Mostrando 302,121 - 302,140 Resultados de 304,420 Para Buscar '"C "', tiempo de consulta: 0.77s Limitar resultados
  1. 302121
    Manuscrito
  2. 302122
    Publicado 2020
    Tabla de Contenidos: “…ALGUNOS PROBLEMAS DE CAUSALIDAD / Lilian C. San Martín Neira -- Capítulo 3. LA RELACIÓN DE CAUSALIDAD EN EL ÁMBITO DE LA RESPONSABILIDAD POR MEDICAMENTOS DEFECTUOSOS / Mónica Navarro-Michel -- Capítulo 4 CUESTIONES DE CAUSALIDAD EN UNA ACCIÓN ALTERNATIVA POR DAÑO A LA PROPIEDAD INDUSTRIAL / Ricardo Concha Machuca -- Capítulo 5 LA CAUSALIDAD POR OMISIÓN EN EL SISTEMA DE RESPONSABILIDAD EXTRA-CONTRACTUAL DEL ESTADO COLOMBIANO / Frank Yurlian Olivares Torres -- Capítulo 6 PROPUESTA DE SOLUCIÓN CAUSAL A LAS DEMANDAS EN CONTRA DEL ESTADO DE CHILE POR EL TERREMOTO Y TSUNAMI DEL 2010 / Ignacio Ríos Erazo -- III. …”
    >Texto completo en Biblioteca Virtual Tirant
    Libro electrónico
  3. 302123
    Publicado 2006
    Tabla de Contenidos: “…Transformada de Fourier de tiempo continuo -- Apéndice C. Conversión analógico-digital y digital-analógico -- Apéndice D. …”
    Libro electrónico
  4. 302124
    por Santos, Félix
    Publicado 2007
    Tabla de Contenidos: “….) -- 1.9.1 MÁXIMO COMÚN DI VISOR (M.C.D.) DE DOS O MÁS NÚMEROS -- 1.9.2 MÍNIMO COMÚN MÚLTIPLO -- RESUMEN LLE LA UÑITTATL I -- EERCICIOS DE AUTOEVALUACIÓN DE LA UNIDAD L -- EERCICIOS COMPLEMENTARIOS DE LA UNIDAD 1· -- RESPUESTAS A LOS EJERCICIOS DE AUTOEVALUACIÓN DE LA UNIDAD 1 -- RESPUESTAS A LOS EJERCICIOS COMPLEMENTARIOS DE LA UNIDAD 1.…”
    Libro electrónico
  5. 302125
    Publicado 2018
    Tabla de Contenidos: “…Laboratorio general en reumatología -- CITOLOGÍA EN SANGRE PERIFÉRICA -- VELOCIDAD DE ERITROSEDIMENTACIÓN GLOBULAR -- PROTEÍNA C REACTIVA -- FACTOR REUMATOIDE (FR)…”
    Libro electrónico
  6. 302126
    Publicado 2021
    Tabla de Contenidos: “…ENDIF -- 2.4.1.3 LA ESTRUCTURA DE DECISIÓN MÚLTIPLE SWITCH -- 2.4.1.4 LA FUNCIÓN MENU -- 2.4.2 ESTRUCTURAS DE REPETICIÓN -- 2.4.2.1 LA ESTRUCTURA WHILE -- 2.4.2.2 LA ESTRUCTURA DO...UNTIL -- 2.4.2.3 LA ESTRUCTURA FOR -- 2.4.3 APLICACIONES -- 2.4.3.1 APLICACIÓN 1: ORDENAMIENTO TERRITORIAL -- 2.4.3.2 APLICACIÓN 2: PUENTES -- 2.4.4 COMENTARIOS FINALES -- 2.4.5 EJERCICIOS -- 2.5 BIBLIOGRAFÍA -- UNIDAD 3: INTRODUCCIÓN A LA PROGRAMACIÓN - PARTE II -- 3.1 FUNCIONES -- 3.1.1 FUNCIONES DE BIBLIOTECA -- 3.1.2 FUNCIONES DEFINIDAS POR EL USUARIO -- 3.1.3 APLICACIÓN: UN EJEMPLO DE PROGRAMACIÓN PASO A PASO -- 3.1.4 EJERCICIOS -- 3.2 ARREGLOS -- 3.2.1 VECTORES -- 3.2.2 MATRICES -- 3.2.3 OPERACIONES MATEMÁTICAS -- 3.2.4 FUNCIONES QUE ACTÚAN SOBRE ARREGLOS -- 3.2.5 OPERADOR DOS PUNTOS (:) -- 3.2.6 APLICACIONES -- 3.2.6.1 APLICACIÓN 1: DIVISIÓN DE POLINOMIOS -- 3.2.6.2 APLICACIÓN 2: HIDROLOGÍA -- 3.2.6.3 APLICACIÓN 3: IMÁGENES SATELITALES -- 3.2.7 EJERCICIOS -- 3.3 LECTURA Y ESCRITURA DE ARCHIVOS -- 3.3.1 LECTURA/ESCRITURA ESTILO OCTAVE -- 3.3.1.1 FUNCIÓN SAVE -- 3.3.1.2 FUNCIÓN LOAD -- 3.3.2 LECTURA/ESCRITURA ESTILO C -- 3.3.2.1 FUNCIÓN FOPEN -- 3.3.2.2 FUNCIÓN FPRINTF -- 3.3.2.3 FUNCIÓN FSCANF -- 3.3.2.4 FUNCIÓN FCLOSE -- 3.3.3 APLICACIÓN: ESTUDIO DE TRÁNSITO -- 3.3.3.1 SOLUCIÓN -- 3.3.4 EJERCICIOS -- 3.4 GRÁFICOS CIENTÍFICOS -- 3.4.1 FUNCIONES GRÁFICAS 2D…”
    Libro electrónico
  7. 302127
    por Catedral de Cuenca (España).
