Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Business & Economics 444
- Engineering & Applied Sciences 406
- Development 365
- Design 332
- Application software 323
- Management 321
- History 315
- Web sites 277
- Filosofía 268
- Matemáticas 244
- Computer Science 242
- Mecánica 241
- Web site development 241
- Photography 227
- Finance 214
- Digital techniques 211
- Data processing 209
- Historia 200
- Computer programs 175
- Ensenyament 172
- JavaScript (Computer program language) 170
- Computer networks 162
- Física 161
- Programming 157
- Teoría de las estructuras 147
- Computer graphics 143
- HTML (Document markup language) 143
- Estudio y enseñanza 138
- Computer programming 130
- Leadership 130
-
16661por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Intégration des différents éléments du développement durable dans l'action des pouvoirs publics* -- Pollution atmosphérique -- Principaux problèmes -- Résultats -- Tableau 5.1. …”
Publicado 2005
Libro electrónico -
16662por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Fiche synthétique -- Tableau 26. Analyse AFOM -- B. Éléments d'une stratégie de développement -- Troisième partie : RECOMMANDATIONS CONCERNANT L'ACTION PUBLIQUE AU TERUEL -- Chapitre 7. …”
Publicado 2001
Libro electrónico -
16663por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Les ventes de semi-conducteurs continuent de diminuer dans le monde -- Éléments pour une reprise -- Graphique I.5. Deux facteurs soutenant l'activité économique -- Encadré I.2. …”
Publicado 2001
Libro electrónico -
16664por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Notes -- Annexe 4.A3. Principaux éléments/points de chevauchement des accords internationaux sur l'investissement -- Chapitre 5. …”
Publicado 2004
Libro electrónico -
16665por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Liquidité des marchés financiers et restructuration des marchés physiques -- Concurrence d'autres instruments et prime de risque liée au marché -- Deux éléments clef : marketing et formation -- Périodes de crise prolongée -- Environnement réglementaire -- Conclusions -- C. …”
Publicado 2000
Libro electrónico -
16666Publicado 2017Tabla de Contenidos: “…2.3.5 Mobile Device Classes -- 2.3.6 Network Mode of Operation -- 2.3.7 GPRS Logical Channels on the Air Interface -- 2.4 The GPRS State Model -- 2.5 GPRS Network Elements -- 2.5.1 The Packet Control Unit (PCU) -- 2.5.2 The Serving GPRS Support Node (SGSN) -- 2.5.3 The Gateway GPRS Support Node (GGSN) -- 2.6 GPRS Radio Resource Management -- 2.7 GPRS Interfaces -- 2.8 GPRS Mobility Management and Session Management (GMM/SM) -- 2.8.1 Mobility Management Tasks -- 2.8.2 GPRS Session Management -- Questions -- References -- Chapter 3 Universal Mobile Telecommunications System (UMTS) and High-Speed Packet Access (HSPA) -- 3.1 Overview, History and Future -- 3.1.1 3GPP Release 99: The First UMTS Access Network Implementation -- 3.1.2 3GPP Release 4: Enhancements for the Circuit-Switched Core Network -- 3.1.3 3GPP Release 5: High-Speed Downlink Packet Access -- 3.1.4 3GPP Release 6: High-Speed Uplink Packet Access (HSUPA) -- 3.1.5 3GPP Release 7: Even Faster HSPA