Mostrando 6,361 - 6,380 Resultados de 14,132 Para Buscar '"FEDER"', tiempo de consulta: 0.13s Limitar resultados
  1. 6361
    Publicado 2014
    Tabla de Contenidos: “…Dodd-Frank, Fiduciary Duties, and the Entangled Political Economy of Federalism and Agency Rule-Making Introduction; Entangled Political Economy and the Making of Law; Fiduciary Duties for Broker-Dealers and Investment Advisors: Before and after Dodd-Frank; Dodd-Frank and Fiduciary Duties: Entangled Political Economy in Action; Before Dodd-Frank in Congress; After Dodd-Frank at the SEC (and Congress); Concluding Thoughts; Notes; Acknowledgments; References; Has Fritz Machlup Stood the Test of Time? …”
    Libro electrónico
  2. 6362
    Publicado 2022
    Tabla de Contenidos: “…-- Summary -- Chapter 2: International Security Standards -- ISO 27001 and ISO 27002 -- Information Security Policies (Clause A.5) -- Organization of Information Security (Clause A.6) -- Human Resource Security (Clause A.7) -- Before Hiring -- Employees -- Termination and reassignment -- Asset Management (Clause A.8) -- Access Control (Clause A.9) -- Cryptography (Clause A.10) -- Physical and Environmental Security (Clause A.11) -- Operations Security (Clause A.12) -- Communications Security (Clause A.13) -- System Acquisition, Development, and Maintenance (Clause A.14) -- Supplier Relationships (Clause A.15) -- Incident Management (Clause A.16) -- Business Continuity Management (Clause A.17) -- Compliance (Clause A.18) -- ISO 27002 -- PCI DSS -- Goal 1: Build and Maintain a Secure Network -- Goal 2: Protect Cardholder Data -- Goal 3: Maintain a Vulnerability Management Program -- Goal 4: Implement Strong Access Control Measures -- Goal 5: Regularly Monitor and Test Networks -- Goal 6: Maintain a Policy That Addresses Information Security -- Prioritization -- SWIFT: Customer Security Controls Framework -- Summary -- Chapter 3: Information Security Frameworks -- NIST Frameworks -- NIST SP 800-53: Security and Privacy Controls for Federal Information Systems and Organizations -- NIST SP 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems -- NIST Cybersecurity Framework -- COBIT 5 for Information Security -- COBIT 5 Process Goals Applied to Information Security -- Other Regulatory Frameworks -- CIS Controls…”
    Libro electrónico
  3. 6363
    Publicado 2018
    Tabla de Contenidos: “…-- Core identity scenarios -- Cloud identity -- Directory and password synchronization -- How synchronization works -- Federated identity -- Other scenarios -- Azure AD Seamless SSO -- Password hash synchronization -- Pass-through Authentication -- MFA -- Self-service password reset -- Azure AD Basic versus Premium -- AD Connect setup and screenshots of console -- Office 365 management -- User roles -- Summary -- Chapter 5: Configuring Office 365 -- Planning Office 365 -- Sample checklist -- Implementing Office 365.…”
    Libro electrónico
  4. 6364
    Publicado 2000
    Tabla de Contenidos: “…. -- Special Grants -- Other Competitive Grants in USDA -- Complementarity of NRI within USDA -- Other Federal Programs -- National Science Foundation -- National Institutes of Health -- Department of Energy -- Interagency Programs -- Complementarity of NRI with Other Federal Programs -- Industry and the NRI…”
    Libro electrónico
  5. 6365
    Publicado 2022
    Tabla de Contenidos: “…-- 8.5 Significance of Iranian Internal Waters for the Passage Regime in the Strait of Hormuz -- 9 Tensions in and over the Taiwan Strait in 2021 -- 9.1 Legal and Geographical Characteristics of the Taiwan Strait -- 9.2 Navigation in the Taiwan Strait in the Light of Recent Developments in China’s Legislation -- 9.3 Geopolitical Tensions in the Taiwan Strait and Intrusions of Taiwan’s Air Defence Identification Zone -- 10 Discriminatory Navigational Restrictions in the Kerch Strait in Respect of Foreign Commercial Ships -- 10.1 The Significance of the Kerch Strait for Commerce -- 10.2 Restrictions on Foreign Commercial