    Publicado 1790
    Tabla de Contenidos: “…Fr Jacinto Montargon [et]c. ... -- [S.l. : s.n., 1787?] [3] p. , [1] en bl. ; Fol. …”
    Colección
  8. 302128
    Tabla de Contenidos: “…Ràfols, Marià Ribas Bertran, Enric C-Ricart, Domingo Soler, Vila-Puig i Darius Viàs…”
    Manuscrito
  9. 302129
    Publicado 1947
    Tabla de Contenidos: “…Joies greco-romanes de l'Estanyol (Girona) / per Josep de C. Serra i Ràfols. La construcció a tornajornals / per Joan Amades. …”
    Libro
  10. 302130
    por Ratcliff, Marc J.
    Publicado 2019
    Tabla de Contenidos: “…Le parcours obligé au sein de la dynamique de relation -- Le triplet et les objets de langage -- La construction de la réalité : le triplet comme critère cognitif -- Le groupe des genevois et l'auteur collectif -- Contexte de réalité, envisionneurs et o.c.t. -- Efficience et stabilité -- La sphère morale du savant : le triplet comme critère normatif -- Les figures et comportements issus du parcours obligé -- Morale ou cognition : la négation du parcours obligé -- Conclusions générales la dialectique du confinement et de la relation -- Quatre auteurs, une histoire ? …”
    Electrónico
  11. 302131
    Publicado 2018
    Tabla de Contenidos: “…6.1.1 Solution Procedures to Dynamic General Function Models, Limitations, and Simulation Methods -- 6.1.2 Simulation of Financial Crises with Calibration Techniques -- 6.2 The Real Side -- 6.3 The Financial Side -- 6.3.1 A Stylized Financial Structure -- 6.3.2 Financial Market Equilibria -- 6.4 The Balance of Payments -- 6.5 Monetary and Exchange Rate Policy -- 6.6 Analytical Solution of the Model -- 6.7 Simulation Classifications and Assumptions -- 6.7.1 Financial Crises as a Cyclical Phenomenon -- 6.7.2 Financial Crises as an Adverse Exogenous Shock Phenomenon -- 6.8 Sensitivity Analysis and Method of Graphical Representation -- 6.9 Simulation of Financial Crises as a Cyclical Phenomenon -- 6.9.1 The Boom Phase -- 6.9.2 The Overborrowing Phase and the Upper Turning Point -- 6.9.3 The Bust Phase -- 6.10 Simulation of Financial Crises Caused by an Adverse Foreign Interest Rate Shock -- 7 Conclusion -- 7.1 New Perspectives for Economic Theory -- 7.2 Policy Recommendations -- A Tobin's q-Theory of Investment -- B Financial Constraints in Perfect Capital Markets -- C An Example of Off-Balance Sheet Transactions -- D Forward vs. …”
    Electrónico
  12. 302132
    Publicado 2019
    Tabla de Contenidos: “…Development of an innovative multi-performance system for LWS structures -- Seismic design criteria for CFS steel-sheathed shear walls -- Behaviour of aconcrete slab in compression in composite steel-concrete frame joints -- On the development of IoT platforms for the detection of damage in steel railway bridges -- Experimental and numerical studies on shear behaviour of stainless steel plate girders with inclined stiffeners -- Ultimate strength analysis of steel-concrete cross-sections atelevated temperatures -- Seismic design of two-storey X-bracings -- Experimental tests on bolted end-plate connections using thermal insulation layer attached to steel structures -- Assessment of Eurocode fire design rules for structural members made of high strength steels -- Numerical investigation on thin-walled CFS columns in fire -- FEM analysis of the buckling behavior of thin-walled CFS columns. Part I-Channel (C) and Double Channel (I) cross-sections -- FEM analysis of the buckling behaviour of thin-walled CFS columns. …”
    Libro electrónico
  13. 302133
    Publicado 2018
    Tabla de Contenidos: “…Resetting signals -- Listing traps -- Using traps inside a function -- Running scripts or processes even if the user logs out -- Creating dialog boxes with the dialog utility -- Creating a message box (msgbox) -- Creating a message box (msgbox) with a title -- The yes/no box (yesno) -- The input box (inputbox) -- The textbox (textbox) -- A password box -- The checklist box (checklist) -- The menu box (menu) -- The radiolist box (radiolist) -- The progress meter box (gauge) -- Summary -- Chapter 12: System Startup and Customizing a Linux System -- System startup, inittab, and run levels -- The kernel startup and init process -- Understanding run