Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 51
- Economic conditions 42
- Business & Economics 39
- Economic policy 38
- Economic History 31
- Historia 25
- Blockchains (Databases) 20
- Counterinsurgency 18
- Monedas 17
- Antiquities 16
- Programming 16
- Video games 16
- Excavations (Archaeology) 15
- Numismática latina 15
- Application software 13
- Cryptocurrencies 13
- Monedas romanas 13
- Computer programming 11
- Development 11
- Música 11
- Social aspects 11
- Coins 10
- Computer security 10
- Design 10
- Monedas griegas 10
- Politics and government 10
- Python (Computer program language) 10
- numismática latina 10
- Archaeology 9
- Bitcoin 9
-
681Publicado 2015“…Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect new developments in network security Introduces a chapter on Cloud security, a very popular and essential topic Uses everyday examples that most computer users experience to illustrate important principles and mechanisms Features a companion website with Powerpoint slides for lectures and solution manuals to selected exercise problems, available at http://www.cs.uml.edu/~wang/NetSec…”
Libro electrónico -
682por Krajewski, Lee J.Tabla de Contenidos: “…Learning Goals in Review -- MyLab Operations Management Resources -- Key Equations -- Key Terms -- Solved Problems -- Discussion Questions -- Problems -- Active Model Exercise -- Video Case Quality at Axon -- Experiential Learning 3.1 Statistical Process Control with a Coin Catapult -- 4 CAPACITY PLANNING -- Tesla Motors -- Planning Long‐Term Capacity -- Measures of Capacity and Utilization -- Economies of Scale -- Diseconomies of Scale -- Capacity Timing and Sizing Strategies -- Sizing Capacity Cushions -- Timing and Sizing Expansion -- Linking Capacity and Other Decisions -- A Systematic Approach to Long‐Term Capacity Decisions -- Step 1: Estimate Capacity Requirements -- Step 2: Identify Gaps -- Step 3: Develop Alternatives -- Step 4: Evaluate the Alternatives -- Tools for Capacity Planning -- Managerial Practice 4.1 Capacity Planning at PacifiCorp -- Waiting‐Line Models -- Simulation -- Decision Trees -- Learning Goals in Review -- MyLab Operations Management Resources -- Key Equations -- Key Terms -- Solved Problems -- Discussion Questions -- Problems -- Video Case Gate Turnaround at Southwest Airlines -- Case Fitness Plus, Part A -- SUPPLEMENT B Waiting Lines -- Structure of Waiting‐Line Problems -- Customer Population -- The Service System -- Priority Rule -- Probability Distributions -- Arrival Distribution -- Service Time Distribution -- Using Waiting‐Line Models to Analyze Operations -- Single‐Server Model -- Multiple‐Server Model -- Little's Law -- Finite‐Source Model -- Waiting Lines and Simulation -- SimQuick -- Decision Areas for Management -- Learning Goals in Review -- MyLab Operations Management Resources -- Key Equations -- Key Terms -- Solved Problem -- Problems -- 5 CONSTRAINT MANAGEMENT -- Microsoft Corporation -- The Theory of Constraints -- Key Principles of the TOC -- Managing Bottlenecks in Service Processes…”
Publicado 2019
Libro electrónico -
683Publicado 2023Tabla de Contenidos: “…Understanding property replication -- Enabling property replication -- Referencing Actors and components over the network -- Handling character level-ups -- Planning ahead -- Declaring PlayerState properties and functions -- Implementing the PlayerState logic -- Adding coin pickups to the level -- Adding a HUD to the game -- Creating the Widget Blueprint -- Adding code logic to the Widget Blueprint -- Adding the HUD to the character -- Testing the game -- Summary -- Chapter 7: Using Remote Procedure Calls (RPCs) -- Technical requirements -- Understanding what an RPC is -- Reliability of an RPC -- Validating RPCs -- Executing RPCs