Ships’ Navigation through the Kerch Strait -- 11 Discriminatory Prohibition of the Right of Innocent Passage of a Commercial Ship  The Vironia Incident in the Gulf of Finland -- 11.1 Right of Innocent Passage in the Eastern Gulf of Finland from 1920s to 2000 -- 11.2 The Russian Federation’s Maritime Zones in the Gulf of Finland -- 11.3 The Vironia Incident in the Gulf of Finland and Its Aftermath -- 11.4 Potential Legal Basis of the Russian Federation’s Permit-Based Passage Regime in the Gulf of Finland -- part 4 -- Major Maritime Industrial Projects, Piracy, and Unidentified Soldiers -- 12 The Nord Stream Project and Estonian-Russian Incidents in the Viro Strait -- 12.1 Link between Industrial Projects and Maritime Security -- 12.2 The Significance of the Viro Strait’s eez Corridor for the Nord Stream Project -- 12.3 Marine Scientific Research in the Context of Seabed Studies on the Pipeline Route -- 12.4 The Incident between the Estonian Coast Guard and Russian Research Vessels in the Viro Strait’s eez Corridor -- 12.5 Permit-Based Marine Scientific Research in an eez: Estonia’s Decision to Deny Seabed Surveys -- 13 Countering the Threat of ‘Little Green Men’ in the Åland Strait -- 13.1 Geopolitical Characteristics of the Åland Strait and Preparations to Counter Unidentified Soldiers on the Åland Islands -- 13.2 Legal Regime of the Åland Strait -- 14 Threats of Piracy in the Straits of Malacca, Sunda, Lombok -- 14.1 Legal and Geopolitical Characteristics -- 14.2 Threats of Piracy in Indonesia and the Straits of Malacca and Singapore -- part 5 -- Concluding Observations on the Implications of Hybrid Threats for Maritime Security Law -- 15 A Need for a New Legal Framework on Hybrid Naval Warfare? …”
    Libro electrónico
  6. 6366
    por Institute of Medicine (U.S.).
    Publicado 1997
    Tabla de Contenidos: “…Health Maintenance Organizations -- Computer-Stored Ambulatory Record Systems -- Single Hospitals or Medical Centers -- Theresa System -- Health Evaluation Through Logical Processing -- Beth Israel and Brigham and Women's Hospital System -- Lockheed's Early Clinical Information System -- Large Multihospital Systems -- Department of Veterans Affairs -- Department of Defense -- International Developments -- The Exmouth Project -- Selected Emerging Developments -- Chart Checker -- Problem-Knowledge Coupler -- Medical Logic Modules -- CLINICIAN INTERACTION AND RESISTANCE -- TECHNOLOGICAL BARRIERS -- The Human Interface and System Performance -- Text Processing -- Confidentiality and Security -- Health Data-Exchange Standards -- SUMMARY -- REFERENCES -- Appendix: the Computer-based Patient Record System Vendor Survey -- GENERAL OBSERVATIONS -- SURVEY FINDINGS -- 4 The Road to CPR Implementation -- DEVELOPMENT AND DIFFUSION FACTORS -- Barriers to Development -- Patient Record Definition -- Content and Format Standards -- Costs and Risks -- Barriers to Diffusion -- Environment of the Health Care System -- Leadership -- User Behavior, Education, and Training -- Costs -- Legal and Social Issues -- Network Needs -- ELEMENTS OF AN IMPLEMENTATION STRATEGY -- Change Agents and Stakeholders -- Health Care Professionals and Professional Associations -- Patients and Representatives of Patients -- Provider Institutions -- Third-party Payers -- Federal Government -- States -- Universities and Professional Schools -- Standard-setting Organizations -- Vendors -- Activities and Resources Critical to CPR Development -- Organizational Structure -- Federal Agency -- Private Sector Sponsorship -- Public-Private Commission or Consortium -- Preferred Approach -- Specific Steps for Change Agents -- SUMMARY -- REFERENCES…”
    Libro electrónico
  7. 6367
    por Doumpos, Michael
    Publicado 2013
