Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 239
- Application software 202
- Artificial intelligence 200
- Management 192
- Engineering & Applied Sciences 170
- Computer networks 160
- Cloud computing 157
- Computer programs 127
- Machine learning 123
- Computer security 116
- Computer graphics 102
- Data processing 101
- Python (Computer program language) 101
- Security measures 101
- Digital techniques 98
- Computer Science 94
- Photography 85
- Web site development 82
- Design 81
- Technological innovations 81
- Internet of things 79
- Image processing 77
- Computer software 76
- History 71
- Programming 71
- Examinations 68
- Information technology 67
- Historia 65
- Leadership 65
- Computer programming 59
-
3321Publicado 2013“…In this entertaining and insightful analysis, cognitive scientist Don Norman hails excellence of design as the most important key to regaining the competitive edge in influencing consumer behavior. Now fully expanded and updated, with a new introduction by the author, The Design of Everyday Things is a powerful primer on how-and why-some products satisfy customers while others only frustrate them…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra)Libro -
3322por Royal Institute of Philosophy.“…How can phenomenological method be used within a naturalistic research programme? This cutting-edge collection of original essays contains brilliant contributions from leading phenomenologists across the world. …”
Publicado 2013
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto)Libro -
3323por SanMiguel, Patricia“…The book also discusses future trends regarding social media management in the fashion domain via interviews with senior fashion experts. This cutting-edge book that combines theory and practice will appeal to undergraduate and master students across a broad range of fields including fashion studies, marketing, digital marketing and communication and to young professionals who are starting to work in social media. …”
Publicado 2024
Libro electrónico -
3324Publicado 2019Tabla de Contenidos: “…8.3 Fuzzy-level Subgroup 226 -- 8.4 Fuzzy Normal Subgroup 228 -- 8.5 Fuzzy Subgroups Using T-norms 229 -- 8.6 Product of Fuzzy Subgroups 231 -- 8.7 Summary 234 -- References 235 -- 9 Application of Fuzzy/Intuitionistic Fuzzy Set in Image Processing 237 -- 9.1 Introduction 237 -- 9.2 Digital Images 237 -- 9.3 Image Enhancement 238 -- 9.3.1 Fuzzy Enhancement Method 238 -- 9.3.2 Intuitionistic Fuzzy Enhancement Method 239 -- 9.4 Thresholding 240 -- 9.4.1 Intuitionistic Fuzzy Thresholding Method 242 -- 9.4.2 Fuzzy Thresholding Method 244 -- 9.5 Edge Detection 244 -- 9.5.1 Fuzzy Edge-detection Method 245 -- 9.5.2 Intuitionistic Fuzzy Edge Detection 246 -- 9.6 Clustering 248 -- 9.6.1 Fuzzy c Means Clustering (FCM) 248 -- 9.6.2 Intuitionistic Fuzzy Clustering 249 -- 9.6.3 Kernel Clustering 250 -- 9.7 Mathematical Morphology 252 -- 9.7.1 Fuzzy Approach 254 -- 9.7.2 Intuitionistic Fuzzy Approach 254 -- 9.8 Summary 256 -- References 256 -- 10 Type-2 Fuzzy Set 259 -- 10.1 Introduction 259 -- 10.2 Type-2 Fuzzy Set 260 -- 10.3 Operations on Type-2 Fuzzy Set 263 -- 10.4 Inclusion Measure and Similarity Measure 267 -- 10.4.1 Similarity Measure 268 -- 10.5 Interval Type-2 Fuzzy Set 270 -- 10.6 Application of Interval Type-2 Fuzzy Set in Image Segmentation 271 -- 10.7 Summary 273 -- References 273 -- Beyond Your Doubts 275 -- Index 281.…”
Libro electrónico -