and Continued Packet Connectivity -- 3.1.6 3GPP Release 8: LTE, Further HSPA Enhancements and Femtocells -- 3.1.7 3GPP Release 9: Digital Dividend and Dual-Cell Improvements -- 3.1.8 3GPP Releases 10 and Beyond -- 3.2 Important New Concepts of UMTS -- 3.2.1 The Radio Access Bearer (RAB) -- 3.2.2 The Access Stratum and Non-Access Stratum -- 3.2.3 Common Transport Protocols for CS and PS -- 3.3 Code Division Multiple Access (CDMA) -- 3.3.1 Spreading Factor, Chip Rate and Process Gain -- 3.3.2 The OVSF Code Tree -- 3.3.3 Scrambling in Uplink and Downlink Direction -- 3.3.4 UMTS Frequency and Cell Planning -- 3.3.5 The Near-Far Effect and Cell Breathing -- 3.3.6 Advantages of the UMTS Radio Network Compared to GSM -- 3.4 UMTS Channel Structure on the Air Interface -- 3.4.1 User Plane and Control Plane -- 3.4.2 Common and Dedicated Channels -- 3.4.3 Logical, Transport and Physical Channels…”
Libro electrónico -
16667Publicado 2015Tabla de Contenidos: “…Calabrese,Guillaume Monghal, Mohammad Anas, Luis Maestro, Juha Kallio and Olli Ramula -- 13.1 Introduction 417 -- 13.2 Architecture 418 -- 13.3 Elements 419 -- 13.4 Evolved Universal Terrestrial Radio Access Network 422 -- 13.5 Interfaces 428 -- 13.6 Protocol Stacks 430 -- 13.7 Layer 2 Structure 434 -- 13.8 LTE Radio Network 435 -- 13.9 LTE Spectrum 436 -- 13.10 Physical Layer 438 -- 13.11 SC-FDM and SC-FDMA 448 -- 13.12 Frame Structure and Physical Channels 449 -- 13.13 Physical Layer Procedures 453 -- 13.14 User Mobility 455 -- 13.15 Radio Resource Management Procedures 457 -- 13.16 Link Adaptation 458 -- 13.17 ICIC 459 -- 13.18 Reporting 463 -- 13.19 LTE Radio Resource Management 466 -- 13.20 RRM Principles and Algorithms Common to UL and DL 467 -- 13.21 Uplink RRM 477 -- 13.22 Downlink RRM 482 -- 13.23 Intra-LTE Handover 485 -- 13.24 LTE Release 8/9 Features 487 -- 13.25 LTE-Advanced Features (Rel. 10) 496 -- 13.26 LTE Transport and Core Network 504 -- 13.27 Transport Network 506 -- 13.28 Core Network 509 -- 13.29 Charging 510 -- References 513 -- 14 Wireless LAN and Evolution 515 /Jyrki T. …”
Libro electrónico -
16668Publicado 2024Tabla de Contenidos: “…. -- 2.3 Inputs and Outputs -- 2.3.1 Digital Video -- 2.3.2 Uncompressed Video Formats -- 2.3.2.1 Frames, Fields and Pixels -- 2.3.2.2 Colour and Colour Spaces -- 2.3.3 Side Information -- 2.3.4 Coded Video -- 2.4 Structural Elements -- 2.5 Prediction -- 2.5.1 Prediction in a Video Encoder -- 2.5.2 Prediction in a Video Decoder -- 2.5.3 Prediction Example -- 2.5.4 Choosing a Prediction -- 2.5.5 Inter and Intra Prediction -- 2.6 Transform and Quantisation -- 2.6.1 Transform -- 2.6.2 Quantisation -- 2.7 Bitstream Coding -- 2.7.1 Pre-processing -- 2.7.2 Entropy Encoding -- 2.8 The Coded Bitstream -- 2.9 Storing and Transmitting the Coded Bitstream -- 2.10 The Decoder -- 2.10.1 Entropy Decoding -- 2.10.2 Rescaling and Inverse Transform -- 2.10.3 Reconstruction -- 2.10.4 Decoder Output -- 2.11 The Video Codec Model -- 2.12 Video Codec Performance -- 2.12.1 Video Quality -- 2.12.2 Subjective Quality Measurement -- 2.12.2.1 Factors Influencing Subjective Quality -- 2.12.2.2 Subjective Quality Assessment Methods -- 2.12.3 Objective Quality Measurement -- 2.12.3.1 PSNR -- 2.12.3.2 Other Objective Quality Metrics -- 2.13 Conclusion -- References -- Chapter 3 A History of Video Coding and Video Coding Standards -- 3.1 Introduction -- 3.2 The Foundations of Video Coding, 1950-1990 -- 3.2.1 Entropy Coding: 1952-1987 -- 3.2.2 Frame Differencing: 1956-1972 -- 3.2.3 The Discrete Cosine Transform: 1974-1984…”
