    Publicado 2014
    Tabla de Contenidos: “…6.4.2 MCPC/PCM-TDM/PSK/FDMA System 296 -- 6.5 Time Division Multiple Access (TDMA) 297 -- 6.6 TDMA Frame Structure 297 -- 6.6.1 Reference Burst 298 -- 6.6.2 Traffic Burst 298 -- 6.6.3 Guard Time 299 -- 6.7 TDMA Burst Structure 299 -- 6.7.1 Carrier and Clock Recovery Sequence 299 -- 6.7.2 Unique Word 299 -- 6.7.3 Signalling Channel 300 -- 6.7.4 Traffic Information 301 -- 6.8 Computing Unique Word Detection Probability 301 -- 6.9 TDMA Frame Efficiency 302 -- 6.10 Control and Coordination of Traffic 303 -- 6.11 Frame Acquisition and Synchronization 305 -- 6.11.1 Extraction of Traffic Bursts from Receive Frames 305 -- 6.11.2 Transmission of Traffic Bursts 305 -- 6.11.3 Frame Synchronization 305 -- 6.12 FDMA vs. …”
    Libro electrónico
  11. 311
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title page -- Copyright and credits -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding Azure Container Technologies -- Chapter 1: Azure Containers - Pleased to Meet You -- Understanding containers and their benefits -- Container characteristics -- Container benefits -- Getting to know containers in the Azure landscape -- Exploring technologies and use cases -- Azure App Service for containers -- Azure Functions for containers -- Azure Container Instances -- Azure Container Apps -- Azure Kubernetes Service -- Azure Container Registry -- Summary -- Chapter 2: Azure App Service - Running a Container Was Never That Difficult -- Understanding Azure App Service for Containers -- Deploying containers to Azure App Service -- Seeing it in action -- The pros and cons of deploying containers on Azure App Service -- Pros -- Cons -- Summary -- Chapter 3: Deploying Containers to Azure Functions -- Understanding Azure Functions for containers -- Deploying containers to Azure Functions -- Docker containers for Azure Functions -- Pros and cons of deploying containers to Azure Functions -- Pros -- Cons -- Summary -- Chapter 4: Azure Container Instances for Serverless Containers -- Understanding ACI -- Container groups -- Networking -- Bursting from Azure Kubernetes Service -- Deploying containers in ACI -- ACI and YAML -- The pros and cons of running containers on ACI -- Pros -- Cons -- Summary -- Chapter 5: Azure Container Apps for Serverless Kubernetes -- Understanding Azure Container Apps -- Environments -- Revisions -- Containers -- Deploying containers to Azure Container Apps -- Pros and cons of running containers on Azure Container Apps -- Pros -- Cons -- Summary -- Chapter 6: Azure Kubernetes Service for Kubernetes in the Cloud -- Understanding how AKS works -- Control plane -- Nodes and node pools -- Versioning…”
    Libro electrónico
  12. 312
    Publicado 2017
    Tabla de Contenidos: “…Identifying the Players -- Smart(er) VBA Document Deployment -- Email and Saved Passwords -- Keyloggers and Cookies -- Bringing It All Together -- Summary -- Exercises -- Chapter 6: Criminal Intelligence -- Payload Delivery Part VI: Deploying with HTA -- Malware Detection -- Privilege Escalation in Microsoft Windows -- Escalating Privileges with Local Exploits -- Exploiting Automated OS Installations -- Exploiting the Task Scheduler -- Exploiting Vulnerable Services -- Hijacking DLLs -- Mining the Windows Registry -- Command and Control Part VI: The Creeper Box -- Creeper Box Specification -- Introducing the Raspberry Pi and Its Components -- GPIO -- Choosing an OS -- Configuring Full-Disk Encryption -- A Word on Stealth -- Configuring Out-of-Band Command and Control Using 3G/4G -- Creating a Transparent Bridge -- Using a Pi as a Wireless AP to Provision Access by Remote Keyloggers -- The Attack -- Spoofing Caller ID and SMS Messages -- Summary -- Exercises -- Chapter 7: War Games -- Background and Mission