3325Publicado 2011Tabla de Contenidos: “…14 Protecting SharePoint with Advanced Antivirus and Edge Security Solutions -- Understanding the Forefront Edge Line of Products -- Outlining the Need for the Forefront Edge Line for SharePoint Environments -- Outlining the Inherent Threat in SharePoint Web Traffic -- Securing SharePoint Sites with Forefront TMG 2010 -- Securing SharePoint Sites Using Forefront UAG -- Protecting SharePoint 2010 from Viruses Using Forefront Protection 2010 for SharePoint -- Summary -- Best Practices -- 15 Implementing and Validating SharePoint 2010 Security -- Identifying Isolation Approaches to SharePoint Security -- Physically Securing SharePoint Servers -- Securing SharePoint's SQL Server Installation -- Utilizing Security Templates to Secure a SharePoint Server -- File-Level Security for SharePoint Servers -- Verifying Security Using the Microsoft Baseline Security Analyzer -- Deploying Transport-Level Security for SharePoint -- Examining Integration Points Between SharePoint and Public Key Infrastructure -- Using IPsec for Internal SharePoint Encryption -- Summary -- Best Practices -- 16 Configuring Email-Enabled Content, Presence, and Exchange Server Integration -- Enabling Incoming Email Functionality in SharePoint -- Working with Email-Enabled Content in SharePoint 2010 -- Understanding Microsoft Exchange Server 2010 -- Planning for an Exchange Server 2010 Environment -- Integrating Exchange 2010 with SharePoint 2010 -- Enabling Presence Information in SharePoint with Microsoft Communications Server 2010 -- Summary -- Best Practices -- 17 Safeguarding Confidential Data in SharePoint 2010 -- Understanding the Threats to SharePoint Data -- SQL Server Database Mirroring for SharePoint Farms -- Examining Supported Topologies -- Outlining Database Mirroring Requirements -- Enabling SQL Database Mirroring -- Using SQL Transparent Data Encryption (TDE)…”
Libro electrónico -
3326Publicado 2013Tabla de Contenidos: “…26 Manejo multidisciplinario de las deformidades por labio y paladar hendido27 Manejo multidisciplinario de la apnea obstructiva del sueño; Sección 4 Técnicas de aparatología; 28 Respuestas biológicas durante el movimiento dental ortodóncico; 29 Anclaje ortodóncico; 30 Anclaje ortodóncico óseo; 31 Dispositivo de arco recto; 32 Brackets de autoligado; 33 Aparatología Tip-Edge; 34 Alineadores transparentes; 35 Aparatos funcionales; 36 Técnicas de aparatología lingual; 37 Estabilidad y retención; Índice…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3327Publicado 2013Tabla de Contenidos: “…Macro Level Concepts: A Preliminary Restatement of Clinical Theory and Therapeutic Action7 A View from the Edge; Introduction; Therapeutic Discourse; Power; A Plea for Uncertainty; Support, Palliation, and Care; Therapeutic Action: A Reconsideration; The Self as Bio-Psychosocial Holism; References; Author Index; Subject Index…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3328Publicado 2009Tabla de Contenidos: “…Eliot’s “Little Lidding” -- Harmonious Balance as the Ultimate Reality in Artistic and Philosophical Interpretation of the Taiji Diagram -- Time After Time: The Temporality of Human Existence in Faulkner’s The Sound and the Fury -- Toward Destiny -- Destiny in the Literature of Walker Percy, Leo Tolstoy and Eudora Welty -- The Interior Quest: Memoir, Lens of Personal Destiny -- Collective Intentions and the Phenomenology of Time – The Theory of Non-Domination in Communication -- Interpretation Of Destiny -- Human Destiny at the Edge of Existential Categories of Life: Musil and Kundera in Dialogue -- Aspiring Beyond:French Romanticism, Nietzsche And Saint-John Perse -- Words Turn into Stone Haruki Murakami’s After The Quake -- On the Modern Opposition of Fate, Destiny, Life, Doom and Luck in the Light of Henry James’s The Portrait of a Lady -- Gail Godwin: Negotiating With Destiny in The Odd Woman and “Dream Children” -- The Soul and its Destiny: Readings and Dialogues on Science, Philosophy and Religion - A Meeting with Vito Mancuso and Orlando Franceschelli…”
