Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 236
- History 116
- Arte bizantino 66
- Història 62
- Civilización y cultura 43
- Litúrgia 35
- Iglesia Ortodoxa 31
- Església Ortodoxa 27
- Imperi Bizantí 27
- Esglésies orientals 24
- -Historia 23
- Arquitectura bizantina 21
- Literatura bizantina 21
- Art bizantí 20
- Civilization 20
- Iglesia Católica 20
- Liturgia 19
- Antiquities 17
- Empire byzantin 17
- Excavations (Archaeology) 16
- History and criticism 16
- Iglesia 16
- RELIGION 16
- Arte 15
- Byzance 15
- Civilización 15
- Historia y crítica 15
- Religion 15
- Arquitectura religiosa 14
- Església Catòlica 14
-
1801Publicado 2021Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of contents -- Introduction: History of Construction Cultures -- Committees -- ORGANIZING COMMITTEE -- SCIENTIFIC COMMITTEE -- LOCAL COMMITTEE -- Organizing institutions -- Open session: Cultural translation of construction cultures -- On the construction of Byzantine vaulted systems through the eyes of the 19th century French rationalists -- 1 INTRODUCTION -- 2 BYZANTIUM RECONSIDERED BY WESTERN EUROPE -- 3 THE RATIONAL STUDY OF COUPOLE AND PENDENTIFS -- 4 CONCLUSIONS -- REFERENCES -- Style and stone - Stonemasonry in Switzerland between the Gothic and Renaissance -- 1 INTRODUCTION -- 2 THE GOTHIC FRANCISCAN CHURCHI N LUCERNE -- 3 LUX RITTER'S PALACE IN LUCERNE -- 4 THE TOWN HALL OF LUCERNE -- 5 SANDSTONE AND LIMESTONE IN SOLOTHURN -- 6 CONCLUSION -- REFERENCES -- Stability and construction of the 16th century Mexican rubble masonry vaults in Jiutepec Morelos -- 1 INTRODUCTION AND RESEARCH SCOPE -- 2 THE CONVENT OF SANTIAGO APOSTOL: GEOMETRY AND STABILITY -- 3 CONCLUSIONS -- REFERENCES -- The construction of the vaults in the cathedrals of the Viceroyalty of Peru -- 1 INTRODUCTION -- 2 HISTORICAL BACKGROUND -- 3 THE CONSTRUCTION OF THE VAULTS -- 4 CONCLUSIONS -- REFERENCES -- Conception, materiality and development of coffered vaults in the churches of Goa -- 1 INTRODUCTION -- 2 BACKGROUND -- 3 THE FORMATION OF THE TYPOLOGY -- 4 THE CONSTRUCTION OF THE FIRST COFFERED VAULTS IN GOA -- 5 THE EVOLUTION OF THE TYPOLOGY -- 6 CONCLUSIONS -- REFERENCES -- The domes in piperno stone of San Giacomo degli Spagnoli in Naples -- 1 OVERVIEW OF THE RESEARCH -- 2 INVESTIGATIONS -- 3 CONCLUSIONS -- REFERENCES -- Local interpretations of classical models: The architecture of San Antonio mission churches, Texas -- 1 INTRODUCTION -- 2 EUROPEAN DESIGN INFLUENCE -- 3 REINTERPRETING RELIGIOUS MODELS…”
Libro electrónico -
1802Publicado 2021“…Its chief aim is to provide a contribution to the studies on the writing of history in Greco-Roman Antiquity from Herodotus to the Byzantine Empire. All these inquiries give rise to re-readings of each historian's historiographical project: if there is one idea pervading all the texts here collected – the diversity of approaches was thought from the start to be the one of the hallmarks of the volume – it is that each testimony should be addressed by reallocating it in the context of its own production, since these testimonies shed light both upon the moment when they were written and the one they describe…”
Libro electrónico -