Briefing -- Payload Delivery Part VII: USB Shotgun Attack -- USB Media -- A Little Social Engineering -- Command and Control Part VII: Advanced Autonomous Data Exfiltration -- What We Mean When We Talk About "Autonomy" -- Means of Egress -- The Attack -- Constructing a Payload to Attack a Classified Network -- Stealthy 3G/4G Software Install -- Attacking the Target and Deploying the Payload -- Efficient "Burst-Rate" Data Exfiltration -- Summary -- Exercises -- Chapter 8: Hack Journalists -- Briefing -- Advanced Concepts in Social Engineering -- Cold Reading -- C2 Part VIII: Experimental Concepts in Command and Control -- Scenario 1: C2 Server Guided Agent Management -- Scenario 2: Semi-Autonomous C2 Agent Management -- Payload Delivery Part VIII: Miscellaneous Rich Web Content -- Java Web Start -- Adobe AIR -- A Word on HTML5 -- The Attack…”
    Libro electrónico
  13. 313
    Android Smartphone Photography for Dummies
    Android Smartphone Photography For Dummies
    Publicado 2021
    Tabla de Contenidos: “…Considering Alternate Aspect Ratios -- Creating Panorama Photos -- Horizontal panorama photos -- Vertical panorama photos -- Part 2 Having Fun with the Fundamentals of Photographic Genres -- Chapter 5 Capturing the Perfect Landscape Photograph -- Camera Considerations: Levels and Exposure -- Levelling your camera -- Controlling exposure -- Lighting Considerations -- Photograph during the magic hours -- Timing the magic hours -- Gear Considerations -- Steadying your Android camera with a tripod -- Choosing a lens (for multi-lens Android cameras) -- Photography Tips for Your Next Outing -- Applying the Rule of Thirds for better compositions -- Framing an "L" shaped composition -- Positioning a primary and secondary subject -- Chapter 6 Shooting Sports Photography -- Camera Considerations: Using Burst Mode to Capture Motion -- Gear Considerations -- A tough smartphone protective case -- A smartphone screen protector -- Battery packs or battery cases -- Touch-sensitive gloves in cold weather -- Lighting Considerations -- Photographing into the setting sun -- Capturing team sports with the sun behind you -- Using the setting sun for portraits -- Incorporating cool and warm color tones -- Choosing high contrast lighting -- Photography Tips for Dynamic Sports Photos -- Using your Portrait mode -- Allowing the subject to enter the composition -- Choosing curved backgrounds -- Framing your athletes -- Creating negative space -- Chapter 7 Saving Memories through Family and Individual Portraiture -- Camera Considerations: Portrait Mode and Lenses -- Knowing when to use Portrait mode -- Understanding lens compression -- Gear Considerations: Editing Tools for Better Compositions -- Lighting Considerations -- Avoiding certain types of interior lighting -- Dealing with interior backlighting -- Creating silhouettes for artistic family portraits…”
    Libro electrónico
  14. 314
    Adobe Photoshop Lightroom Classic for dummies
    Adobe Photoshop Lightroom Classic For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Change Is a Constant -- Chapter 17: Ten Things to Know About Organizing and Editing in Lightroom -- Help &amp -- Support -- All Photos and Filtering -- Segmentation and View Options -- Adobe Sensei Search -- Adding Photos from Camera Roll -- Apply During Import -- Creating Albums and Folders -- Applying Ratings and Flags -- Edit Photos Anywhere -- Export Copies -- Chapter 18: Ten Things to Know About Using the Lightroom Mobile Camera -- Shooting in Raw Mode (DNG) -- Shooting in Professional Mode -- Using Shoot-through Presets -- Helpful Overlays -- Self Timer, Burst Mode, and Remote Trigger -- Last Photo Preview -- Exposure Lock -- In-Camera HDR Mode -- Take a Selfie or Switch Lenses -- Camera Launch Shortcuts -- Index -- EULA…”