over the network -- Calling a function on the server -- Implementing a door system -- Creating the Interactable interface -- Implementing the interact action -- Creating the door Blueprint -- Testing the interact action -- Summary -- Part 3: Improving Your Game -- Chapter 8: Introducing AI into a Multiplayer Environment -- Technical requirements -- Setting up the AI system -- Creating an AI opponent -- Adding the navigation module -- Creating the minion class -- Implementing the minions' behaviors -- Adding opponents to the level -- Creating a spawner class -- Testing the spawner -- Summary -- Chapter 9: Extending AI Behaviors -- Technical requirements -- Making AI opponents more challenging -- Making some noise -- Enabling the hearing sense -- Testing the hearing sense -- Implementing an alert system -- Declaring the Game Mode functions -- Making the AI send alert messages -- Adding health to the AI -- Adding a weapon system to the character -- Creating a dagger projectile -- Implementing the weapon component -- Attaching the WeaponProjectile component to the character -- Adding an input system for the weapon -- Testing the weapon system -- Creating AI variations -- Creating an AI sentinel -- Creating an AI miniboss…”
Libro electrónico -
684Publicado 2017Tabla de Contenidos: “…Priority queues and heaps -- Inserting -- Pop -- Testing the heap -- Selection algorithms -- Summary -- Chapter 9: Searching -- Linear Search -- Unordered linear search -- Ordered linear search -- Binary search -- Interpolation search -- Choosing a search algorithm -- Summary -- Chapter 10: Sorting -- Sorting algorithms -- Bubble sort -- Insertion sort -- Selection sort -- Quick sort -- List partitioning -- Pivot selection -- Implementation -- Heap sort -- Summary -- Chapter 11: Selection Algorithms -- Selection by sorting -- Randomized selection -- Quick select -- Partition step -- Deterministic selection -- Pivot selection -- Median of medians -- Partitioning step -- Summary -- Chapter 12: Design Techniques and Strategies -- Classification of algorithms -- Classification by implementation -- Recursion -- Logical -- Serial or parallel -- Deterministic versus nondeterministic algorithms -- Classification by complexity -- Complexity curves -- Classification by design -- Divide and conquer -- Dynamic programming -- Greedy algorithms -- Technical implementation -- Dynamic programming -- Memoization -- Tabulation -- The Fibonacci series -- The Memoization technique -- The tabulation technique -- Divide and conquer -- Divide -- Conquer -- Merge -- Merge sort -- Greedy algorithms -- Coin-counting problem -- Dijkstra's shortest path algorithm -- Complexity classes -- P versus NP -- NP-Hard -- NP-Complete -- Summary -- Chapter 13: Implementations, Applications, and Tools -- Tools of the trade -- Data preprocessing -- Why process raw data? …”
Libro electrónico -
685Publicado 2021Tabla de Contenidos: “…-- A Word about Personality -- Two Different Approaches to Lean Leadership Transformation -- Another Way to Think about This -- On the Other Side of the Coin … -- Random Thought: Why Do People Get Shorter and Shorter by the Day? …”
Libro electrónico -
686Publicado 2018Tabla de Contenidos: “…Inspection and adaption -- The importance of User Experience (UX) -- Shifting left -- Shifting right -- Introducing some Lean thinking to improve flow -- The coin game results -- Systems thinking - Optimizing the whole -- Changing our workflow -- Kaizen and developing a small, continuous improvement mindset -- Fail Cake -- Root cause analysis with the Five Whys method -- Adopting Lean Startup methods to validate ideas -- Build, Measure, Learn -- An example of Lean Startup MVP -- Background -- Hypothesis -- Approach -- Learning rapidly by doing and failing fast -- Summary -- Chapter 9: Seeking Value - How to Deliver Better Software Sooner -- Moving from project to product thinking -- Cynefin - A sense-making framework -- The advantages of a product team -- Moving from project to product -- Setting objectives to create alignment of purpose -- Using Objectives and Key Results (OKRs) -- Hypothesis-Driven Development (HDD) -- Data, Insights, Beliefs, Bets (DIBBs) -- Seeking value -- How to seek value -- Telling our team "the why" not "the what -- Summary -- Chapter 10: Using Product Roadmaps to Guide Software Delivery -- The importance of Product Roadmaps -- Product Discovery to create roadmaps -- User Story Mapping -- Activity - creating a User Story Map -- Step 1 - User roles -- Step 2 - The first User Journey -- Step 3 - Alternative paths, sub-tasks, details, and business rules -- Step 4 - Naming the activities -- Leveraging the User Story Map -- Impact Mapping -- Activity - Creating an Impact Map -- Question 1 - Why are we doing this? …”
Libro electrónico -
687Publicado 2023Tabla de Contenidos: “…-- Transactions, UTXO, and account balances -- Genesis block and coin supply -- How does Bitcoin payment work? -- Limitations in Bitcoin -- Altcoins -- Overview of blockchain use cases in the industry and government -- Financial services -- Healthcare -- Blockchain use cases led by government -- Ushering in the world of Ethereum -- Smart contract -- EVM -- Account -- Summary -- Chapter 2: Ethereum Architecture and Ecosystem -- Technical requirements -- Introducing the Eth1 Architecture -- Ethereum - the world computer -- Web 2.0, Web3, to the Metaverse -- DApps -- Diving deep into Eth1 -- Accounts -- Two types of accounts -- EOAs -- CAs -- Transactions and messages -- Smart contracts -- Ether and gas -- The EVM -- Addresses and wallets -- Examining mining in Eth 1.0 -- Mining and the consensus protocol -- Ethereum transactions and block structure -- Transaction validation and block verification -- Understanding scaling challenges in Ethereum -- The blockchain scalability trilemma -- Modular blockchain architecture -- Ethereum scaling solutions -- Introducing Beacon Chains and Eth2 -- PoS in Eth2 -- How the beacon chain works -- Benefits from the transition to PoS -- Merging Eth1 and Eth2 -- Merging Eth1 data into Eth2…”
Libro electrónico -
688Publicado 2023“…The book further explores advanced concepts such as smart contracts; distributed token mining, initial coin offerings; proof of work; public, private, and other blockchains; cryptography; security; and blockchains. …”
Libro electrónico -
689por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Charge fiscale sur la main-d'œuvre -- Graphique 23. Coin fiscal marginal par type de ménage et niveau de salaire -- Tableau 22. …”
Publicado 2001
Libro electrónico -
690por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Structure d'imposition de quelques pays de l'OCDE -- Graphique 30. Coins fiscaux marginaux sur les revenus du travail -- Graphique 31. …”
Publicado 2000
Libro electrónico -
691por OCDE, OECD /.Tabla de Contenidos: “…Les coûts d'administration de l'impôt sont relativement faibles et le taux de couverture augmente -- L'impôt sur le revenu s'applique à des assiettes limitées -- L'impôt sur le revenu des personnes physiques est progressif mais sa base est étroite -- Tableau 2.2. Le coin fiscal moyen et le coin fiscal marginal sont relativement faibles -- Graphique 2.3. …”
Publicado 2016
Libro electrónico -
692por OCDE, OECD /.Tabla de Contenidos: “…Répartition nationale et régionale des ressources entre les différents programmes d'activation -- Graphique 2.8. Le coin fiscal sur les bas salaires est élevé -- Contenir la hausse des coûts de main-d'œuvre dans les régions moins développées -- Graphique 2.9. …”
Publicado 2015