Libro electrónico -
16669por Organisation de coopération et de développement économiques.“…Cet ouvrage est une source unique d’éléments d’information comparés sur cette question difficile. …”
Publicado 2002
Libro electrónico -
16670por International Business Machines Corporation, International Technical Support Organization StaffTabla de Contenidos: “…12.1.2 Mapping repeating elements -- 12.1.3 Top-level automatic group mapping -- 12.2 The XML mapping tool -- 12.3 Generating the XML mapping converters -- 12.3.1 Creating the inbound converter and associated driver -- 12.3.2 Creating the outbound converter and associated driver -- 12.4 Modifying the converter driver -- 12.5 Summary -- Part 4 J2EE Connector architecture and Web Services Description Language support -- Chapter 13. …”
Publicado 2005
Libro electrónico -
16671Publicado 2016Tabla de Contenidos: “…-- 8.2.7 Machine Code Instruction Set -- 8.2.8 Structural Elements of the Microprocessor -- 8.3 A Simple Embedded Processor Implemented in VHDL -- 8.3.1 Processor Functions Package -- 8.3.2 The Program Counter -- 8.3.3 The Instruction Register -- 8.3.4 The Arithmetic and Logic Unit -- 8.3.5 The Memory -- 8.3.6 Microcontroller Controller -- 8.3.7 Summary of a Simple Microprocessor Implemented in VHDL -- 8.4 A Simple Embedded Processor Implemented in Verilog -- 8.4.1 The Program Counter -- 8.4.2 The Instruction Register -- 8.4.3 Memory Data Register -- 8.4.4 Memory Address Register -- 8.4.5 The Arithmetic and Logic Unit -- 8.4.6 The Memory -- 8.4.7 Microcontroller Controller -- 8.4.8 Summary of a Simple Verilog Microprocessor -- 8.5 Soft Core Processors on an FPGA -- 8.6 Summary -- Part 3: Designer's Toolbox -- Chapter 9: Digital Filters -- 9.1 Introduction -- 9.2 Converting S Domain to Z Domain -- 9.3 Implementing Z Domain Functions in VHDL -- 9.3.1 Introduction -- 9.3.2 Gain Block -- 9.3.3 Sum and Difference -- 9.3.4 Division Model -- 9.3.5 Unit Delay Model -- 9.4 Basic Low Pass Filter Model -- 9.5 Implementing Z Domain Functions in Verilog -- 9.5.1 Gain Block -- 9.5.2 Sum and Difference -- 9.5.3 Unit Delay Model -- 9.6 Finite Impulse Response Filters -- 9.7 Infinite Impulse Response Filters -- 9.8 Summary -- Chapter 10: Secure Systems -- 10.1 Introduction to Block Ciphers -- 10.2 Feistel Lattice Structures -- 10.3 The Data Encryption Standard (DES) -- 10.3.1 Introduction -- 10.3.2 DES VHDL Implementation -- 10.3.3 DES Verilog Implementation…”
Libro electrónico -