    Tabla de Contenidos: “…s Method 7.5 Discussion 7.6 Conclusion References Part Four Multiobjective Optimization 8 Interactive Approaches Applied to Multiobjective Evolutionary Algorithms 8.1 Introduction 8.1.1 Methods Analyzed in this Chapter 8.2 Basic Concepts and Notation 8.2.1 Multiobjective Optimization Problems 8.2.2 Classical Interactive Methods 8.3 MOEAs Based on Reference Point Methods 8.3.1 A Weighted Distance Metric 8.3.2 Light Beam Search Combined with NSGA-II 8.3.3 Controlling the Accuracy of the Pareto Front Approximation 8.3.4 Light Beam Search Combined with PSO 8.3.5 A Preference Relation Based on a Weighted Distance Metric 8.3.6 The Chebyshev Preference Relation 8.4 MOEAs Based on Value Function Methods 8.4.1 Progressive Approximation of a Value Function 8.4.2 Value Function by Ordinal Regression 8.5 Miscellaneous Methods 8.5.1 Desirability Functions 8.6 Conclusions and Future Work References 9 Generalized DEA and Computational Intelligence in Multiple Criteria Decision Making 9.1 Introduction 9.2 Generalized Data Envelopment Analysis 9.2.1 Basic DEA Models: CCR, BCC and FDH Models 9.2.2 GDEA Model 9.3 Generation of Pareto Optimal Solutions using Generalized DEA and Computational Intelligence 9.3.1 GDEA in Fitness Evaluation 9.3.2 GDEA in Deciding the Parameters of Multi-objective PSO 9.3.3 Expected Improvement for Multi-objective Optimization Using GDEA 9.4 Summary References 10 Fuzzy Multiobjective Optimization 10.1 Introduction 10.2 Solution Concepts for Multiobjective Programming 10.3 Interactive Multiobjective Linear Programming 10.4 Fuzzy Multiobjective Linear Programming 10.5 Interactive Fuzzy Multiobjective Linear Programming 10.6 Interactive Fuzzy Multiobjective Linear Programming with Fuzzy Parameters 10.7 Interactive Fuzzy Stochastic Multiobjective Linear Programming 10.8 Related Works and Applications References Part Five Applications in Management and Engineering 11 MCDA & Agents: Supporting Effective Resource Federation in Virtual Organizations 11.1 Introduction 11.2 The Intuition of Multiple Criteria Decision Aid in Multi-agent Systems 11.3 Resource Federation Applied 11.3.1 Describing the Problem in a Cloud Computing Context 11.3.2 Problem Modeling 11.3.3 Assessing Agents' Value Function for Resource Federation 11.4 An Illustrative Example 11.5 Conclusions References 12 Fuzzy AHP Using Type II Fuzzy Sets: An Application to Warehouse Location Selection 12.1 Introduction 12.2 Multicriteria Selection 12.2.1 The ELECTRE (E<U+00cc><U+0081>limination Et Choix Traduisant la Realite) Method 12.2.2 PROMETHEE (Preference Ranking Organization Method for Enrichment Evaluations) 12.2.3 TOPSIS (Technique for Order Preference by Similarity to Ideal Situation) 12.2.4 The WSM (Weighted Sum Model) Method 12.2.5 MAUT (Multi-attribute Utility Theory) 12.2.6 AHP (Analytic Hierarchy Process) 12.3 Literature Review on Fuzzy AHP 12.4 Buckley's Type-1 Fuzzy AHP 12.5 Type-2 Fuzzy Sets 12.6 Type-2 Fuzzy AHP 12.7 An Application: Warehouse Location Selection 12.8 Conclusion References 13 Applying Genetic Algorithms to Optimize Energy Efficiency in Buildings 13.1 Introduction 13.2 State-of-the-Art Review 13.3 An Example Case Study 13.3.1 Basic Principles and Problem Definition 13.3.2 Decision Variables 13.3.3 Decision Criteria 13.3.4 Decision Model 13.4 Development and Application of a Genetic Algorithm for the Example Case Study 13.4.1 Development of the Genetic Algorithm 13.4.2 Application of the Genetic Algorithm, Analysis of Results and Discussion 13.5 Conclusions References 14 Nature-Inspired Intelligence for Pareto Optimality Analysis in Portfolio Optimization 14.1 Introduction 14.2 Literature Review 14.3 Methodological Issues 14.4 Pareto Optimal Sets in Portfolio Optimization 14.4.1 Pareto Efficiency 14.4.2 Mathematical Formulation of the Portfolio Optimization Problem 14.5 Computational Results 14.5.1 Experimental Setup 14.5.2 Efficient Frontier 14.6 Conclusion References Index…”
    Libro electrónico
  8. 6368
    por OECD
    Publicado 2021