levels -- System initialization boot scripts -- User initialization scripts -- System-wide setting scripts -- User level settings - default files -- Summary -- Chapter 13: Pattern Matching and Regular Expressions with sed and awk -- The basics of regular expressions -- sed - non-interactive stream editor -- Understanding sed -- Addressing in sed -- How to modify a file with sed -- Printing - the p command -- Deleting - the d command -- Substitution - the s command -- Range of selected lines the comma -- Multiple edits - the e command -- Reading from files - the r command -- Writing to files - the w command -- Appending - the a command -- Inserting - the i command -- Changing - the c command -- Transform - the y command -- Quit - the q command -- Holding and getting - the h and g commands -- Holding and exchanging - the h and x commands -- sed scripting -- Using awk -- The meaning of awk -- Using awk -- Input from files -- Input from commands -- How awk works -- awk commands from within a file -- Records and fields -- Records -- The record separator -- The 0 variable -- The NR variable -- Fields -- Field separators -- The input field separator -- Patterns and actions -- Patterns -- Actions…”
    Libro electrónico
  14. 302134
    Publicado 2016
    Tabla de Contenidos: “…16.1 Introduction 523 -- 16.2 Layering as Optimization Decomposition 524 -- 16.3 Cross-Layer Optimization 533 -- 16.4 Optimization Problem Decomposition Methods 543 -- References 554 -- 17 Network Information Theory 557 -- 17.1 Capacity of Ad Hoc Networks 557 -- 17.2 Information Theory and Network Architectures 569 -- 17.3 Cooperative Transmission in Wireless Multihop Ad Hoc Networks 577 -- References 584 -- 18 Stability of Advanced Network Architectures 585 -- 18.1 Stability of Cooperative Cognitive Wireless Networks 585 -- 18.2 System Model 586 -- 18.4 Optimal Control Policy 592 -- 18.5 Achievable Rates 594 -- 18.6 Stabilizing Transmission Policies 598 -- References 605 -- 19 Multi-Operator Spectrum Sharing 607 -- 19.1 Business Models for Spectrum Sharing 607 -- 19.2 Spectrum Sharing in Multi-hop Networks 638 -- References 656 -- 20 Large Scale Networks and Mean Field Theory 659 -- 20.1 MFT for Large Heterogeneous Cellular Networks 659 -- 20.2 Large Scale Network Model Compression 664 -- 20.3 Mean Field Theory Model of Large Scale DTN Networks 668 -- 20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks 674 -- 20.5 Mean Field Theory for Scale-Free Random Networks 701 -- 20.6 Spectrum Sharing and MFT 709 -- 20.7 Modeling Dynamics of Complex System 711 -- Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm) 721 -- Appendix B.20 Infection Rate of Destinations for DNCM 722 -- Appendix C.20 Infection Rate for Basic Epidemic Routing 722 -- References 722 -- 21 mmWave Networks 726 -- 21.1 mmWave Technology in Subcellular Architecture 726 -- 21.2 Microeconomics of Dynamic mmWave Networks 737 -- References 747 -- 22 Cloud Computing in Wireless Networks 750 -- 22.1 Technology Background 750 -- 22.2 System Model 752 -- 22.3 System Optimization 756 -- 22.4 Dynamic Control Algorithm 758 -- 22.5 Achievable Rates 761 -- 22.6 Stabilizing Control Policies 763 -- References 769 -- 23 Wireless Networks and Matching Theory 771.…”
    Libro electrónico
  15. 302135
    Publicado 2021
    Tabla de Contenidos: “…-- Culture Fit -- Ability to Buy -- Motivation -- Competence in M&amp -- A -- Trust and Alignment of Values -- Vetting Buyers for the Right Fit -- Research -- M&amp -- A Professionals -- Interview Others -- Build Personal Relationships -- Become a Customer or Vendor -- Partner Up -- Using Partnerships to Trigger Acquisitions -- How to Make Contact with Interested Parties -- Introductions and Referrals -- Networking -- Cold Emails -- Be So Good They Can't Ignore You -- Move Up the List in Reverse Order -- Use Brokers -- The Golden Rule in Making Contact -- Chapter 9 The Communication Process with Buyers -- Liabilities and Responsibilities -- How to Handle Communications -- Gauging Initial Interest -- Nailing the Follow-Up -- Awareness and Discovery -- Learning -- Consideration -- Comparison Shopping -- Trust -- Due Diligence -- Negotiation -- Finding the Decision-Maker -- C-Suite Executives -- Corporate Development -- Advisors -- Transaction Leads -- Business Unit Leaders -- Chapter 10 Preparing for a Successful First Meeting…”