16672Publicado 2019Tabla de Contenidos: “…6.8.4 Setting Up the Control Tags -- 6.8.5 Importing the Graphics Files -- 6.8.6 Assembling the GUI -- 6.8.7 Setting the Background -- 6.8.8 Adding the GUI Elements -- 6.8.9 Saving and Re-Building -- 6.8.10 Scaling the GUI -- 6.8.11 More ASPiK Features -- 6.9 Bibliography -- Chapter 7: Using RackAFX to Create ASPiK Projects -- 7.1 Installing RackAFX -- 7.2 Getting Started With RackAFX -- 7.3 Setting Up Your Project Preferences and Audio Hardware -- 7.4 Installing VSTGUI4 -- 7.5 Creating a Project and Adding GUI Controls -- 7.5.1 Numerical Continuous Controls -- 7.5.2 String-List Controls -- 7.5.3 Meters -- 7.6 Anatomy of Your RackAFX Project -- 7.7 Testing Audio Algorithms With RackAFX -- 7.8 RackAFX Impulse Convolver and FIR Design Tools -- 7.9 Designing Your Custom GUI -- 7.10 Exporting Your ASPiK Project -- 7.11 Bibliography -- Chapter 8: C++ Conventions and How to Use This Book -- 8.1 Three Types of C++ Objects -- 8.1.1 Effect Objects Become Framework Object Members -- 8.1.2 All Effect Objects and Most DSP Objects Implement Common Interfaces -- 8.1.3 DSP and Effect Objects Use Custom Data Structures for Parameter Get/Set Operations -- 8.1.4 Effect Objects Accept Native Data From GUIs -- 8.1.5 Effect Objects Process Audio Samples -- 8.1.5.1 Series Objects -- 8.1.5.2 Parallel Objects -- 8.1.6 Effect Objects Optionally Process Frames -- 8.2 Book Projects -- 8.2.1 ASPiK Users -- 8.2.2 JUCE and Other Non-ASPiK Users -- 8.2.3 A Sample Plugin Project: GUI Control Definition -- Chapter 9: How DSP Filters Work (Without Complex Math) -- 9.1 Frequency and Phase Response Plots -- 9.2 Frequency and Phase Adjustments From Filtering -- 9.3 1st Order Feed-Forward Filter -- 9.4 1st Order Feedback Filter -- 9.5 Final Observations -- 9.6 Homework -- 9.7 Bibliography -- Chapter 10: Basic DSP Theory -- 10.1 The Complex Sinusoid -- 10.2 Complex Math Review…”
Libro electrónico -
16673Publicado 2010Tabla de Contenidos: “…3.9 The with Statement -- 3.10 The return Statement -- 3.11 The throw and try Statements -- 3.12 The mixin Statement -- 3.13 The scope Statement -- 3.14 The synchronized Statement -- 3.15 The asm Statement -- 3.16 Summary and Quick Reference -- 4 Arrays, Associative Arrays, and Strings -- 4.1 Dynamic Arrays -- 4.1.1 Length -- 4.1.2 Bounds Checking -- 4.1.3 Slicing -- 4.1.4 Copying -- 4.1.5 Comparing for Equality -- 4.1.6 Concatenating -- 4.1.7 Array-wise Expressions -- 4.1.8 Shrinking -- 4.1.9 Expanding -- 4.1.10 Assigning to .length -- 4.2 Fixed-Size Arrays -- 4.2.1 Length -- 4.2.2 Bounds Checking -- 4.2.3 Slicing -- 4.2.4 Copying and Implicit Conversion -- 4.2.5 Comparing for Equality -- 4.2.6 Concatenating -- 4.2.7 Array-wise Operations -- 4.3 Multidimensional Arrays -- 4.4 Associative Arrays -- 4.4.1 Length -- 4.4.2 Reading and Writing Slots -- 4.4.3 Copying -- 4.4.4 Comparing for Equality -- 4.4.5 Removing Elements -- 4.4.6 Iterating -- 4.4.7 User-Defined Types as Keys -- 4.5 Strings -- 4.5.1 Code Points -- 4.5.2 Encodings -- 4.5.3 Character Types -- 4.5.4 Arrays of Characters + Benefits = Strings -- 4.6 Arrays' Maverick Cousin: The Pointer -- 4.7 Summary and Quick Reference -- 5 Data and Functions. …”
Libro electrónico -
16674por Allison, SteveTabla de Contenidos: “…2.2.1 Evaluate security elements in each layer -- 2.2.2 Ask the key questions -- 2.3 Making some key decisions -- 2.3.1 Intranet or Internet? …”
Publicado 2005
Libro electrónico -