    Libro electrónico
  15. 315
    por Engelmann, Sven
    Publicado 2023
    Tabla de Contenidos: “…25.7 TESTING DEVICE FOR THE PRACTICAL ASSESSMENT OF THERMOFORMABILITY* -- Chapter 26 Analysis of Completely Formed, Filled, and Sealed Containers -- 26.1 BURST PRESSURE AND IMPERMEABILITY -- 26.1.1 Vacuum -- 26.1.2 Air Pressure -- 26.2 RHODAMINE TEST -- 26.3 GENERAL REMARK ON IMPERMEABILITY TESTS -- 26.4 OPENING FORCE -- Chapter 27 Automated Packaging -- 27.1 CUTTING SUBSEQUENT TO FORMING -- 27.2 CHARACTERISTICS OF THERMOFORMING PACKAGING LINES -- 27.2.1 Indexed Production -- 27.2.2 Continuous Production -- 27.2.3 Quasi-Continuous Production -- 27.3 CHARACTERISTICS OF PACKAGING MACHINE CONTROL -- 27.3.1 Indexed Production -- 27.3.2 Continuous Production -- 27.3.3 Quasi-Continuous Production -- 27.4 FORMING, FILLING, AND SEALING (FFS) -- 27.4.1 The Picker Line -- 27.4.2 Speed Lines -- 27.4.3 Lines with Automatic Handling -- 27.5 FORMING, PUNCHING, FILLING, AND SEALING (FPF) -- 27.6 FORMING, CROSS-CUTTING, FILLING, SEALING/PUNCHING (FCFS) -- 27.7 CONCLUSION -- Chapter 28 Production of Flowerpots -- 28.1 THE THERMOFORMING MACHINE -- 28.2 HEATING SYSTEM -- 28.3 THE FORMING STATION -- 28.3.1 Plug Materials -- 28.4 FORMING AIR -- 28.5 CHALK AS A FILLER -- 28.5.1 Calcium Carbonate in Thermoforming Applications -- 28.5.2 Natural Calcium Carbonate -- 28.5.3 Advantages of Calcium Carbonate -- 28.5.4 Summary -- Chapter 29 Perforated Fruit and Vegetable Trays Made Easy -- Chapter 30 Steel Rule Die Punching -- 30.1 BASICS -- 30.2 SHAPES OF CUTTING EDGES -- 30.3 CREATION OF ANGEL HAIR DURING STEEL RULE DIE CUTTING -- 30.3.1 Development of Angel Hair -- 30.3.2 Influence of Steel Rule Temperature on the Creation of Angel Hair -- 30.3.3 Influence of Film Material on Creation of Angel Hair -- Chapter 31 Production of Meat Trays -- 31.1 VACUUM PACKAGING -- 31.2 ACTIVE PACKAGING -- 31.3 MAP -- 31.4 PRODUCTION PROCESS FOR THE PP TRAY -- 31.5 NEW DEVELOPMENTS…”
    Libro electrónico
  16. 316
    Publicado 2011
    Tabla de Contenidos: “…About the Editors xiii -- Preface xv -- Acknowledgements xvii -- List of Abbreviations xix -- List of Contributors xxv -- 1 Introduction 1 -- 1.1 Market and Technology Trends 1 -- 1.2 Technology Evolution 3 -- 1.3 Development of IMT-Advanced and Beyond 6 -- References 8 -- 2 Radio Resource Management 11 -- 2.1 Overview of Radio Resource Management 11 -- 2.2 Resource Allocation in IMT-Advanced Technologies 13 -- 2.2.1 Main IMT-Advanced Characteristics 13 -- 2.2.2 Scheduling 16 -- 2.2.3 Interference Management 16 -- 2.2.4 Carrier Aggregation 18 -- 2.2.5 MBMS Transmission 18 -- 2.3 Dynamic Resource Allocation 19 -- 2.3.1 Resource Allocation and Packet Scheduling Using Utility Theory 19 -- 2.3.2 Resource Allocation with Relays 22 -- 2.3.3 Multiuser Resource Allocation Maximizing the UE QoS 24 -- 2.3.4 Optimization Problems and Performance 26 -- 2.4 Interference Coordination in Mobile Networks 26 -- 2.4.1 Power Control 27 -- 2.4.2 Resource Partitioning 28 -- 2.4.3 MIMO Busy Burst for Interference Avoidance 33 -- 2.5 Efficient MBMS Transmission 35 -- 2.5.1 MBMS Transmission 36 -- 2.5.2 Performance Assessment 37 -- 2.6 Future Directions of RRM Techniques 39 -- References 40 -- 3 Carrier Aggregation 43 -- 3.1 Basic Concepts 43 -- 3.2 ITU-R Requirements and Implementation in Standards 45 -- 3.3 Evolution Towards Future Technologies 48 -- 3.3.1 Channel Coding 48 -- 3.3.2 Scheduling 51 -- 3.3.3 Channel Quality Indicator 53 -- 3.3.4 Additional Research Directions 54 -- 3.4 Cognitive Radio Enabling Dynamic/Opportunistic Carrier Aggregation 55 -- 3.4.1 Spectrum Sharing and Opportunistic Carrier Aggregation 56 -- 3.4.2 Spectrum Awareness 58 -- 3.4.3 Cognitive Component Carrier Identification, Selection and Mobility 59 -- 3.5 Implications for Signaling and Architecture 59 -- 3.6 Hardware and Legal Limitations 60 -- References 61 -- 4 Spectrum Sharing 63 -- 4.1 Introduction 63 -- 4.2 Literature Overview 64 -- 4.2.1 Spectrum Sharing from a Game Theoretic Perspective 66 -- 4.2.2 Femtocells 67.…”