1803Publicado 2007Tabla de Contenidos: “…-- 262 (5) -- The Bronze Age landscapes and societies of the Wadi Faynan -- 267 (4) -- The making of early states: the Iron Age and Nabataean periods -- 271 (34) -- David Mattingly -- Paul Newson -- John Grattan -- Roberta Tomber -- Graneme Barker -- David Gilbertson -- Chris Hunt -- Introduction -- 271 (1) -- Edom and the `Edomites' -- 271 (2) -- Copper mining and smelting -- 273 (5) -- Iron Age settlement in Wadi Faynan -- 278 (7) -- Evidence of environmental change -- 285 (3) -- Dating issues -- 288 (2) -- Ancient Edom and copper production in Wadi Faynan -- 290 (1) -- Nabataean Faynan -- 291 (10) -- Historical implications -- 301 (4) -- A landscape of imperial power: Roman and Byzantine Phaino -- 305 (44) -- David Mattingly -- Paul Newson -- Oliver Creighton -- Roberta Tomber -- John Grattan -- Chris Hunt -- David Gilbertson -- Hwedi el-Rishi -- Brian Pyatt -- Introduction -- 305 (3) -- Roman copper exploitation in the Wadi `Arabah region -- 308 (1) -- The Roman army in southern Jordan -- 309 (1) -- The Roman mining landscape around Faynan -- 309 (23) -- Dating issues -- 332 (1) -- The labour force at the mines -- 333 (1) -- Environment and people: the impacts of Roman mining -- 334 (10) -- The logistics of supply -- 344 (1) -- Charcoal and fuel demands -- 345 (1) -- A landscape of imperial power -- 346 (3) -- The Islamic and Ottoman periods -- 349 (20) -- Paul Newson -- David Mattingly -- Patrick Daly -- Roberta Tomber -- Hwedi el-Rishi -- David Gilbertson -- John Grattan -- Chris Hunt -- Sue McLaren -- Brian Pyatt -- Introduction -- 349 (3) -- Climate, environment, and human impacts -- 352 (11) -- Archaeology -- 363 (4) -- Synthesis: life in an abandoned industrial landscape -- 367 (2) -- Ethnoarchaeology -- 369 (28) -- Carol Palmer -- Helen Smith -- Patrick Daly -- Introduction -- 369 (1) -- The Bedouin Camp Survey -- 369 (1) -- Campsite architecture -- 370 (3) -- Campsite location -- 373 (1) -- Tent orientation -- 374 (1) -- Tribal associations -- 375 (1) -- Durable campsite architecture -- 376 (4) -- Contrasts in campsite organization and architecture -- 380 (4) -- Artefacts and activities around tent sites -- 384 (9) -- Bedouin material culture in the recent past -- 393 (1) -- Other evidence of bedouin activity around the Wadi Faynan -- 393 (1) -- Conclusion -- 394 (3) -- Archaeology and desertification: the landscapes of the Wadi Faynan -- 397 (68) -- David Gilbertson -- Graeme Barker -- David Mattingly -- Carol Palmer -- John Grattan -- Brian Pyatt -- Introduction -- 397 (1) -- Desertification: research issues and analytical problems -- 398 (4) -- Pleistocene environments and human occupation -- 402 (2) -- People and environment in the Holocene: disaggregating desertification -- 404 (9) -- Scale and complexity -- 413 (3) -- Cores and peripheries -- 416 (1) -- Arid-zone archaeology -- 416 (1) -- Conclusion -- 417 (1) -- Postscript: the Wadi Faynan today and in the future -- 418 (7) -- Summaries -- English summary -- 425 (10) -- Arabic summary -- 435 (4) -- Appendices -- Appendix 1 Published radiocarbon dates from the Faynan region -- 439 (6) -- Chris Hunt -- David Mattingly -- Graeme Barker -- David Gilbertson -- Appendix 2 Classical and Islamic pottery -- 445 (20) -- Roberta Tomber -- A2.1 Introduction -- 445 (1) -- A2.2 Method -- 445 (1) -- A2.3 Pottery classification -- 446 (4) -- A2.4 Chronological summary -- 450 (15) -- Bibliography 465 (38) -- Index 503.…”