Libro electrónico -
3329Publicado 2013Tabla de Contenidos: “…-- Exercises on NP-Completeness Easy reductionsAbout graph coloringScheduling problemsMore involved reductions2-PARTITION is NP-complete -- Beyond NP-Completeness Approximation resultsPolynomial problem instancesLinear programmingRandomized algorithms Branch-and-bound and backtracking -- Exercises Going beyond NP-Completeness Approximation resultsDealing with NP-complete problems -- Reasoning on Problem Complexity Reasoning to Assess a Problem Complexity Basic reasoning Set of problems with polynomial-time algorithms Set of NP-complete problems -- Chains-on-Chains Partitioning Optimal algorithms for homogeneous resources Variants of the problem Extension to a clique of heterogeneous resourcesConclusion -- Replica Placement in Tree Networks Access policies Complexity resultsVariants of the replica placement problem Conclusion -- Packet Routing MEDP: Maximum edge-disjoint pathsPRVP: Packet routing with variable-pathsConclusion -- Matrix Product, or Tiling the Unit Square Problem motivation NP-completeness A guaranteed heuristicRelated problems -- Online Scheduling Flow time optimization Competitive analysisMakespan optimizationConclusion -- Bibliography -- Index…”
Libro electrónico -
3330Publicado 2011Tabla de Contenidos: “…Media, conflict prevention, and peacebuilding : mapping the edges / Sheldon Himelfarb and Megan Chabalowski -- 3. …”
Libro electrónico -
3331Publicado 2022Tabla de Contenidos: “…. -- The Law -- The Science -- Summary -- Notes -- Recommended Reading -- Chapter 2 Morality -- Data Is All Around Us -- Morality and Technology -- Misconceptions of Data Ethics -- Limits of Tech and Data Ethics -- Summary -- Notes -- Chapter 3 Bias -- Types of Bias -- Before You Code -- Bias Messaging -- Summary -- Notes -- Chapter 4 Computational Thinking in Practice -- Ready to Code -- Algorithmic Justice Practice -- Code Cloning -- Summary -- Notes -- Part II Accountability -- Chapter 5 Messy Gathering Grove -- Ask the Why Question -- Collection -- Reformat -- Summary -- Notes -- Chapter 6 Inconsistent Storage Sanctuary -- Ask the "What" Question -- Files, Sheets, and the Cloud -- Modeling Content Associations -- Manipulating with SQL -- Summary -- Notes -- Chapter 7 Circus of Misguided Analysis -- Ask the "How" Question -- Misevaluating the "Cleaned" Dataset -- Overautomating k, K, and Thresholds -- Not Estimating Algorithmic Risk at Scale -- Summary -- Notes -- Chapter 8 Double-Edged Visualization Sword -- Ask the "When" Question -- Critiquing Visual Construction -- Pretty Picture Mirage -- Summary -- Notes -- Part III Governance -- Chapter 9 By the Law -- Federal and State Legislation -- International and Transatlantic Legislation -- Regulating the Tech Sector -- Summary -- Notes -- Chapter 10 By Algorithmic Influencers -- Group (Re)Think -- Flyaway Fairness -- Moderation Modes -- Summary -- Notes -- Chapter 11 By the Public -- Freeing the Underestimated -- Learning Data Civics -- Condemning the Original Stain -- Tech Safety in Numbers -- Summary -- Notes -- Appendix A Code for app.py -- A -- B -- C -- D -- Appendix B Code for screen.py -- A.…”
Libro electrónico -
3332Publicado 2021Tabla de Contenidos: “…Legislation: A Double-Edged Sword in Union Resistance to Zero-Hours Work -- The Case of Ireland…”
Libro electrónico -
3333Publicado 2016Tabla de Contenidos: “…Selecting the 1979 Biennale of Sydney; Import/Export: Sydney and São Paulo; Conclusion; Notes; 3: 1986: The South and the Edges of the Global; Introduction: Origin Stories; A Brief History of Southern Biennials; The Second Bienal de La Habana; Conclusion: The Stakes of Southern Histories; Notes; Part 2: The Politics of Legitimacy; 4: 1989: Asian Biennialization; Introduction; Experimental Versus Traditional Art: "Traditions/Tensions"; Conclusion; Notes…”