    Libro electrónico
  17. 317
    Tabla de Contenidos: “…Branch-Combining Diversity -- Diversity Antenna Array, Type, Orientation, and Spacing -- Transmit Beam-Forming Types -- Legacy Beam Forming -- Implicit Beam Forming -- Explicit Beam Forming -- MIMO Antenna Array Coverage and Placement -- Coding -- Binary Convolutional Coding (BCC) -- Low-Density Parity Checking (LDPC) -- HT PHY and Operation -- HT Mixed -- HT-Greenfield Format -- Channel Bonding/40-MHz-Wide Channels -- Protection -- Power Management -- Packet Aggregation -- Bursting/Block ACK (BACK) -- Short Guard Interval (GI) -- Reduced Inter-Frame Spacing (RIFS) -- Reverse Direction Protocol (RDP) -- Modulation and Coding Schemes (MCS) -- Configuration Requirements to Obtain HT Rates -- Predicting 802.11 Link Performance -- Summary -- Chapter 4 Cisco Unified Wireless LAN Security Fundamentals -- Understanding WLAN Security Challenges -- Vulnerabilities Inherent to the Radio Transmission Medium -- Physical Containment Problem -- Unlicensed Radio Spectrum Problem -- Vulnerabilities Inherent to the Standards Definitions -- Authentication and Encryption Weaknesses -- Unauthenticated Management Frames -- Vulnerabilities Inherent to Mobility -- Misconfigured Wireless Devices and Clients -- Rogue Access Points and Devices -- Readily Available Profiling and Attack Tools -- Addressing the WLAN Security Challenges -- Background on Strong Authentication and Privacy -- How WEP Encryption Works -- How WEP Is Broken -- 802.11 Authentication -- Addressing the Strong Authentication and Privacy Challenges -- Authentication Framework -- Authentication Algorithm -- Data Privacy and Integrity -- Alternative Approaches to Authentication and Data Privacy -- Rogue Access Point Detection and Wireless Intrusion Prevention -- Secure Management and Security Policies -- Summary -- References -- Chapter 5 Design Considerations -- 100 Percent Wireless Access Layer…”
    Libro electrónico
  18. 318
    por Kletz, Trevor A.
    Publicado 2009
    Tabla de Contenidos: “…Tank Trucks and Cars -- 13.1 Overfilling -- 13.2 Burst Hoses -- 13.3 Fires and Explosions -- 13.4 Liquefied Flammable Gases -- 13.5 Compressed Air -- 13.6 Tipping Up -- 13.7 Emptying into or Filling from the Wrong Place -- 13.8 Contact with Live Power Lines -- Chapter 14. …”
    Libro electrónico
  19. 319
    por Kusterer, Ruth
    Publicado 2013
    Tabla de Contenidos: “…-- Time for action - fit to burst? -- What just happened? -- Starting and stopping effects -- Time for action - fire! …”
    Libro electrónico
  20. 320
    Publicado 2014
    Tabla de Contenidos: “…Auto-Negotiation -- Development of Auto-Negotiation -- Auto-Negotiation for Fiber Optic Media -- Basic Concepts of Auto-Negotiation -- Auto-Negotiation Signaling -- FLP Burst Operation -- Auto-Negotiation Operation -- Parallel Detection -- Operation of Parallel Detection -- Parallel Detection and Duplex Mismatch -- Auto-Negotiation Completion Timing -- Auto-Negotiation and Cabling Issues -- Limiting Ethernet Speed over Category 3 Cable -- Cable Issues and Gigabit Ethernet Auto-Negotiation -- Crossover Cables and Auto-Negotiation -- 1000BASE-X Auto-Negotiation -- Auto-Negotiation Commands -- Disabling Auto-Negotiation -- Auto-Negotiation Debugging -- General Debugging Information -- Debugging Tools and Commands -- Developing a Link Configuration Policy -- Link Configuration Policies for Enterprise Networks -- Issues with Manual Configuration -- Chapter 6. …”
    Libro electrónico