    Libro electrónico
  16. 302136
    Publicado 2021
    Tabla de Contenidos: “…Step 1: Generate Your API Token in Cloud App Security -- Step 2: Create Your Trigger in Microsoft Flow -- Step 3: Create the Teams Message Action in Microsoft Flow -- Step 4: Generate an Email in Microsoft Flow -- Connecting the Flow in Cloud App Security -- Performing an Automated Response Using Azure Security Center -- Using Machine Learning and Artificial Intelligence in Threat Response -- Overview of Fusion Detections -- Overview of Azure Machine Learning -- Summary -- Chapter 5 Microsoft Cybersecurity Reference Architecture and Capability Map -- Introduction -- Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) -- Microsoft Security Architecture -- The Identify Function -- The Protect Function -- The Detect Function -- The Respond Function -- The Recover Function -- Using the Microsoft Reference Architecture -- Microsoft Threat Intelligence -- Service Trust Portal -- Security Development Lifecycle (SDL) -- Protecting the Hybrid Cloud Infrastructure -- Azure Marketplace -- Private Link -- Azure Arc -- Azure Lighthouse -- Azure Firewall -- Azure Web Application Firewall (WAF) -- Azure DDOS Protection -- Azure Key Vault -- Azure Bastion -- Azure Site Recovery -- Azure Security Center (ASC) -- Microsoft Azure Secure Score -- Protecting Endpoints and Clients -- Microsoft Endpoint Manager (MEM) Configuration Manager -- Microsoft Intune -- Protecting Identities and Access -- Azure AD Conditional Access -- Passwordless for End-to-EndSecure Identity -- Azure Active Directory (aka Azure AD) -- Azure MFA -- Azure Active Directory Identity Protection -- Azure Active Directory Privilege Identity Management (PIM) -- Microsoft Defender for Identity -- Azure AD B2B and B2C -- Azure AD Identity Governance -- Protecting SaaS Apps -- Protecting Data and Information -- Azure Purview -- Microsoft Information Protection (MIP)…”
    Libro electrónico
  17. 302137
    Publicado 2016
    Tabla de Contenidos: “…Promoting competition and improving the business environment -- C. Reforming education and strengthening skill use and school-to-work transitions -- D. …”
    Libro electrónico
  18. 302138
    por OECD
    Publicado 2020
    Tabla de Contenidos: “…. -- Основные выводы по компонентам -- Обеспечение равных условий деятельности в странах Восточного партнерства -- Защита конкуренции -- Принудительное исполнение договоров и альтернативное урегулирование споров -- Коммерческая добросовестность -- Компонент А - Адаптивное государственное управление -- Институционально-нормативная база -- Условия деятельности -- Процедуры банкротства и предоставление второго шанса -- Компонент B - Предприимчивость в развитии человеческого капитала -- Развитие предприимчивости в процессе обучения и поддержка предпринимательской деятельности женщин -- Умения МСП -- Компонент C - Доступ к финансированию -- Доступ к финансированию -- Компонент D - Доступ к рынкам -- Государственные закупки -- Стандарты и технические нормативы -- Интернационализация -- Компонент E - Поддержка инноваций и предпринимательства -- Услуги по развитию бизнеса -- Политика в области инноваций -- Применение принципов зеленой экономики -- Основные результаты оценки по странам…”
    Libro electrónico
  19. 302139
    Tabla de Contenidos: “…Produit intérieur brut -- Tableau C. Comptes des ménages et des institutions privées sans but lucratif -- Tableau D. …”
    Libro electrónico
  20. 302140
    Publicado 2017
    Tabla de Contenidos: “…. -- Passing formatted arguments to a command by reading stdin -- Using xargs with find -- Counting the number of lines of C code in a source code directory -- While and subshell trick with stdin -- Translating with tr -- Getting ready -- How to do it... -- How it works... -- There's more... -- Deleting characters using tr -- Complementing character sets -- Squeezing characters with tr -- Character classes -- Checksum and verification -- Getting ready -- How to do it... -- How it works... -- There's more…”
    Libro electrónico