Libro electrónico -
1804Publicado 1947Tabla de Contenidos: “…Els edificis en la Crònica de Desclot / Miquel Coll i Alentorn. Ceuta byzantine ou wisigothique? (Notes d'histoire et d'archéologie) / Paul Goubert. …”
Libro -
1805Publicado 2021Tabla de Contenidos: “…Delegated Proof-of-Stake -- 7.1.4. Practical Byzantine Fault Tolerance -- 7.1.5. Proof-of-Authority -- 7.1.6. …”
Libro electrónico -
1806Publicado 1947Tabla de Contenidos: “…Els edificis en la Crònica de Desclot / Miquel Coll i Alentorn. Ceuta byzantine ou wisigothique? (Notes d'histoire et d'archéologie) / Paul Goubert. …”
991004128899706719 -
1807
-
1808Publicado 2022Tabla de Contenidos: “…How Nicole Wojno Smith, VP of Marketing at Tackle, Got Her First Executive Role by Leveling Up Within Her Then-organization -- How Smith "leveled Up" by Building a Partnership with the C-level Team -- Mastering Data-driven Storytelling Around Business Objectives -- Gain a Deeper Understanding of Cross-functional Partners and Their Roles -- Partner Closely with Your Finance Leadership (unless You're The CFO -- in That Case, Partner with Every Other Executive Team) -- Start Unofficially Recruiting Your "bench" Dream Team for Your Department -- Leveling Up in the Engineering Side of the Business: Jeff Ammons -- Learning to Let Go of Being the One to Write Code and Shifting to Empowering His Team -- On Internal Promotions: Nick Mehta's Perspective as Ceo of Gainsight -- Getting Hired: Landing The role -- Internal Promotions to executive Are Possible, but Not at Every Company -- Chapter Five Get The offer and Secure Your Executive Seat -- Find Your First (or Next) Executive Role -- Interviewing For your Executive Role -- Navigating The often Byzantine Startup Hiring Process -- The Interview Process -- Understand the Presentation Tech Stack and Practice Your Presentation With friends -- Meeting With the CEO: Understand Their Vision -- When the Startup's Hiring Process Goes Awry -- Getting The offer -- Compensation Breakdown -- Negotiating The offer -- Do Your Research -- Risk Vs. …”
Libro electrónico -
1809Publicado 2022Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgment -- 1 Deep Dive Into Blockchain Technology: Characteristics, Security and Privacy Issues, Challenges, and Future Research Directions -- 1.1 Introduction -- 1.2 Blockchain Preliminaries -- 1.2.1 Functioning of Blockchain -- 1.2.2 Design of Blockchain -- 1.2.3 Blockchain Elements -- 1.3 Key Technologies of Blockchain -- 1.3.1 Distributed Ledger -- 1.3.2 Cryptography -- 1.3.3 Consensus -- 1.3.4 Smart Contracts -- 1.3.5 Benchmarks -- 1.4 Consensus Algorithms of Blockchain -- 1.4.1 Proof of Work (PoW) -- 1.4.2 Proof of Stake (PoS) -- 1.4.3 BFT-Based Consensus Algorithms -- 1.4.4 Practical Byzantine Fault Tolerance (PBFT) -- 1.4.5 Sleepy Consensus -- 1.4.6 Proof of Elapsed Time (PoET) -- 1.4.7 Proof of Authority (PoA) -- 1.4.8 Proof of Reputation (PoR) -- 1.4.9 Deputized