Libro electrónico -
3334Publicado 2016Tabla de Contenidos: “…Martelli -- Investing on the edge: exploring the opportunities for diversification in frontier markets / A. …”
Libro electrónico -
3335Publicado 2015Tabla de Contenidos: “…CalculatorCalendar; Camera; Character Map ; Command Prompt; Contact Support; Cortana; Games; Get Office, Get Skype; Get Started; Groove Music; Magnifier; Mail; Maps; Math Input Panel; Microsoft Edge; Microsoft Solitaire Collection; Money; Movies & TV; Music; Narrator; News; Notepad; On-Screen Keyboard; OneDrive; OneNote; Paint; People; Phone Companion; Photos; Remote Desktop Connection; Run; Settings; Skype; Snipping Tool; Sports; Steps Recorder; Sticky Notes; Store; Voice Recorder; Weather; Windows Defender; Windows Fax and Scan; Windows Journal; Windows Media Player; Windows PowerShell…”
Libro electrónico -
3336por ACM/IFIP/USENIX International Middleware ConferenceTabla de Contenidos: “…Invited Paper -- Middleware and Web Services for the Collaborative Information Portal of NASA’s Mars Exploration Rovers Mission -- Peer-to-Peer Computing -- A Content Model for Evaluating Peer-to-Peer Searching Techniques -- Foreseer: A Novel, Locality-Aware Peer-to-Peer System Architecture for Keyword Searches -- Guiding Queries to Information Sources with InfoBeacons -- Routing Protocols and Overlays -- The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations -- Directed Flood-Routing Framework for Wireless Sensor Networks -- On Exploring Performance Optimizations in Web Service Composition -- iOverlay: A Lightweight Middleware Infrastructure for Overlay Application Implementations -- Middleware for Replication and Transactions -- Ganymed: Scalable Replication for Transactional Web Applications -- Adaptive Middleware for Data Replication -- Alternative Edge-Server Architectures for Enterprise JavaBeans Applications -- Transparent Information Dissemination -- Publish/Subscribe -- An Ontology-Based Publish/Subscribe System -- Meghdoot: Content-Based Publish/Subscribe over P2P Networks -- Subscription Propagation in Highly-Available Publish/Subscribe Middleware -- Web Services: Composition, Integration and Interoperability -- Composition of Coordinated Web Services -- Adaptive Resource Sharing in a Web Services Environment -- Interoperability Among Independently Evolving Web Services -- Middleware for Mobility -- SyD: A Middleware Testbed for Collaborative Applications over Small Heterogeneous Devices and Data Stores -- Dynamically Programmable and Reconfigurable Middleware Services -- MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications -- A Game Theoretic Approach for Power Aware Middleware -- Application Servers, Enterprise Computing, and Software Engineering -- Extending a J2EETM Server with Dynamic and Flexible Resource Management -- Developing and Managing Software Components in an Ontology-Based Application Server -- Portable and Efficient Distributed Threads for Java -- Platform Independent Model Transformation Based on Triple…”
Publicado 2004
Libro electrónico -
3337Publicado 2019Tabla de Contenidos: “…-- 3 Learning to Unlearn: Moving Educators From a Charity Mentality Towards a Social Justice Mentality -- 4 Understanding Hospitality and Invitation as Dimensions of Decolonising Pedagogies When Working Interculturally -- 5 Restorative Practice: Modelling Key Skills of Peace and Global Citizenship -- 6 Into the Vortex: Exploring Curriculum Making Possibilities that Challenge Children's Responses to Extreme Climate Events -- Part 2 Curriculum -- 7 Moving Teachers' Experience From the Edge to the Centre -- 8 Bridging 4.7 with Secondary Teachers: Engaging Critical Scholarship in Education for Sustainable Development and Global Citizenship -- 9 Bat Conservation in the Foundation Stage: An Early Start to Education for Sustainability -- 10 Advocating for Democratic, Participatory Approaches to Learning and Research for Sustainability in Early Childhood -- 11 Seeking to Unsettle Student Teachers' Notions of Curriculum: Making Sense of Imaginative Encounters in the Natural World -- 12 Reconceptualising Citizenship Education Towards the Global, the Political and the Critical: Challenges and Perspectives in a Province in Northern Italy -- Part 3 Assessment -- 13 'Zero Is Where the Real Fun Starts'-Evaluation for Value(s) Co-Production -- 14 Rating Education for Sustainable Development in the Early Years: A Necessity or a Challenge?…”
Libro electrónico -
3338Publicado 2022Tabla de Contenidos: “…Chapter Title Authors -- 1 Role of Emerging Technologies in Smart Healthcare -- Masooma Zehra Syeda, Dur-e-hassan, Himanshi Babbar, masooma_zehra@hotmail.com -- -- 2 ICN-Fog computing for IoT based healthcare: architecture and challenges Divya Gupta, Shalli Rani, and Syed Hassan Ahmed -- Shalli.rani@chitkara.edu.in -- 3 Internet of Things (IoT) Enabled Software Defined Networking (SDN) for Edge Computing in Healthcare Himanshi Babbar, Shalli Rani, Neeraj Kumar -- Shalli.rani@chitkara.edu.in -- -- 4 Security and Privacy Issues in Smart Healthcare System Using Internet of Things R Nidhya, Manish Kumar, R. …”
Libro electrónico -
3339Publicado 2018Tabla de Contenidos: “…Configuration server -- Service registry -- Edge services -- Microproxy -- API gateway -- Circuit breaker -- Reactive and Spring -- Publisher -- Subscriber -- Subscription -- Processor -- Project reactor -- Mono -- Flux -- Back pressure -- Reactive Spring Data -- Reactive REST services -- Summary -- Chapter 4: Client-Server Architectures -- Understanding client-server architectures -- Server -- Scaling -- Request -- Client -- Network -- Where to apply client-server architectures -- Implementing client-server architectures with Spring -- The server -- SOAP web services -- RESTful web services -- CORBA -- Sockets -- AMQP -- Implementing the server -- Banking-domain -- Banking-api -- Boundaries -- Domain -- Persistence -- Service -- Monitoring the server -- Testing -- Banking-client -- Authentication endpoint client -- Account balance endpoint client -- The clients -- JavaFX client -- Android client -- Thin client -- Summary -- Chapter 5: Model-View-Controller Architectures -- MVC -- The Model (M) -- The View (V) -- The Controller (C) -- Benefits of using MVC -- Common pitfalls -- Implementing applications using MVC -- Spring MVC -- Testing -- Test coverage -- UI frameworks -- Thymeleaf -- Securing an MVC application -- Basic authentication -- Implementing basic authentication -- Summary -- Chapter 6: Event-Driven Architectures -- Underlying concepts and key aspects -- Command -- Event -- Patterns of event-driven architectures -- Event notification -- Event-carried state transfer -- Improving application performance -- Reducing the load on the source application -- Increasing the availability of the system -- Event sourcing -- CQRS -- Complex domain models -- Distinct paths to query and persist information -- Independent scaling -- Summary -- Chapter 7: Pipe-and-Filter Architectures -- Introducing Pipe-and-Filter concepts -- Filters -- Pipes…”
Libro electrónico -
3340por Xiao, George“…A cutting-edge look at safety and security applications of photonic sensors With its many superior qualities, photonic sensing technology is increasingly used in early-detection and early-warning systems for biological hazards, structural flaws, and security threats. …”
Publicado 2012
Libro electrónico