16675Publicado 2004Tabla de Contenidos: “…Web application basics -- 1.1 Overview -- 1.1.1 Common features -- 1.1.2 Web server -- 1.1.3 Web application packaging -- 1.1.4 Web services: Service-oriented application -- 1.1.5 Web services standards -- 1.2 Java servlet -- 1.2.1 Servlet container -- 1.2.2 Servlet API -- 1.2.3 Servlet life cycle -- 1.2.4 Sharing information -- 1.2.5 Filtering requests and responses -- 1.2.6 Maintaining client and application state -- 1.2.7 Packaging servlets -- 1.3 JavaServer Pages (JSP) -- 1.3.1 JSP elements -- 1.3.2 JSP Standard Tag Libraries (JSTL) -- 1.3.3 JSP life cycle -- 1.3.4 JSP translation and compilation -- 1.3.5 JSP advantages -- 1.3.6 Packaging JSPs -- 1.4 JavaServer Faces technology (JSF) -- 1.4.1 JSF APIs -- 1.5 Model-View-Controller architecture -- 1.5.1 MVC advantages -- 1.6 Java 2 Platform Enterprise Edition (J2EE) -- 1.6.1 J2EE architecture -- 1.6.2 Component technologies -- 1.6.3 Packaging J2EE applications -- 1.7 Struts -- Chapter 2. …”
Libro electrónico -
16676Publicado 2022Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgment -- 1 Deep Dive Into Blockchain Technology: Characteristics, Security and Privacy Issues, Challenges, and Future Research Directions -- 1.1 Introduction -- 1.2 Blockchain Preliminaries -- 1.2.1 Functioning of Blockchain -- 1.2.2 Design of Blockchain -- 1.2.3 Blockchain Elements -- 1.3 Key Technologies of Blockchain -- 1.3.1 Distributed Ledger -- 1.3.2 Cryptography -- 1.3.3 Consensus -- 1.3.4 Smart Contracts -- 1.3.5 Benchmarks -- 1.4 Consensus Algorithms of Blockchain -- 1.4.1 Proof of Work (PoW) -- 1.4.2 Proof of Stake (PoS) -- 1.4.3 BFT-Based Consensus Algorithms -- 1.4.4 Practical Byzantine Fault Tolerance (PBFT) -- 1.4.5 Sleepy Consensus -- 1.4.6 Proof of Elapsed Time (PoET) -- 1.4.7 Proof of Authority (PoA) -- 1.4.8 Proof of Reputation (PoR) -- 1.4.9 Deputized Proof of Stake (DPoS) -- 1.4.10 SCP Design -- 1.5 Internet of Things and Blockchain -- 1.5.1 Internet of Things -- 1.5.2 IoT Blockchain -- 1.5.3 Up-to-Date Tendency in IoT Blockchain Progress -- 1.6 Applications of Blockchain in Smart City -- 1.6.1 Digital Identity -- 1.6.2 Security of Private Information -- 1.6.3 Data Storing, Energy Ingesting, Hybrid Development -- 1.6.4 Citizens Plus Government Frame -- 1.6.5 Vehicle-Oriented Blockchain Appliances in Smart Cities -- 1.6.6 Financial Applications -- 1.7 Security and Privacy Properties of Blockchain -- 1.7.1 Security and Privacy Necessities of Online Business Transaction -- 1.7.2 Secrecy of Connections and Data Privacy -- 1.8 Privacy and Security Practices Employed in Blockchain -- 1.8.1 Mixing -- 1.8.2 Anonymous Signatures -- 1.8.3 Homomorphic Encryption (HE) -- 1.8.4 Attribute-Based Encryption (ABE) -- 1.8.5 Secure Multi-Party Computation (MPC) -- 1.8.6 Non-Interactive Zero-Knowledge (NIZK)…”
Libro electrónico -