Libro electrónico -
693Publicado 2015Tabla de Contenidos: “…Generational Amnesia The Rest of the Story The Rise of Mutual Funds The Best Coin Flipper in the World That Famous Scene in "The Deer Hunter" Chapter Eight. …”
Libro electrónico -
694Publicado 2011Tabla de Contenidos: “…. -- The other side of the coin: de-selecting material from a research library's storage facility / Suzanne M. …”
Libro electrónico -
695por OCDE, OECD /.Tabla de Contenidos: “…La réforme fiscale est importante mais le coin fiscal au bas de la fourchette des revenus demeure élevé -- Encadré 1. …”
Publicado 2016
Libro electrónico -
696por OCDE, OECD /.Tabla de Contenidos: “…Prix de l'électricité pour les ménages et les entreprises -- La poursuite des réformes du marché du travail peut compenser en partie l'incidence de l'évolution démographique sur l'offre de main-d'œuvre -- Graphique 10. Différence du coin fiscal moyen entre le premier et le deuxième apporteur de revenus -- Recommandations visant à renforcer la croissance potentielle et à atténuer l'incidence de l'évolution démographique sur les niveaux de vie -- Rendre la croissance économique plus inclusive socialement -- Graphique 11. …”
Publicado 2015
Libro electrónico -
697por Nunes, Fabio MazanattiTabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Overview of WebLogic Server 12c and Related Technologies -- Introducing Oracle WebLogic Server 12c -- WebLogic Server @ Oracle -- Most relevant features -- Overview of JDK 7 -- The Project Coin -- The diamond operator -- The try-with-resources statement -- Strings in switch statements -- Manipulating binary integral literals -- Exception handling with multicatch statements -- Delving into Java EE 6 -- Other technologies in the book -- Oracle Enterprise Pack for Eclipse -- Oracle Coherence -- PrimeFaces -- MySQL -- The Cloud Application Foundation (CAF) -- Oracle Traffic Director -- Oracle Tuxedo -- Oracle Virtual Assembly Builder -- Oracle Exalogic and WebLogic 12c -- Web resources -- Java and Java EE 6 -- WebLogic 12c -- Coherence -- Other tools -- Summary -- Chapter 2: Setting Up the Environment -- About the directory structure -- Installing JDK 1.7 -- Installing Oracle WebLogic Server -- Installing Oracle Enterprise Pack for Eclipse (OEPE) -- Installing MySQL -- Installing on Linux using a package manager -- Downloading and installing manually -- Disabling case sensitivity for tables on Unix/Linux -- Some Windows specifics -- Configuring MySQL databases -- Preparing PrimeFaces -- Downloading the binaries -- Creating a shared library -- Setting up a WebLogic domain -- Configuring Eclipse and OEPE -- Linking WebLogic's runtime environment -- Adding a reference to the PrimeFaces' shared library -- Linking WebLogic Server's instance -- Referencing MySQL databases -- Creating WebLogic data sources -- Adding database connections to Eclipse -- Using OpenLDAP -- Installing OpenLDAP -- Configuring an OpenLDAP server -- Loading sample entries and testing -- Web resources -- Summary…”
Publicado 2013
Libro electrónico -
698por Al-Turjman, FadiTabla de Contenidos: “…4.3.3 Strategy for preserving population heterogeneity -- 4.3.4 Inner functioning and complexity of the proposed algorithm -- 4.4 Experiments and comparative analysis -- 4.4.1 Dataset and preprocessing -- 4.4.2 Experimental setup -- 4.4.3 Obtained simulation outcomes and comparative analysis -- 4.5 Conclusion -- References -- 5 Reviewing artificial intelligence and blockchain innovations: transformative applications in the energy sector -- 5.1 Introduction -- 5.2 Literature review -- 5.2.1 Background of blockchain technology -- 5.2.2 Distributed energy resources, a new paradigm -- 5.2.3 Consensus algorithms -- 5.3 Applications of artificial intelligence and blockchain in the energy