Proof of Stake (DPoS) -- 1.4.10 SCP Design -- 1.5 Internet of Things and Blockchain -- 1.5.1 Internet of Things -- 1.5.2 IoT Blockchain -- 1.5.3 Up-to-Date Tendency in IoT Blockchain Progress -- 1.6 Applications of Blockchain in Smart City -- 1.6.1 Digital Identity -- 1.6.2 Security of Private Information -- 1.6.3 Data Storing, Energy Ingesting, Hybrid Development -- 1.6.4 Citizens Plus Government Frame -- 1.6.5 Vehicle-Oriented Blockchain Appliances in Smart Cities -- 1.6.6 Financial Applications -- 1.7 Security and Privacy Properties of Blockchain -- 1.7.1 Security and Privacy Necessities of Online Business Transaction -- 1.7.2 Secrecy of Connections and Data Privacy -- 1.8 Privacy and Security Practices Employed in Blockchain -- 1.8.1 Mixing -- 1.8.2 Anonymous Signatures -- 1.8.3 Homomorphic Encryption (HE) -- 1.8.4 Attribute-Based Encryption (ABE) -- 1.8.5 Secure Multi-Party Computation (MPC) -- 1.8.6 Non-Interactive Zero-Knowledge (NIZK)…”
Libro electrónico -
1810Publicado 2024Tabla de Contenidos: “…3.2.2 Differential privacy -- 3.3 DP guaranteed algorithms -- 3.3.1 Sample-level DP -- 3.3.1.1 Algorithms and discussion -- 3.3.2 Client-level DP -- 3.3.2.1 Clipping strategies for client-level DP -- 3.3.2.2 Algorithms and discussion -- 3.4 Performance of clip-enabled DP-FedAvg -- 3.4.1 Main results -- 3.4.1.1 Convergence theorem -- 3.4.1.2 DP guarantee -- 3.4.2 Experimental evaluation -- 3.5 Conclusion and future work -- References -- 4 Assessing vulnerabilities and securing federated learning -- 4.1 Introduction -- 4.2 Background and vulnerability analysis -- 4.2.1 Definitions and notation -- 4.2.1.1 Horizontal federated learning -- 4.2.1.2 Vertical federated learning -- 4.2.2 Vulnerability analysis -- 4.2.2.1 Clients' updates -- 4.2.2.2 Repeated interaction -- 4.3 Attacks on federated learning -- 4.3.1 Training-time attacks -- 4.3.1.1 Byzantine attacks -- 4.3.1.2 Backdoor attacks -- 4.3.2 Inference-time attacks -- 4.4 Defenses -- 4.4.1 Protecting against training-time attacks -- 4.4.1.1 In Situ defenses -- 4.4.1.2 Post Facto defenses -- 4.4.2 Protecting against inference-time attacks -- 4.5 Takeaways and future work -- References -- 5 Adversarial robustness in federated learning -- 5.1 Introduction -- 5.2 Attack in federated learning -- 5.2.1 Targeted data poisoning attack -- 5.2.1.1 Label flipping -- 5.2.1.2 Backdoor -- 5.2.1.2.1 Trigger-based backdoor -- 5.2.1.2.2 Semantic backdoor -- 5.2.2 Untargeted model poisoning attack -- 5.3 Defense in federated learning -- 5.3.1 Vector-wise defense -- 5.3.2 Dimension-wise defense -- 5.3.3 Certification -- 5.3.4 Personalization -- 5.3.5 Differential privacy -- 5.3.6 The gap between distributed training and federated learning -- 5.3.7 Open problems and further work -- 5.4 Conclusion -- References -- 6 Evaluating gradient inversion attacks and defenses -- 6.1 Introduction -- 6.2 Gradient inversion attacks…”
Libro electrónico -
1811
-
1812
-
1813
-
1814
-
1815
-
1816
-
1817
-
1818
-
1819
-
1820por Bratu, Mihaita“…La thèse se propose d'élaborer une histoire critique de la doctrine de l'icone à partir de l'oeuvre des principaux apologètes iconophiles byzantins et arabes (723-828)…”
Publicado 2004
Tesis