    Tabla de Contenidos: “…Waste, materials management and the circular economy -- Both material consumption and municipal waste generation have decoupled from GDP -- Nearly all municipal waste goes for recovery and recycling, although further efforts are needed to meet long-term recycling goals -- The regions and the federal government have launched ambitious circular economy initiatives, but further efforts are needed to consolidate results -- Further co-ordination is needed for more effective and efficient waste and circular economy policies -- References -- Notes -- Annex 1.A. …”
    Libro electrónico
  9. 6369
    Tabla de Contenidos: “…Principal federal environment laws -- 3.1. Climate change -- Table 2.3. …”
    Libro electrónico
  10. 6370
    Publicado 2023
    Tabla de Contenidos: “…-- Query Explain -- Deduplicating Records -- Working with JSON, Flattening, and Unnesting -- Athena Views -- CREATE TABLE AS SELECT (CTAS) -- Saving Queries and Reusing Saved Queries -- Running Parameterized Queries -- Athena Federated Queries -- Athena Lambda Connectors -- Note on Connection Errors…”
    Libro electrónico
  11. 6371
    Publicado 2021
    Tabla de Contenidos: “….) -- 1.16 EXAMEN GENERAL DE LOS SISTEMAS FEDERAL (...) -- RESUMEN -- ACTIVIDADES DE APRENDIZAJE -- AUTOEVALUACIÓN -- CAPÍTULO 2. …”
    Libro electrónico
  12. 6372
    Publicado 2003
    Tabla de Contenidos: “…Creating applications with EIP -- 6.1 Programming interface overview -- 6.2 Taking an API test drive -- 6.2.1 Setting up sample data -- 6.2.2 Using Content Manager connector -- 6.2.3 Using DB2 connector -- 6.2.4 Using federated connector to access DB2 -- 6.2.5 Using federated connector to search across content servers -- 6.2.6 Working with Information Mining Service -- 6.2.7 Working with controller servlet -- 6.2.8 Working with viewer toolkit -- Chapter 7. …”
    Libro electrónico
  13. 6373
    por Sanchez Gonzalez, Jorge Manuel
    Publicado 2009
    Tabla de Contenidos: “…Servicios de salud en el Distrito Federal; 12. Servicios de salud en el estado de Durango; 13. …”
    Libro electrónico
  14. 6374
    Publicado 2008
    Tabla de Contenidos: “….); INAUGURACIÓN DEL PRIMER CONGRESO FEDERAL (...); LABOR GUBERNATIVA, CARACTERES PREDOMINANTES (...); BIBLIOGRAFÍA, PRINCIPAL…”
    Libro electrónico
  15. 6375
    Publicado 2020
    Tabla de Contenidos: “…Los caídos en, a través y más allá del museo: el caso del Museo de la Policía Federal Argentina, por Elea Maglia -- El Museo -- La muerte como posibilidad: "el riesgo de perder la vida" -- Los caídos: sus rostros, objetos e historias -- Los caídos como merecedores de la honra institucional -- La otra cara de la moneda: los milagros -- Conclusiones -- Bibliografía citada -- Otras fuentes -- 5. …”
    Libro electrónico
  16. 6376
    por Saggese, Federico
    Publicado 2009
    Tabla de Contenidos: “…Las jurisprudencias federal, bonaerense y de la Ciudad Autónoma de Buenos Aires; SECCIÓN CUARTA; 11. …”
    Libro electrónico
  17. 6377
  18. 6378
    Publicado 2006
    Tabla de Contenidos: “…LA TRANSICIÓN Y LOS MEDIOS ELECTRÓNICOS (...)LAS GRANDES EMPRESAS DE LA RADIO Y TELEVISIÓN (...); LA LEY FEDERAL DE RADIO Y TELEVISIÓN EN (...); MODIFICACIONES A LA LEY DURANTE EL PRIÍSMO; LA RADIO Y LA TELEVISIÓN DESPUÉS DE LA (...); REFLEXIONES FINALES; LA MESA DE TRES PATAS: SOBRE LA REFORMA (...); INTRODUCCIÓN; CRISIS DE LA FORMA DE DESARROLLO, CRISIS (...); POLÍTICA SOCIAL SIN CRECIMIENTO: EL RETO (...); LA REFORMA SOCIAL; EL PANORAMA DE LA REFORMA; BIBLIOGRAFÍA; DILEMAS DE LA TRANSICIÓN Y EL DESARROLLO (...); LA ENCRUCIJADA POLÍTICA; LA ENCRUCIJADA ECONÓMICA; CONCLUSIONES…”
    Libro electrónico
  19. 6379
    Tabla de Contenidos: “…INICIO DEL SIGLO XX; PENITENCIARÍA DE LECUMBERRI; CÁRCEL DE MUJERES DE SANTA MARTHA ACATITLA; PENITENCIARÍA DE SANTA MARTHA ACATITLA; COLONIA PENAL (FEDERAL) DE ISLAS MARÍAS; LA CÁRCEL DE MÁXIMA SEGURIDAD…”
    Libro electrónico
  20. 6380
    Publicado 2000
    Tabla de Contenidos: “….); MOTIVACIÓN DE LA LEY FEDERAL DE COMPETENCIA (...); OBJETIVOS Y PRINCIPIOS DE LA LFCE; ACLARACIONES ADICIONALES RESPECTO A LA (...); SANCIONES; CAPÍTULO 8. …”
    Libro electrónico