industry -- 5.3.1 Artificial intelligence in solar energy: yield performance predictions -- 5.3.2 Using artificial intelligence to improve energy performance -- 5.3.3 Artificial intelligence in grid management -- 5.3.4 Solar coin use on blockchain for renewables -- 5.3.5 Trading in energy (blockchain using peer-to-peer and artificial intelligence technologies) -- 5.3.6 Intelligent grids -- 5.3.7 Grid security -- 5.3.8 Grid administration and efficiency -- 5.3.9 Increased productivity -- 5.3.10 Predictive analytics -- 5.3.11 Storage of energy -- 5.3.12 Trading in energy -- 5.3.13 Power theft and energy fraud detection -- 5.3.14 Microgrids -- 5.3.15 Customer engagement -- 5.4 Use cases -- 5.4.1 Powerledger -- 5.4.2 Energy web foundation -- 5.4.3 Verv -- 5.5 Discussions -- 5.5.1 Comparison between Solana and the Ethereum network -- 5.5.1.1 Tesla power and Powerlegder -- 5.6 Conclusion -- References -- 6 Using artificial intelligence in education applications -- 6.1 Introduction -- 6.2 Extent of past work -- 6.3 Materials and methods -- 6.4 Result and discussion -- 6.5 Conclusion -- References…”
Publicado 2024
Libro electrónico -
699Publicado 2018Tabla de Contenidos: “…. -- Todo list - implementing ComponentWillMount -- Pomodoro timer - implementing the constructor and componentDidMount -- Crypto coins exchanger - implementing shouldComponentUpdate -- Notes - implementing componentWillReceiveProps and componentWillUnmount -- C3.js chart - implementing componentDidUpdate -- Basic animation - implementing componentWillUpdate -- How it works... -- Understanding React Pure Components -- Getting ready -- How to do it... -- How it works... -- Preventing XSS vulnerabilities in React -- How to do it... -- How it works... -- There's more... -- Chapter 3: Handling Events, Binding and Useful React Packages -- Introduction -- Binding methods using the constructor versus using arrow functions -- How to do it... -- How it works... -- Creating form elements with events…”
Libro electrónico -
700Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: BLE and the Internet of Things -- Internet of Things -- Modern day IoT -- Real life examples of the Internet of Things -- Wearables -- The fitness tracker -- Smart home devices -- Amazon Echo -- Wireless bulbs -- Smart refrigerators -- Television and online media -- Google Chromecast -- Apple TV -- Automotive industry -- Technologies in the Internet of Things -- Wireless Local Area Network (WLAN) -- Wireless Ad-hoc Networks -- ZigBee -- Bluetooth Low Energy -- Bluetooth versions -- Bluetooth Low Energy Key Concepts -- Attribute Protocol (ATT) and Generic Attribute Profile (GATT) -- GATT Server and GATT Client -- Universally Unique Identifiers (UUIDs) -- GATT-based Bluetooth Profile Hierarchy -- Service -- Characteristic -- Generic Access Profile (GAP) -- Broadcaster -- Observer -- Central -- Peripheral -- Bluetooth Low Energy Security -- Key Generation -- Association Models in Pairing -- Numeric Comparison -- Just Works -- Out of Band (OOB) -- Passkey Entry -- Signing the Data -- Privacy -- Bluetooth Low Energy for the Internet of Things -- Applications of BLE in IoT -- Bluetooth Low Energy Beacons -- Bluetooth Low Energy Beacon use-case -- Communication model of BLE Beacons -- Bluetooth mesh networks -- Summary -- Chapter 2: BLE Hardware, Software, and Debugging Tools -- Bluetooth Low Energy hardware -- Development kits -- Nordic semiconductor nRF51 development kit -- S110 SoftDevice -- S120 SoftDevice -- S130 SoftDevice -- Adafruit Bluefruit LE on nRF8001 Bluetooth Low Energy IC -- Coin Arduino BLE hardware -- Bluetooth Low Energy software -- Bluetooth Developer Studio by Special Interest Group -- Nordic Semiconductor tools -- nRF Connect for Mobile (Android and iOS)…”
Libro electrónico