16677Publicado 2024Tabla de Contenidos: “…4.1 Nation State Cyber Operations -- 4.1.1 Advanced Persistent Threats -- 4.1.2 Nation-State Cyber Operations against Critical Infrastructure -- 4.1.3 Elements of a Nation-State Cyber Organization -- 4.1.3.1 Cyber Research Institutions -- 4.1.3.2 Cyber Engineering and Development -- 4.1.3.3 Cyber and Clandestine Services -- 4.1.4 Structure of Nation-State Cyber Operations and Maneuver -- 4.1.4.1 Cryptocurrencies, Sanctions, and Subversion -- 4.1.5 Nation-State Cyber Operations Wrap-up -- Bibliography -- Chapter 5 Russian Cyber Operations -- 5.1 Russian Cyber Operations -- 5.1.1 Russian Policy, Tools, and Historical Use of Information Operations -- 5.1.1.1 Policy, Statecraft Tools, and Cryptocurrency -- 5.1.1.2 Information Operations, Developing Doctrine, and Russian Cyber Teams -- 5.1.1.3 Estonia Denial of Service Attack (2007) -- 5.1.2 Russian Information Operations -- 5.1.2.1 The Russian Federal Security Service (FSB) -- 5.1.2.2 Russia and Ukrainian Power System Attacks -- 5.1.2.3 Foreign Intelligence Directorate (SVR)(APT 29 - Nobelium) -- 5.1.2.4 2020 SolarWinds (SVR) -- 5.1.2.5 Military Intelligence Directorate (GRU) -- 5.1.3 2022 Ukraine Invasion -- 5.1.4 Russian Cyber Operations Wrap-up -- Bibliography -- Chapter 6 Chinese Cyber Operations -- 6.1 Chinese Cyber Operations -- 6.1.1 Chinese Cyber Doctrine Development -- 6.1.2 2002-2012 Chinese Cyber Development Phase -- 6.1.2.1 2002-2007 Operation Titan Rain -- 6.1.2.2 2009 Operation Aurora -- 6.1.2.3 2007-2013 Operation Night Dragon - U.S. …”
Libro electrónico -
16678Publicado 2022Tabla de Contenidos: “…-- 9.1.4 Key features of BCI -- 9.1.5 Applications -- 9.2 Brain-computer interface classification -- 9.2.1 Noninvasive BCI -- 9.2.2 Semiinvasive or partially invasive BCI -- 9.2.3 Invasive BCI -- 9.3 Key elements of BCI -- 9.3.1 Signal acquisition -- 9.3.2 Preprocessing or signal enhancement -- 9.3.3 Feature extraction -- 9.3.4 Classification stage -- 9.3.5 Feature translation or control interface stage -- 9.3.6 Device output or feedback stage -- 9.4 Modalities of BCI -- 9.4.1 Electrical and magnetic signals -- 9.4.1.1 Intracortical electrode array -- 9.4.1.2 Electrocorticography -- 9.4.1.3 Electroencephalography -- 9.4.1.4 Magnetoencephalography -- 9.4.2 Metabolic signals -- 9.4.2.1 Positron emission tomography -- 9.4.2.2 Functional magnetic resonance imaging -- 9.4.2.3 Functional near-infrared spectroscopy -- 9.5 Computational intelligence methods in BCI/BMI -- 9.5.1 State of the prior art -- 9.5.1.1 Preprocessing -- 9.5.1.2 Feature extraction -- 9.5.1.3 Feature classification -- 9.5.1.4 Performance evaluation of BCI systems -- 9.6 Online and offline BCI applications -- 9.7 BCI for the Internet of Things…”
Libro electrónico -
16679Publicado 2012“…-Comment les mécanismes publics de partage des risques fonctionnent-ils en pratique ? Nouveaux éléments de réponse provenant des pays de l'OCDE et des BRIICS -Synthèse : quatre grands modèles nationaux de partage des risques de revenu -Bibliographie…”
Libro electrónico -
16680Tabla de Contenidos: “…Unsupervised -- Clinical Benefit -- Home Deployment Elements -- Home- and Community-Based Sensing -- Body-Worn Assessment Applications -- Ambient Sensing -- User Touch Points -- Participant Feedback -- Home Deployment Management -- Remote Deployment Framework -- The Prototyping Design Process -- Design for and with the End User -- Design with Multidisciplinary Team Members -- Data Analytics and Intelligent Data Processing…”
Libro electrónico